Sign in to use this feature.

Years

Between: -

Subjects

remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline

Journals

Article Types

Countries / Regions

Search Results (39)

Search Parameters:
Keywords = mean packet throughput

Order results
Result details
Results per page
Select all
Export citation of selected articles as:
23 pages, 3843 KB  
Article
Leveraging Reconfigurable Massive MIMO Antenna Arrays for Enhanced Wireless Connectivity in Biomedical IoT Applications
by Sunday Enahoro, Sunday Cookey Ekpo, Yasir Al-Yasir and Mfonobong Uko
Sensors 2025, 25(18), 5709; https://doi.org/10.3390/s25185709 - 12 Sep 2025
Viewed by 569
Abstract
The increasing demand for real-time, energy-efficient, and interference-resilient communication in smart healthcare environments has intensified interest in Biomedical Internet of Things (Bio-IoT) systems. However, ensuring reliable wireless connectivity for wearable and implantable biomedical sensors remains a challenge due to mobility, latency sensitivity, power [...] Read more.
The increasing demand for real-time, energy-efficient, and interference-resilient communication in smart healthcare environments has intensified interest in Biomedical Internet of Things (Bio-IoT) systems. However, ensuring reliable wireless connectivity for wearable and implantable biomedical sensors remains a challenge due to mobility, latency sensitivity, power constraints, and multi-user interference. This paper addresses these issues by proposing a reconfigurable massive multiple-input multiple-output (MIMO) antenna architecture, incorporating hybrid analog–digital beamforming and adaptive signal processing. The methodology combines conventional algorithms—such as Least Mean Square (LMS), Zero-Forcing (ZF), and Minimum Variance Distortionless Response (MVDR)—with a novel mobility-aware beamforming scheme. System-level simulations under realistic channel models (Rayleigh, Rician, 3GPP UMa) evaluate signal-to-interference-plus-noise ratio (SINR), bit error rate (BER), energy efficiency, outage probability, and fairness index across varying user loads and mobility scenarios. Results show that the proposed hybrid beamforming system consistently outperforms benchmarks, achieving up to 35% higher throughput, a 65% reduction in packet drop rate, and sub-10 ms latency even under high-mobility conditions. Beam pattern analysis confirms robust nulling of interference and dynamic lobe steering. This architecture is well-suited for next-generation Bio-IoT deployments in smart hospitals, enabling secure, adaptive, and power-aware connectivity for critical healthcare monitoring applications. Full article
(This article belongs to the Special Issue Challenges and Future Trends in Antenna Technology)
Show Figures

Figure 1

26 pages, 6053 KB  
Communication
Hybrid Reliable Clustering Algorithm with Heterogeneous Traffic Routing for Wireless Sensor Networks
by Sreenu Naik Bhukya and Chandra Sekhara Rao Annavarapu
Sensors 2025, 25(3), 864; https://doi.org/10.3390/s25030864 - 31 Jan 2025
Cited by 2 | Viewed by 1374
Abstract
Wireless sensor networks (WSNs) are vulnerable to several challenges. Congestion control, the utilization of trust to ensure security, and the incorporation of clustering schemes demand much attention. Algorithms designed to deal with congestion control fail to ensure security and address challenges faced due [...] Read more.
Wireless sensor networks (WSNs) are vulnerable to several challenges. Congestion control, the utilization of trust to ensure security, and the incorporation of clustering schemes demand much attention. Algorithms designed to deal with congestion control fail to ensure security and address challenges faced due to congestion in the network. To resolve this issue, a Hybrid Trust-based Congestion-aware Cluster Routing (HTCCR) protocol is proposed to effectively detect attacker nodes and reduce congestion via optimal routing through clustering. In the proposed HTCCR protocol, node probability is determined based on the trust factor, queue congestion status, residual energy (RE), and distance from the mobile base station (BS) by using hybrid K-Harmonic Means (KHM) and the Enhanced Gravitational Search Algorithm (EGSA). Sensor nodes select cluster heads (CHs) with better fitness values and transmit data through them. The CH forwards data to a mobile sink once the sink comes into the range of CH. Priority-based data delivery is incorporated to effectively control packet forwarding based on priority level, thus decreasing congestion. It is evident that the propounded HTCCR protocol offers better performance in contrast to the benchmarked TBSEER, CTRF, and TAGA based on the average delay, packet delivery ratio (PDR), throughput, detection ratio, packet loss ratio (PLR), overheads, and energy through simulations. The proposed HTCCR protocol involves 2.5, 2.3, and 1.7 times less delay; an 18.1%, 12.5%, and 5.5% better detection ratio; 2.9, 2.6, and 1.8 times less energy; a 2.2, 1.9, and 1.5 times lower PLR; a 14.5%, 10.5%, and 5.2% better PDR; a 30.7%, 28.5%, and 18.4% better throughput; and 2.27, 1.91, and 1.66 times lower routing overheads in contrast to the TBSEER, CTRF, and TAGA protocols, respectively. The HTCCR protocol involves 4.1% less delay for the ‘C1’ and ‘C2’ RT packets, and the average throughput of RT is 10.4% better when compared with NRT. Full article
Show Figures

Figure 1

20 pages, 3556 KB  
Article
Enhancing Real-Time Video Streaming Quality via MPT-GRE Multipath Network
by Naseer Al-Imareen and Gábor Lencse
Electronics 2025, 14(3), 497; https://doi.org/10.3390/electronics14030497 - 25 Jan 2025
Cited by 3 | Viewed by 1495
Abstract
The demand for real-time 4K video streaming has introduced technical challenges due to the high bandwidth, low latency, and minimal jitter required for high-quality user experience. Traditional single-path networks often fail to meet these requirements, especially under network congestion and packet loss conditions, [...] Read more.
The demand for real-time 4K video streaming has introduced technical challenges due to the high bandwidth, low latency, and minimal jitter required for high-quality user experience. Traditional single-path networks often fail to meet these requirements, especially under network congestion and packet loss conditions, which degrade video quality and disrupt streaming stability. This study evaluates Multipath tunnel- Generic Routing Encapsulation (MPT-GRE), a technology designed to address these challenges by enabling simultaneous data transmission across multiple network paths. By aggregating bandwidth and adapting dynamically to network conditions, MPT-GRE enhances resilience, maintains quality during network disruptions, and offers throughput nearly equal to the sum of its physical paths’ throughput. This feature ensures that even if one path fails, the technology seamlessly continues streaming through the remaining path, significantly reducing interruptions. We measured key video quality metrics to assess MPT-GRE’s performance: Structural Similarity Index Measure (SSIM), Mean Squared Error (MSE), and Peak Signal-to-Noise Ratio (PSNR). Our results confirm that the MPT-GRE tunnel effectively improves SSIM, PSNR, and reduces MSE compared to single-path streaming, offering a more stable, high-quality viewing experience. Our results indicate that analyzing the SSIM, MSE, and PSNR values for 4K video streaming using the MPT tunnel demonstrates a significant performance improvement compared to a single path. The improvement percentages of the SSIM and PSNR values for the MPT tunnel are (29.05% and 29.04%) higher than that of the single path, while MSE is reduced by 81.17% compared to the single path. Full article
Show Figures

Figure 1

32 pages, 12908 KB  
Article
Energy-Efficient and Trust-Based Autonomous Underwater Vehicle Scheme for 6G-Enabled Internet of Underwater Things
by Altaf Hussain, Shuaiyong Li, Tariq Hussain, Razaz Waheeb Attar, Ahmed Alhomoud, Reem Alsagri and Khalid Zaman
Sensors 2025, 25(1), 286; https://doi.org/10.3390/s25010286 - 6 Jan 2025
Cited by 3 | Viewed by 2330
Abstract
This paper introduces a novel energy-efficient lightweight, void hole avoidance, localization, and trust-based scheme, termed as Energy-Efficient and Trust-based Autonomous Underwater Vehicle (EETAUV) protocol designed for 6G-enabled underwater acoustic sensor networks (UASNs). The proposed scheme addresses key challenges in UASNs, such as energy [...] Read more.
This paper introduces a novel energy-efficient lightweight, void hole avoidance, localization, and trust-based scheme, termed as Energy-Efficient and Trust-based Autonomous Underwater Vehicle (EETAUV) protocol designed for 6G-enabled underwater acoustic sensor networks (UASNs). The proposed scheme addresses key challenges in UASNs, such as energy consumption, network stability, and data security. It integrates a trust management framework that enhances communication security through node identification and verification mechanisms utilizing normal and phantom nodes. Furthermore, a 6G communication module is deployed to reduce network delay and enhance packet delivery, contributing to more efficient data transmission. Leveraging Autonomous Underwater Vehicles (AUVs), the EETAUV protocol offers a lightweight approach for node discovery, identification, and verification while ensuring a high data transmission rate through a risk-aware strategy including at low computational cost. The protocol’s performance is evaluated through extensive simulations and compared against state-of-the-art methods across various metrics, including network lifetime, throughput, residual energy, packet delivery ratio, mean square error, routing overhead, path loss, network delay, trust, distance, velocity, Computational Cost of Routing, and data security. The results demonstrate the superior cumulative performance of the proposed EETAUV scheme, making it a robust solution for secure, efficient, and reliable communication in UASNs. Full article
(This article belongs to the Section Internet of Things)
Show Figures

Figure 1

18 pages, 4142 KB  
Article
Improved Cell Allocation Strategies Using K-Means Clustering in Congested 6TiSCH Environments
by Fransiskus Xaverius Kevin Koesnadi and Sang-Hwa Chung
Sensors 2024, 24(17), 5608; https://doi.org/10.3390/s24175608 - 29 Aug 2024
Cited by 3 | Viewed by 1886
Abstract
The 6TiSCH protocol (IEEE 802.15.4e) is crucial for the Industrial Internet of Things (IIoT), utilizing a time-slotted channel hopping (TSCH) mode based on node distribution. In this study, we propose an innovative cell allocation strategy based on node position clustering using the K-means [...] Read more.
The 6TiSCH protocol (IEEE 802.15.4e) is crucial for the Industrial Internet of Things (IIoT), utilizing a time-slotted channel hopping (TSCH) mode based on node distribution. In this study, we propose an innovative cell allocation strategy based on node position clustering using the K-means algorithm, specifically designed to address congestion and optimize resource distribution in the 6TiSCH network. Our mechanism effectively groups nodes into clusters, allowing for dynamic adjustment of cell capacities in congested areas by analyzing traffic patterns and the spatial distribution of nodes. This clustering approach enhances the efficiency of slot frame utilization and minimizes communication delays by reducing interference and improving routing stability. The proposed strategy leverages the clustering results to improve cell usage efficiency and reduce communication latency between nodes. By tailoring cell allocation to the specific traffic needs of each cluster, we significantly reduce packet loss, manage congestion more effectively, and enhance data transmission reliability. We evaluated the clustering method using the K-means algorithm through experiments with the 6TiSCH simulator. Additionally, we considered using objective functions in Routing Protocol for Low-Power and Lossy Networks (RPL), such as OF0 and MRHOF, to assess clustering results and their impact on throughput and packet delivery. Our method resulted in significantly improved average performance metrics. Under the OF0 routing protocol, we achieved a 30.01% latency reduction, a 15.95% faster joining time, an 8% higher packet delivery ratio, and a 13.82% throughput increase. Similarly, we observed a 12.34% improvement in packet delivery ratio, 21.06% latency reduction, 12.68% faster joining time, and 25.97% higher throughput speed with the MRHOF routing protocol. These findings highlight the effectiveness of the improved cell allocation strategy in congested 6TiSCH environments, offering a better solution for enhancing network performance in IIoT applications. Full article
(This article belongs to the Section Sensor Networks)
Show Figures

Figure 1

20 pages, 1638 KB  
Article
Modeling and Performance Analysis of LBT-Based RF-Powered NR-U Network for IoT
by Varada Potnis Kulkarni and Radhika D. Joshi
Sensors 2024, 24(16), 5369; https://doi.org/10.3390/s24165369 - 20 Aug 2024
Cited by 2 | Viewed by 1100
Abstract
Energy harvesting combined with spectrum sharing offers a promising solution to the growing demand for spectrum while keeping energy costs low. New Radio Unlicensed (NR-U) technology enables telecom operators to utilize unlicensed spectrum in addition to the licensed spectrum already in use. Along [...] Read more.
Energy harvesting combined with spectrum sharing offers a promising solution to the growing demand for spectrum while keeping energy costs low. New Radio Unlicensed (NR-U) technology enables telecom operators to utilize unlicensed spectrum in addition to the licensed spectrum already in use. Along with this, the energy demands for the Internet of Things (IoT) can be met through energy harvesting. In this regard, the ubiquity and ease of implementation make the RF-powered NR-U network a sustainable solution for cellular IoT. Using a Markov chain, we model the NR-U network with nodes powered by the base station (BS). We derive closed-form expressions for the normalized saturated throughput of nodes and the BS, along with the mean packet delay at the node. Additionally, we compute the transmit outage probability of the node. These quality of service (QoS) parameters are analyzed for different values of congestion window size, TXOP parameter, maximum energy level, and energy threshold of the node. Additionally, the effect of network density on collision, transmission, and energy harvesting probabilities is observed. We validate our model through simulations. Full article
(This article belongs to the Special Issue RF Energy Harvesting and Wireless Power Transfer for IoT)
Show Figures

Figure 1

19 pages, 728 KB  
Article
On the Interplay between Deadline-Constrained Traffic and the Number of Allowed Retransmissions in Random Access Networks
by Nikolaos Nomikos, Themistoklis Charalambous, Risto Wichman, Yvonne-Anne Pignolet and Nikolaos Pappas
Entropy 2024, 26(8), 655; https://doi.org/10.3390/e26080655 - 30 Jul 2024
Viewed by 1649
Abstract
In this paper, a network comprising wireless devices equipped with buffers transmitting deadline-constrained data packets over a slotted-ALOHA random-access channel is studied. Although communication protocols facilitating retransmissions increase reliability, a packet awaiting transmission from the queue experiences delays. Thus, packets with time constraints [...] Read more.
In this paper, a network comprising wireless devices equipped with buffers transmitting deadline-constrained data packets over a slotted-ALOHA random-access channel is studied. Although communication protocols facilitating retransmissions increase reliability, a packet awaiting transmission from the queue experiences delays. Thus, packets with time constraints might be dropped before being successfully transmitted, while at the same time causing the queue size of the buffer to increase. To understand the trade-off between reliability and delays that might lead to packet drops due to deadline-constrained bursty traffic with retransmissions, the scenario of a wireless network utilizing a slotted-ALOHA random-access channel is investigated. The main focus is to reveal the trade-off between the number of retransmissions and the packet deadline as a function of the arrival rate. Towards this end, analysis of the system is performed by means of discrete-time Markov chains. Two scenarios are studied: (i) the collision channel model (in which a receiver can decode only when a single packet is transmitted), and (ii) the case for which receivers have multi-packet reception capabilities. A performance evaluation for a user with different transmit probabilities and number of retransmissions is conducted. We are able to determine numerically the optimal probability of transmissions and the number of retransmissions, given the packet arrival rate and the packet deadline. Furthermore, we highlight the impact of transmit probability and the number of retransmissions on the average drop rate and throughput. Full article
(This article belongs to the Special Issue Information Theory and Coding for Wireless Communications II)
Show Figures

Figure 1

25 pages, 5345 KB  
Article
Energy-Efficient and Highly Reliable Geographic Routing Based on Link Detection and Node Collaborative Scheduling in WSN
by Minghua Wang, Ziyan Zhu, Yan Wang and Shujing Xie
Sensors 2024, 24(11), 3263; https://doi.org/10.3390/s24113263 - 21 May 2024
Cited by 2 | Viewed by 1886
Abstract
Energy efficiency and data reliability are important indicators to measure network performance in wireless sensor networks. In existing research schemes of routing protocols, the impact of node coverage on the network is often ignored, and the possibility that multiple sensor nodes may sense [...] Read more.
Energy efficiency and data reliability are important indicators to measure network performance in wireless sensor networks. In existing research schemes of routing protocols, the impact of node coverage on the network is often ignored, and the possibility that multiple sensor nodes may sense the same spatial point is not taken into account, which results in a waste of network resources, especially in large-scale networks. Apart from that, the blindness of geographic routing in data transmission has been troubling researchers, which means that the nodes are unable to determine the validity of data transmission. In order to solve the above problems, this paper innovatively combines the routing protocol with the coverage control technique and proposes the node collaborative scheduling algorithm, which fully considers the correlation characteristics between sensor nodes to reduce the number of active working nodes and the number of packets generated, to further reduce energy consumption and network delay and improve packet delivery rate. In order to solve the problem of unreliability of geographic routing, a highly reliable link detection and repair scheme is proposed to check the communication link status and repair the invalid link, which can greatly improve the packet delivery rate and throughput of the network, and has good robustness. A large number of experiments demonstrate the effectiveness and superiority of our proposed scheme and algorithm. Full article
(This article belongs to the Section Sensor Networks)
Show Figures

Figure 1

22 pages, 1165 KB  
Article
A Security-Enhanced Energy Conservation with Enhanced Random Forest Classifier for Low Execution Time Framework (S-2EC-ERF) for Wireless Sensor Networks
by Manar Khalid Ibraheem Ibraheem, Abdullah Ali Jawad Al-Abadi, Mbarka Belhaj Mohamed and Ahmed Fakhfakh
Appl. Sci. 2024, 14(6), 2244; https://doi.org/10.3390/app14062244 - 7 Mar 2024
Cited by 4 | Viewed by 1835
Abstract
Wireless sensor networks (WSNs) play a pivotal role in diverse applications such as environmental monitoring, industrial automation, healthcare, and smart cities. The motivation behind the development of WSNs stems from their impact in providing real-time data on various environmental parameters. The challenge for [...] Read more.
Wireless sensor networks (WSNs) play a pivotal role in diverse applications such as environmental monitoring, industrial automation, healthcare, and smart cities. The motivation behind the development of WSNs stems from their impact in providing real-time data on various environmental parameters. The challenge for WSNs is to achieve strong security and efficient energy saving together. Traditional methods sought to find solutions either through security or energy. In response, this study proposed a secure and energy-efficient framework for enhancing security measures in WSNs while minimizing the impact on energy resources by using the Enhanced Consumed Energy Leach (ECP-LEACH) protocol and the Enhanced Random Forest Classifier for Low Execution Time (ERF-LET) algorithm for attack detection named Security-Enhanced Energy Conservation with ERF-LET (S-2EC-ERF). The integration of the detection algorithm at the node level played a pivotal role in fortifying the security posture of individual nodes by detecting and mitigating potential security threats. Leveraging a comprehensive dataset obtained from NS3 simulations, the ERF-LET algorithm demonstrated its proficiency in differentiating between normal and attack packets, thereby laying a strong foundation for subsequent evaluations, where it achieved an accuracy of 98.193%. The proposed methodology was further validated through real-time simulations conducted on the NS3. The results demonstrated the superiority of the proposed S-2EC-ERF in terms of the packet delivery ratio (PDR), average throughput, end-to-end delay, and mean energy consumption compared to the Security-Enhanced Energy Conservation with Logistic Regression (S-2EC-LR), Security-Enhanced Energy Conservation with Decision Tree (S-2EC-DT), and Security-Enhanced Energy Conservation with AdaBoost (S-2EC-Ada) algorithms. Full article
Show Figures

Figure 1

20 pages, 2363 KB  
Article
Research on Computing Resource Measurement and Routing Methods in Software Defined Computing First Network
by Xiaomin Gong, Shuangyin Ren, Chunjiang Wang and Jingchao Wang
Sensors 2024, 24(4), 1086; https://doi.org/10.3390/s24041086 - 7 Feb 2024
Cited by 4 | Viewed by 2199
Abstract
Computing resource measurement and computing routing are essential technologies in the computing first network (CFN), serving as its foundational elements. This paper introduces a Software Defined Computing First Network (SD-CFN) architecture. Building upon this framework, a Dynamic-Static Integrated Computing Resource Measurement Mechanism (DCRMM) [...] Read more.
Computing resource measurement and computing routing are essential technologies in the computing first network (CFN), serving as its foundational elements. This paper introduces a Software Defined Computing First Network (SD-CFN) architecture. Building upon this framework, a Dynamic-Static Integrated Computing Resource Measurement Mechanism (DCRMM) is proposed, incorporating methods such as the entropy weight method and K-Means clustering. The DCRMM algorithm outperforms the Maximum-closest Static Algorithm (MSA) and Maximum Closest Dynamic Algorithm (MDA) in terms of node stability, node utilization, and node matching accuracy. Additionally, a Reinforcement Learning and Software Defined Computing First Networking Routing (RSCR) algorithm is presented as a software-defined computing routing solution within the SD-CFN. RSCR introduces a knowledge plane responsible for computing routing calculations. It comprehensively considers factors such as link latency, available bandwidth, and packet loss rate. Simulation experiments conducted on the GÉANT topology demonstrate that RSCR outperforms the OSPF algorithm in terms of link latency, packet loss rate, and throughput. DCRMM and RSCR offer innovative solutions for computing resource measurement and computing routing in computing first networks. Full article
(This article belongs to the Special Issue Future Wireless Communication Networks (Volume II))
Show Figures

Figure 1

16 pages, 626 KB  
Article
Enhanced Random Forest Classifier with K-Means Clustering (ERF-KMC) for Detecting and Preventing Distributed-Denial-of-Service and Man-in-the-Middle Attacks in Internet-of-Medical-Things Networks
by Abdullah Ali Jawad Al-Abadi, Mbarka Belhaj Mohamed and Ahmed Fakhfakh
Computers 2023, 12(12), 262; https://doi.org/10.3390/computers12120262 - 17 Dec 2023
Cited by 15 | Viewed by 4272
Abstract
In recent years, the combination of wireless body sensor networks (WBSNs) and the Internet ofc Medical Things (IoMT) marked a transformative era in healthcare technology. This combination allowed for the smooth communication between medical devices that enabled the real-time monitoring of patient’s vital [...] Read more.
In recent years, the combination of wireless body sensor networks (WBSNs) and the Internet ofc Medical Things (IoMT) marked a transformative era in healthcare technology. This combination allowed for the smooth communication between medical devices that enabled the real-time monitoring of patient’s vital signs and health parameters. However, the increased connectivity also introduced security challenges, particularly as they related to the presence of attack nodes. This paper proposed a unique solution, an enhanced random forest classifier with a K-means clustering (ERF-KMC) algorithm, in response to these challenges. The proposed ERF-KMC algorithm combined the accuracy of the enhanced random forest classifier for achieving the best execution time (ERF-ABE) with the clustering capabilities of K-means. This model played a dual role. Initially, the security in IoMT networks was enhanced through the detection of attack messages using ERF-ABE, followed by the classification of attack types, specifically distinguishing between man-in-the-middle (MITM) and distributed denial of service (DDoS) using K-means. This approach facilitated the precise categorization of attacks, enabling the ERF-KMC algorithm to employ appropriate methods for blocking these attack messages effectively. Subsequently, this approach contributed to the improvement of network performance metrics that significantly deteriorated during the attack, including the packet loss rate (PLR), end-to-end delay (E2ED), and throughput. This was achieved through the detection of attack nodes and the subsequent prevention of their entry into the IoMT networks, thereby mitigating potential disruptions and enhancing the overall network efficiency. This study conducted simulations using the Python programming language to assess the performance of the ERF-KMC algorithm in the realm of IoMT, specifically focusing on network performance metrics. In comparison with other algorithms, the ERF-KMC algorithm demonstrated superior efficacy, showcasing its heightened capability in terms of optimizing IoMT network performance as compared to other common algorithms in network security, such as AdaBoost, CatBoost, and random forest. The importance of the ERF-KMC algorithm lies in its security for IoMT networks, as it provides a high-security approach for identifying and preventing MITM and DDoS attacks. Furthermore, improving the network performance metrics to ensure transmitted medical data are accurate and efficient is vital for real-time patient monitoring. This study takes the next step towards enhancing the reliability and security of IoMT systems and advancing the future of connected healthcare technologies. Full article
Show Figures

Figure 1

25 pages, 46376 KB  
Article
High Value of Information Guided Data Enhancement for Heterogeneous Underwater Wireless Sensor Networks
by Yun Li, Jie Bai, Yan Chen, Xingyu Lu and Peiguang Jing
J. Mar. Sci. Eng. 2023, 11(9), 1654; https://doi.org/10.3390/jmse11091654 - 24 Aug 2023
Cited by 2 | Viewed by 1493
Abstract
Ensuring the freshness of high Value of Information (VoI) data has a significant practice meaning for marine observations and emergencies. The traditional forward method with an auv-aid is used to ensure the freshness of high VoI data. However, the methods suffer from two [...] Read more.
Ensuring the freshness of high Value of Information (VoI) data has a significant practice meaning for marine observations and emergencies. The traditional forward method with an auv-aid is used to ensure the freshness of high VoI data. However, the methods suffer from two issues: an insufficient high VoI data throughput and random forwarding for cluster heads (CHs). The AUV (Autonomous Underwater Vehicle) with limited energy cannot meet the demand for the random generation of high VoI data. Low VoI data packets compete with high VoI data packets for channels, resulting in an insufficient high VoI data throughput and a low freshness. To address the above issues, we propose the Data Access Channel Scheme based on High Value of Information (DACS-HVOI), which is suitable for prioritizing the transmission packets with a high VoI. First, according to the level of VoI, the packets are divided into K classes, and the packets that are collected and forwarded by the AUV are defined as the highest K+1 class. Second, based on prior knowledge in the network, a Markov chain algorithm-based method is employed to predict which nodes should preferentially use the channel, to avoid conflict between a low and high VoI. Third, based on the stochastic fluid theory, a multilevel queueing system for CHs are constructed to avoid random forwarding. Last, compared with state-of-art protocols, experimental simulation shows that the proposed scheme has a low latency and high network throughput, while improving the throughput of high-VoI packets and ensuring the priority transmission of high-VoI packets. Full article
(This article belongs to the Special Issue Innovative Marine Environment Monitoring, Management and Assessment)
Show Figures

Figure 1

13 pages, 3159 KB  
Article
A Multi-Path MAC Scheduling Scheme for Multi-Channel Wireless Sensor Networks
by Fan Zhang and Gangqiang Yang
Entropy 2023, 25(8), 1197; https://doi.org/10.3390/e25081197 - 11 Aug 2023
Viewed by 1490
Abstract
Designing reasonable MAC scheduling strategies is an important means to ensure transmission quality in wireless sensor networks (WSNs). When there exist multiple available routes from the source to the destination, it is necessary to combine a data traffic allocation mechanism and design a [...] Read more.
Designing reasonable MAC scheduling strategies is an important means to ensure transmission quality in wireless sensor networks (WSNs). When there exist multiple available routes from the source to the destination, it is necessary to combine a data traffic allocation mechanism and design a multi-path MAC scheduling scheme in order to ensure QoS. This paper develops a multi-path resource allocation method for multi-channel wireless sensor networks, which uses random-access technology to complete MAC scheduling and selects the transmission path for each packet according to the probability. Through theoretical analysis and simulation experiments, it can be found that the proposed strategy can provide a reliable throughput capacity region. Meanwhile, due to the use of random-access technology, the computational complexity of the proposed algorithm can be independent of the number of links and channels. Full article
(This article belongs to the Special Issue Progress and Research Challenges to Catalyze B5G and 6G)
Show Figures

Figure 1

17 pages, 988 KB  
Article
An Adaptive Symmetrical Load Balancing Scheme for Next Generation Wireless Networks
by Sohaib Manzoor, Farrukh Mazhar, Abdullah Binaris, Moeen Uddin Hassan, Faria Rasab and Heba G. Mohamed
Symmetry 2023, 15(7), 1316; https://doi.org/10.3390/sym15071316 - 27 Jun 2023
Cited by 4 | Viewed by 1975
Abstract
In dense Wi-Fi networks, achieving load balancing is critical to optimize network utilization and provide equitable network consumption among the users. Traditional Wi-Fi networks have issues in attaining effective load balancing. Software-Defined Networking (SDN) has presented a viable solution by isolating the data [...] Read more.
In dense Wi-Fi networks, achieving load balancing is critical to optimize network utilization and provide equitable network consumption among the users. Traditional Wi-Fi networks have issues in attaining effective load balancing. Software-Defined Networking (SDN) has presented a viable solution by isolating the data plane and control plane, enabling more agile and cost-effective networks. In this paper we put forward an Adaptive Symmetrical Load Balancing (ASLB) scheme to ensure fairness of load symmetry in Software Defined Wi-Fi Networks (SD-Wi-Fi), while also optimizing the flows transition process using an Analytical Hierarchal Process (AHP). User activity is monitored by access points (APs), which operate under OpenFlow standards. Three essential features, packet volume, packet category and delay hindrance, are used for flow assignment to various controllers. The controllers are arranged in two tiers, universal and regional controllers. The universal controller (UC) handles the workload statistics of regional controllers (RC) in the form of clusters. Extensive simulations using OMNeT++ simulator are performed. The performance parameters taken into consideration are throughput, delay, packet loss rate, network transition count and workload distribution. Our findings demonstrate that the ASLB technique effectively optimizes the network utilization and ensures equitable network consumption among the end users. The proposed scheme outperforms the Mean Probe Delay scheme (MPD), Channel Measurement-based Access Selection scheme (CMAS), Received Signal Strength Indicator-based scheme (RSSI) and Distributed Antenna Selection scheme (DASA), being 40% higher in throughput and 25% lower in delay. Full article
Show Figures

Figure 1

19 pages, 11400 KB  
Article
Joint Packet Length and Power Optimization for Covert Short-Packet D2D Communications
by Xiaolong Zhang, Jie Liu and Yuzhen Huang
Electronics 2023, 12(13), 2822; https://doi.org/10.3390/electronics12132822 - 26 Jun 2023
Viewed by 1660
Abstract
This paper proposes a joint optimization mechanism for packet length and power in the scenario of covert short packet D2D communication, so as to effectively improve the communication performance between D2D pairs subject to the covert constraint. Specifically, we construct a short-packet D2D [...] Read more.
This paper proposes a joint optimization mechanism for packet length and power in the scenario of covert short packet D2D communication, so as to effectively improve the communication performance between D2D pairs subject to the covert constraint. Specifically, we construct a short-packet D2D communication model assisted by covert communication, and further propose the notion of effective covert throughput (ECT) to quantitatively characterize the trade-off between the covertness and reliability of IoT state monitoring information transmission. Secondly, in the constructed communication scenario, we analyze the detection error probability of the warden and clarify that the existing equal power transmission of pilot and data signals can minimize the detection performance of the warden. However, this strategy is achieved by compromising the transmission performance of the system, which means that the ECT of D2D pair may not be optimal. Thirdly, we aim to maximize the ECT of D2D pair and construct a joint optimization problem for pilot transmission power, data transmission power, and packet length. Furthermore, a joint optimization algorithm based on the 2D search is adopted to obtain the optimal solution of the established optimization problem. Simulation results demonstrated that the transmission performance of the joint optimization algorithm is better than that of the scheme of the equal power scheme on the premise of ensuring the covertness. Full article
(This article belongs to the Special Issue Covert Wireless Communication with Multi-Domain Uncertainties)
Show Figures

Figure 1

Back to TopTop