Sign in to use this feature.

Years

Between: -

Subjects

remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline

Journals

Article Types

Countries / Regions

Search Results (9)

Search Parameters:
Keywords = End-2-End Delay (E2ED)

Order results
Result details
Results per page
Select all
Export citation of selected articles as:
32 pages, 5572 KB  
Article
Performance Evaluation of Mobile RPL-Based IoT Networks under Hello Flood Attack
by Amal Hkiri, Sami Alqurashi, Omar Ben Bahri, Mouna Karmani, Hamzah Faraj and Mohsen Machhout
Electronics 2024, 13(11), 2226; https://doi.org/10.3390/electronics13112226 - 6 Jun 2024
Cited by 6 | Viewed by 2316
Abstract
The RPL protocol is essential for efficient communication within the Internet of Things (IoT) ecosystem, yet it remains vulnerable to various attacks, particularly in dense and mobile environments where it shows certain limitations and susceptibilities. This paper presents a comprehensive simulation-based analysis of [...] Read more.
The RPL protocol is essential for efficient communication within the Internet of Things (IoT) ecosystem, yet it remains vulnerable to various attacks, particularly in dense and mobile environments where it shows certain limitations and susceptibilities. This paper presents a comprehensive simulation-based analysis of the RPL protocol’s vulnerability to the Hello Flood attack in mobile environments. Using four different group mobility models—the Column Mobility Model (CMM), Reference Point Group Mobility Model (RPGM), Nomadic Community Mobility Model (NCM), and Pursue Mobility Model (PMM)—within the Cooja simulator, this study uniquely investigates the Hello Flood attack in mobile settings, an area previously overlooked. Our systematic evaluation focuses on critical performance metrics, including the Packet Delivery Ratio (PDR), End-to-End Delay (E2ED), throughput, Expected Transmission Count (ETX), and Average Power Consumption (APC). The findings reveal several key insights: PDR decreases significantly, indicating increased packet loss or delivery failures; ETX values rise, necessitating more packet retransmissions and routing hops; E2ED increases, introducing delays in routing decisions and data transmission times; throughput declines as the attack disrupts data flow; and APC escalates due to higher energy usage on packet transmissions, especially over extended paths. These results underscore the urgent need for robust security measures to protect RPL-based IoT networks in mobile environments. Furthermore, our work emphasizes the exacerbated impact of the attack in mobile scenarios, highlighting the evolving security requirements of IoT networks. Full article
(This article belongs to the Section Networks)
Show Figures

Figure 1

16 pages, 626 KB  
Article
Enhanced Random Forest Classifier with K-Means Clustering (ERF-KMC) for Detecting and Preventing Distributed-Denial-of-Service and Man-in-the-Middle Attacks in Internet-of-Medical-Things Networks
by Abdullah Ali Jawad Al-Abadi, Mbarka Belhaj Mohamed and Ahmed Fakhfakh
Computers 2023, 12(12), 262; https://doi.org/10.3390/computers12120262 - 17 Dec 2023
Cited by 15 | Viewed by 4236
Abstract
In recent years, the combination of wireless body sensor networks (WBSNs) and the Internet ofc Medical Things (IoMT) marked a transformative era in healthcare technology. This combination allowed for the smooth communication between medical devices that enabled the real-time monitoring of patient’s vital [...] Read more.
In recent years, the combination of wireless body sensor networks (WBSNs) and the Internet ofc Medical Things (IoMT) marked a transformative era in healthcare technology. This combination allowed for the smooth communication between medical devices that enabled the real-time monitoring of patient’s vital signs and health parameters. However, the increased connectivity also introduced security challenges, particularly as they related to the presence of attack nodes. This paper proposed a unique solution, an enhanced random forest classifier with a K-means clustering (ERF-KMC) algorithm, in response to these challenges. The proposed ERF-KMC algorithm combined the accuracy of the enhanced random forest classifier for achieving the best execution time (ERF-ABE) with the clustering capabilities of K-means. This model played a dual role. Initially, the security in IoMT networks was enhanced through the detection of attack messages using ERF-ABE, followed by the classification of attack types, specifically distinguishing between man-in-the-middle (MITM) and distributed denial of service (DDoS) using K-means. This approach facilitated the precise categorization of attacks, enabling the ERF-KMC algorithm to employ appropriate methods for blocking these attack messages effectively. Subsequently, this approach contributed to the improvement of network performance metrics that significantly deteriorated during the attack, including the packet loss rate (PLR), end-to-end delay (E2ED), and throughput. This was achieved through the detection of attack nodes and the subsequent prevention of their entry into the IoMT networks, thereby mitigating potential disruptions and enhancing the overall network efficiency. This study conducted simulations using the Python programming language to assess the performance of the ERF-KMC algorithm in the realm of IoMT, specifically focusing on network performance metrics. In comparison with other algorithms, the ERF-KMC algorithm demonstrated superior efficacy, showcasing its heightened capability in terms of optimizing IoMT network performance as compared to other common algorithms in network security, such as AdaBoost, CatBoost, and random forest. The importance of the ERF-KMC algorithm lies in its security for IoMT networks, as it provides a high-security approach for identifying and preventing MITM and DDoS attacks. Furthermore, improving the network performance metrics to ensure transmitted medical data are accurate and efficient is vital for real-time patient monitoring. This study takes the next step towards enhancing the reliability and security of IoMT systems and advancing the future of connected healthcare technologies. Full article
Show Figures

Figure 1

16 pages, 649 KB  
Article
Use of Soft Cervical Collar among Whiplash Patients in Two Italian Emergency Departments Is Associated with Persistence of Symptoms: A Propensity Score Matching Analysis
by Firas Mourad, Giacomo Rossettini, Erasmo Galeno, Alberto Patuzzo, Giuseppe Zolla, Filippo Maselli, Federica Ciolan, Michele Guerra, Giacomo Tosato, Alvisa Palese, Marco Testa, Giorgio Ricci, Arian Zaboli, Antonio Bonora and Gianni Turcato
Healthcare 2021, 9(10), 1363; https://doi.org/10.3390/healthcare9101363 - 14 Oct 2021
Cited by 3 | Viewed by 5928
Abstract
Purpose: Although the use of soft cervical collars in the emergency department (ED), for whiplash-associated disorders (WAD), is controversial, it is still widely adopted. The purpose of our study was to investigate the impact of the early use of soft cervical collars on [...] Read more.
Purpose: Although the use of soft cervical collars in the emergency department (ED), for whiplash-associated disorders (WAD), is controversial, it is still widely adopted. The purpose of our study was to investigate the impact of the early use of soft cervical collars on the return to the ED, within three months of a road traffic collision. Methods: We conducted a retrospective observational study on WAD patients from two EDs in Verona (Italy). Patients in the earlier acute phase of WAD (within 48 h from the trauma) were included; those with serious conditions (WAD IV) were excluded. As an end point, we considered patients who returned to the ED complaining of WAD symptoms within three months as positive outcome for WAD persistence. Results: 2162 patients were included; of those, 85.4% (n = 1847/2162) received a soft cervical collar prescription. Further, 8.4% (n = 156/1847) of those with a soft cervical collar prescription, and 2.5% (n = 8/315) of those without a soft cervical collar (p < 0.001) returned to the ED within three months. The use of the soft cervical collar was an independent risk factor for ED return within three months, with an OR, adjusted for possible clinical confounders, equal to 3.418 (95% CI 1.653–7.069; p < 0.001). After the propensity score matching, 25.5% of the patients (n = 25/98) using the soft cervical collar returned to the ED at three months, compared to the 6.1% (n = 6/98) that did not adopt the soft cervical collar. The use of a soft cervical collar was associated with ED return with an OR = 4.314 (95% CI 2.066–11.668; p = 0.001). Conclusions: Our study shows that the positioning of the soft collar in a cohort of patients with acute WAD, following a rear-end car collision, is an independent potential risk factor to the return to the ED. Clinically, the use of the collar is a non-recommended practice and seems to be related to an increased risk of delayed recovery. There is a need to inform healthcare providers involved in the ED of the aim to limit the use of the soft cervical collar. A closer collaboration between clinicians (e.g., physicians, physical therapists, nurses) is suggested in the ED. Future primary studies should determine differences between having used or not having used the collar, and compare early physical therapy in the ED compared with the utilization of the collar. Full article
(This article belongs to the Special Issue Traffic Injuries and Prevention)
Show Figures

Figure 1

27 pages, 4305 KB  
Article
Road-Based Multi-Metric Forwarder Evaluation for Multipath Video Streaming in Urban Vehicular Communication
by Ahmed Aliyu, Abdul Hanan Abdullah, Ismail Fauzi Isnin, Raja Zahilah Raja Mohd. Radzi, Arvind Kumar, Tasneem S. J. Darwish and Usman Mohammed Joda
Electronics 2020, 9(10), 1663; https://doi.org/10.3390/electronics9101663 - 13 Oct 2020
Cited by 4 | Viewed by 2350
Abstract
In video streaming over vehicular communication, optimal selection of a video packet forwarder is a daunting issue due to the dynamic nature of Vehicular Ad-hoc NETworks (VANETs)and the high data rates of video. In most of the existing studies, extensive considerations of the [...] Read more.
In video streaming over vehicular communication, optimal selection of a video packet forwarder is a daunting issue due to the dynamic nature of Vehicular Ad-hoc NETworks (VANETs)and the high data rates of video. In most of the existing studies, extensive considerations of the essential metrics have not been considered. In order to achieve quality video streaming in vehicular network, important metrics for link connectivity and bandwidth efficiency need to be employed to minimize video packet error and losses. In order to address the aforementioned issues, a Road-based Multi-metric Forwarder Evaluation scheme for Multipath Video Streaming (RMF-MVS) has been proposed. The RMF-MVS scheme is adapted to be a Dynamic Self-Weighting score (DSW) (RMF-MVS+DSW) for forwarder vehicle selection. The scheme is based on multipath transmission. The performance of the scheme is evaluated using Peak Signal to Noise Ratio (PSNR), Structural SIMilarity index (SSIM), Packet Loss Ratio (PLR) and End-to-End Delay (E2ED) metrics. The proposed scheme is compared against two baseline schemes including Multipath Solution with Link and Node Disjoint (MSLND) and Multimedia Multi-metric Map-aware Routing Protocol (3MRP) with DSW (3MRP+DSW). The comparative performance assessment results justify the benefit of the proposed scheme based on various video streaming related metrics. Full article
(This article belongs to the Special Issue Vehicular Networks and Communications, Volume II)
Show Figures

Figure 1

18 pages, 2302 KB  
Article
Video Streaming in Urban Vehicular Environments: Junction-Aware Multipath Approach
by Ahmed Aliyu, Hesham El-Sayed, Abdul Hanan Abdullah, Intyaz Alam, Jun Li and Mukesh Prasad
Electronics 2019, 8(11), 1239; https://doi.org/10.3390/electronics8111239 - 30 Oct 2019
Cited by 6 | Viewed by 3224
Abstract
In multipath video streaming transmission, the selection of the best vehicle for video packet forwarding considering the junction area is a challenging task due to the several diversions in the junction area. The vehicles in the junction area change direction based on the [...] Read more.
In multipath video streaming transmission, the selection of the best vehicle for video packet forwarding considering the junction area is a challenging task due to the several diversions in the junction area. The vehicles in the junction area change direction based on the different diversions, which lead to video packet drop. In the existing works, the explicit consideration of different positions in the junction areas has not been considered for forwarding vehicle selection. To address the aforementioned challenges, a Junction-Aware vehicle selection for Multipath Video Streaming (JA-MVS) scheme has been proposed. The JA-MVS scheme considers three different cases in the junction area including the vehicle after the junction, before the junction and inside the junction area, with an evaluation of the vehicle signal strength based on the signal to interference plus noise ratio (SINR), which is based on the multipath data forwarding concept using greedy-based geographic routing. The performance of the proposed scheme is evaluated based on the Packet Loss Ratio (PLR), Structural Similarity Index (SSIM) and End-to-End Delay (E2ED) metrics. The JA-MVS is compared against two baseline schemes, Junction-Based Multipath Source Routing (JMSR) and the Adaptive Multipath geographic routing for Video Transmission (AMVT), in urban Vehicular Ad-Hoc Networks (VANETs). Full article
(This article belongs to the Special Issue Vehicular Networks and Communications)
Show Figures

Figure 1

34 pages, 2897 KB  
Article
DOW-PR DOlphin and Whale Pods Routing Protocol for Underwater Wireless Sensor Networks (UWSNs)
by Zahid Wadud, Khadem Ullah, Sajjad Hussain, Xiaodong Yang and Abdul Baseer Qazi
Sensors 2018, 18(5), 1529; https://doi.org/10.3390/s18051529 - 12 May 2018
Cited by 18 | Viewed by 6928
Abstract
Underwater Wireless Sensor Networks (UWSNs) have intrinsic challenges that include long propagation delays, high mobility of sensor nodes due to water currents, Doppler spread, delay variance, multipath, attenuation and geometric spreading. The existing Weighting Depth and Forwarding Area Division Depth Based Routing (WDFAD-DBR) [...] Read more.
Underwater Wireless Sensor Networks (UWSNs) have intrinsic challenges that include long propagation delays, high mobility of sensor nodes due to water currents, Doppler spread, delay variance, multipath, attenuation and geometric spreading. The existing Weighting Depth and Forwarding Area Division Depth Based Routing (WDFAD-DBR) protocol considers the weighting depth of the two hops in order to select the next Potential Forwarding Node (PFN). To improve the performance of WDFAD-DBR, we propose DOlphin and Whale Pod Routing protocol (DOW-PR). In this scheme, we divide the transmission range into a number of transmission power levels and at the same time select the next PFNs from forwarding and suppressed zones. In contrast to WDFAD-DBR, our scheme not only considers the packet upward advancement, but also takes into account the number of suppressed nodes and number of PFNs at the first and second hops. Consequently, reasonable energy reduction is observed while receiving and transmitting packets. Moreover, our scheme also considers the hops count of the PFNs from the sink. In the absence of PFNs, the proposed scheme will select the node from the suppressed region for broadcasting and thus ensures minimum loss of data. Besides this, we also propose another routing scheme (whale pod) in which multiple sinks are placed at water surface, but one sink is embedded inside the water and is physically connected with the surface sink through high bandwidth connection. Simulation results show that the proposed scheme has high Packet Delivery Ratio (PDR), low energy tax, reduced Accumulated Propagation Distance (APD) and increased the network lifetime. Full article
(This article belongs to the Section Sensor Networks)
Show Figures

Figure 1

21 pages, 5659 KB  
Article
An Efficient Framework Model for Optimizing Routing Performance in VANETs
by Nori M. Al-Kharasani, Zuriati Ahmad Zulkarnain, Shamala Subramaniam and Zurina Mohd Hanapi
Sensors 2018, 18(2), 597; https://doi.org/10.3390/s18020597 - 15 Feb 2018
Cited by 30 | Viewed by 4509
Abstract
Routing in Vehicular Ad hoc Networks (VANET) is a bit complicated because of the nature of the high dynamic mobility. The efficiency of routing protocol is influenced by a number of factors such as network density, bandwidth constraints, traffic load, and mobility patterns [...] Read more.
Routing in Vehicular Ad hoc Networks (VANET) is a bit complicated because of the nature of the high dynamic mobility. The efficiency of routing protocol is influenced by a number of factors such as network density, bandwidth constraints, traffic load, and mobility patterns resulting in frequency changes in network topology. Therefore, Quality of Service (QoS) is strongly needed to enhance the capability of the routing protocol and improve the overall network performance. In this paper, we introduce a statistical framework model to address the problem of optimizing routing configuration parameters in Vehicle-to-Vehicle (V2V) communication. Our framework solution is based on the utilization of the network resources to further reflect the current state of the network and to balance the trade-off between frequent changes in network topology and the QoS requirements. It consists of three stages: simulation network stage used to execute different urban scenarios, the function stage used as a competitive approach to aggregate the weighted cost of the factors in a single value, and optimization stage used to evaluate the communication cost and to obtain the optimal configuration based on the competitive cost. The simulation results show significant performance improvement in terms of the Packet Delivery Ratio (PDR), Normalized Routing Load (NRL), Packet loss (PL), and End-to-End Delay (E2ED). Full article
(This article belongs to the Section Sensor Networks)
Show Figures

Figure 1

30 pages, 764 KB  
Article
An Energy Scaled and Expanded Vector-Based Forwarding Scheme for Industrial Underwater Acoustic Sensor Networks with Sink Mobility
by Zahid Wadud, Sajjad Hussain, Nadeem Javaid, Safdar Hussain Bouk, Nabil Alrajeh, Mohamad Souheil Alabed and Nadra Guizani
Sensors 2017, 17(10), 2251; https://doi.org/10.3390/s17102251 - 30 Sep 2017
Cited by 13 | Viewed by 6487
Abstract
Industrial Underwater Acoustic Sensor Networks (IUASNs) come with intrinsic challenges like long propagation delay, small bandwidth, large energy consumption, three-dimensional deployment, and high deployment and battery replacement cost. Any routing strategy proposed for IUASN must take into account these constraints. The vector based [...] Read more.
Industrial Underwater Acoustic Sensor Networks (IUASNs) come with intrinsic challenges like long propagation delay, small bandwidth, large energy consumption, three-dimensional deployment, and high deployment and battery replacement cost. Any routing strategy proposed for IUASN must take into account these constraints. The vector based forwarding schemes in literature forward data packets to sink using holding time and location information of the sender, forwarder, and sink nodes. Holding time suppresses data broadcasts; however, it fails to keep energy and delay fairness in the network. To achieve this, we propose an Energy Scaled and Expanded Vector-Based Forwarding (ESEVBF) scheme. ESEVBF uses the residual energy of the node to scale and vector pipeline distance ratio to expand the holding time. Resulting scaled and expanded holding time of all forwarding nodes has a significant difference to avoid multiple forwarding, which reduces energy consumption and energy balancing in the network. If a node has a minimum holding time among its neighbors, it shrinks the holding time and quickly forwards the data packets upstream. The performance of ESEVBF is analyzed through in network scenario with and without node mobility to ensure its effectiveness. Simulation results show that ESEVBF has low energy consumption, reduces forwarded data copies, and less end-to-end delay. Full article
(This article belongs to the Collection Smart Industrial Wireless Sensor Networks)
Show Figures

Figure 1

22 pages, 503 KB  
Article
Lifetime Maximization via Hole Alleviation in IoT Enabling Heterogeneous Wireless Sensor Networks
by Zahid Wadud, Nadeem Javaid, Muhammad Awais Khan, Nabil Alrajeh, Mohamad Souheil Alabed and Nadra Guizani
Sensors 2017, 17(7), 1677; https://doi.org/10.3390/s17071677 - 21 Jul 2017
Cited by 17 | Viewed by 6778
Abstract
In Internet of Things (IoT) enabled Wireless Sensor Networks (WSNs), there are two major factors which degrade the performance of the network. One is the void hole which occurs in a particular region due to unavailability of forwarder nodes. The other is the [...] Read more.
In Internet of Things (IoT) enabled Wireless Sensor Networks (WSNs), there are two major factors which degrade the performance of the network. One is the void hole which occurs in a particular region due to unavailability of forwarder nodes. The other is the presence of energy hole which occurs due to imbalanced data traffic load on intermediate nodes. Therefore, an optimum transmission strategy is required to maximize the network lifespan via hole alleviation. In this regard, we propose a heterogeneous network solution that is capable to balance energy dissipation among network nodes. In addition, the divide and conquer approach is exploited to evenly distribute number of transmissions over various network areas. An efficient forwarder node selection is performed to alleviate coverage and energy holes. Linear optimization is performed to validate the effectiveness of our proposed work in term of energy minimization. Furthermore, simulations are conducted to show that our claims are well grounded. Results show the superiority of our work as compared to the baseline scheme in terms of energy consumption and network lifetime. Full article
(This article belongs to the Special Issue Sensor Networks for Collaborative and Secure Internet of Things)
Show Figures

Figure 1

Back to TopTop