Pub Date : 2018-12-01DOI: 10.1109/ANTS.2018.8710097
Ayush Dusia, V. Mishra, A. Sethi
Nodes in a dynamic wireless network are expected to autonomously self-organize and configure routes for communicating amongst themselves. Such networks have applications in several scenarios, including military, disaster relief, and search and rescue operations. Designing a solution for such networks is challenging because of their unique characteristics. Traditionally, decentralized solutions have been sought-after. In the past few years, Software-Defined Networking (SDN) has emerged as a promising approach for designing effective solutions for different types of networks. In this paper, we present an SDN-based architecture and a control communication protocol for dynamic multi-hop wireless infrastructure-less networks. In particular, the solution is designed for networks with 1) node mobility and unreliable connectivity, 2) unstructured network topology, 3) limited bandwidth and high interference due to multi-hop communication in a shared channel, 4) no out-of-band communication channel, and 5) no location-tracking services for learning the position of mobile nodes. We evaluate our architecture and control communication protocol in NS-3 and compare the results with two conventional solutions - OLSR and DSDV. The results demonstrate up to 40% reduction in the routing overhead while achieving the same or better throughput than the conventional solutions for networks of size up to 50 nodes.
{"title":"Control Communication in SDN-based Dynamic Multi-hop Wireless Infrastructure-less Networks","authors":"Ayush Dusia, V. Mishra, A. Sethi","doi":"10.1109/ANTS.2018.8710097","DOIUrl":"https://doi.org/10.1109/ANTS.2018.8710097","url":null,"abstract":"Nodes in a dynamic wireless network are expected to autonomously self-organize and configure routes for communicating amongst themselves. Such networks have applications in several scenarios, including military, disaster relief, and search and rescue operations. Designing a solution for such networks is challenging because of their unique characteristics. Traditionally, decentralized solutions have been sought-after. In the past few years, Software-Defined Networking (SDN) has emerged as a promising approach for designing effective solutions for different types of networks. In this paper, we present an SDN-based architecture and a control communication protocol for dynamic multi-hop wireless infrastructure-less networks. In particular, the solution is designed for networks with 1) node mobility and unreliable connectivity, 2) unstructured network topology, 3) limited bandwidth and high interference due to multi-hop communication in a shared channel, 4) no out-of-band communication channel, and 5) no location-tracking services for learning the position of mobile nodes. We evaluate our architecture and control communication protocol in NS-3 and compare the results with two conventional solutions - OLSR and DSDV. The results demonstrate up to 40% reduction in the routing overhead while achieving the same or better throughput than the conventional solutions for networks of size up to 50 nodes.","PeriodicalId":273443,"journal":{"name":"2018 IEEE International Conference on Advanced Networks and Telecommunications Systems (ANTS)","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129672609","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-12-01DOI: 10.1109/ANTS.2018.8710102
C. Raut, S. Devane
Use of clustering in VANET have proven effective technique to enhance QoS. Clustering based solution in current research designed by considering the geographical distances as well as network dynamics (mobility). Present research work has improved the QoS, yet the failure of infrastructure is not considered, which will definitely hamper the QoS where the quality of infrastructure is not good. This paper, intelligent cluster head routing protocol (ICHR) is proposed to work with RSU failure conditions in network efficiently for VANET. Additionally, the method of selecting cluster head has been changed to improve the QoS significantly. In case of RSU failure, the Intelligent CH (ICH) is selected from the all CH nodes based on the maximum probability of all three parameters to transmit the data over the alternate neighboring RSU through LTE network which is already in use for providing internet connection.
{"title":"QoS Enhancement using Intelligent Cluster Head Selection Routing Technique in Vehicular Ad Hoc Networks in case of RSU failure","authors":"C. Raut, S. Devane","doi":"10.1109/ANTS.2018.8710102","DOIUrl":"https://doi.org/10.1109/ANTS.2018.8710102","url":null,"abstract":"Use of clustering in VANET have proven effective technique to enhance QoS. Clustering based solution in current research designed by considering the geographical distances as well as network dynamics (mobility). Present research work has improved the QoS, yet the failure of infrastructure is not considered, which will definitely hamper the QoS where the quality of infrastructure is not good. This paper, intelligent cluster head routing protocol (ICHR) is proposed to work with RSU failure conditions in network efficiently for VANET. Additionally, the method of selecting cluster head has been changed to improve the QoS significantly. In case of RSU failure, the Intelligent CH (ICH) is selected from the all CH nodes based on the maximum probability of all three parameters to transmit the data over the alternate neighboring RSU through LTE network which is already in use for providing internet connection.","PeriodicalId":273443,"journal":{"name":"2018 IEEE International Conference on Advanced Networks and Telecommunications Systems (ANTS)","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130655587","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-12-01DOI: 10.1109/ANTS.2018.8710091
Surbhi Saraswat, Hari Prabhat Gupta, Tanima Dutta
With the development of diverse ubiquitous computing applications, tremendous amount of sensor data is generated. This data requires efficient localized processing and storage. A real-time ubiquitous system requires latency-aware processing to satisfy the deadline of the ubiquitous applications. Performing processing near the network, using Edge and Fog devices, meets this need. The cost of the ubiquitous system depends on the pricing of the processing and storage. In this paper, we present an Edge, Fog, and Cloud layers based ubiquitous computing system, which not only deals with the deadline of a given application but also minimizes the cost of the system. We derive expressions to estimate the cost of computing and storage of the ubiquitous computing system and delay of the network. We demonstrate an application of the analysis in the design of a minimum cost ubiquitous computing system. We propose an algorithm to determine the layers for executing the machine learning techniques required to satisfy the deadline of the system and simultaneously minimize the cost of the network.
{"title":"A Minimum Cost Real-Time Ubiquitous Computing System Using Edge-Fog-Cloud","authors":"Surbhi Saraswat, Hari Prabhat Gupta, Tanima Dutta","doi":"10.1109/ANTS.2018.8710091","DOIUrl":"https://doi.org/10.1109/ANTS.2018.8710091","url":null,"abstract":"With the development of diverse ubiquitous computing applications, tremendous amount of sensor data is generated. This data requires efficient localized processing and storage. A real-time ubiquitous system requires latency-aware processing to satisfy the deadline of the ubiquitous applications. Performing processing near the network, using Edge and Fog devices, meets this need. The cost of the ubiquitous system depends on the pricing of the processing and storage. In this paper, we present an Edge, Fog, and Cloud layers based ubiquitous computing system, which not only deals with the deadline of a given application but also minimizes the cost of the system. We derive expressions to estimate the cost of computing and storage of the ubiquitous computing system and delay of the network. We demonstrate an application of the analysis in the design of a minimum cost ubiquitous computing system. We propose an algorithm to determine the layers for executing the machine learning techniques required to satisfy the deadline of the system and simultaneously minimize the cost of the network.","PeriodicalId":273443,"journal":{"name":"2018 IEEE International Conference on Advanced Networks and Telecommunications Systems (ANTS)","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126373423","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-12-01DOI: 10.1109/ANTS.2018.8710111
A. Ramesh, B. S. Vineeth
Wireless sensor and actuator networks as well as industrial Internet of things networks use protocols such as IEEE 802. 15.4e TSCH, which uses deterministic scheduling, in order to collect data. The data collected from multiple sensor nodes is convergecast to a gateway. Since the scheduling is deterministic the data arrival at the gateway follows a periodic deterministic pattern. Often, in an industrial setting it is useful to take this collected data from multiple gateways and transfer it for cloud processing or storage. We consider an architecture where the convergecast data is communicated over WiFi to the cloud. Although real-time latency requirements are not imposed on this cloud transfer, average latency requirements still apply for use-cases like long term control of parameters or for updation of dashboards. In this context, we analyze the average latency performance of the 802.11 MAC layer with deterministic input traffic. We propose a data driven empirical model for the average delay of 802.11 under deterministic traffic.
{"title":"Empirical Delay Models for 802.11 under Deterministic Convergecast Traffic","authors":"A. Ramesh, B. S. Vineeth","doi":"10.1109/ANTS.2018.8710111","DOIUrl":"https://doi.org/10.1109/ANTS.2018.8710111","url":null,"abstract":"Wireless sensor and actuator networks as well as industrial Internet of things networks use protocols such as IEEE 802. 15.4e TSCH, which uses deterministic scheduling, in order to collect data. The data collected from multiple sensor nodes is convergecast to a gateway. Since the scheduling is deterministic the data arrival at the gateway follows a periodic deterministic pattern. Often, in an industrial setting it is useful to take this collected data from multiple gateways and transfer it for cloud processing or storage. We consider an architecture where the convergecast data is communicated over WiFi to the cloud. Although real-time latency requirements are not imposed on this cloud transfer, average latency requirements still apply for use-cases like long term control of parameters or for updation of dashboards. In this context, we analyze the average latency performance of the 802.11 MAC layer with deterministic input traffic. We propose a data driven empirical model for the average delay of 802.11 under deterministic traffic.","PeriodicalId":273443,"journal":{"name":"2018 IEEE International Conference on Advanced Networks and Telecommunications Systems (ANTS)","volume":"145 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121438699","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-12-01DOI: 10.1109/ANTS.2018.8710124
Kaushik Dutta, Rishav Mukherjee, A. Kundu, Shamik Kundu
The advent of various bandwidth-hungry applications now-a-days has increased the spectrum demand, thereby resulting in spectrum scarcity. Cognitive Radio Networks (CRN), proposed by the researchers, is a probable solution to the problem. CRN allows licensed Primary Users (PUs) to partly lease their unutilized spectrum to the opportunistic Secondary Users (SU) for effective Channel Utilization (CU) and enhanced Quality of Service (QoS). Now, use of buffers is a common approach to provide improved QoS to the SUs. However, if the waiting time of the SUs in the buffers exceed their time-out interval, the QoS degrades instead of improving. Thus, in this work, firstly, a CRN has been modeled using two buffers, namely, the New Queue (NQ) and the Pre-empted Queue (PQ). The NQ holds the newly requesting SUs while the PQ holds the SUs pre-empted by the PUs. Next, a model to determine the dynamic length of buffers has been proposed. It works based on the prior activity of the end-users and the requesting SU's waiting threshold. The model ensures service to user if it is admitted in the network. Otherwise, it is blocked or dropped. Blocking or dropping of the calls in this case provides a chance to the SUs to transmit via other base stations. The system is modeled using a multidimensional Continuous Time Markov Chain (CTMC) model. The dynamic queue helps to restrict the Level of Impatience (LOI) to 19.90% for the New Queue SUs and 14.93% for Preempted Queue SUs while achieving 99.33% CU.
{"title":"Dynamic Queuing Model for the Secondary Users in a Cognitive Radio Network for Improvement of QoS","authors":"Kaushik Dutta, Rishav Mukherjee, A. Kundu, Shamik Kundu","doi":"10.1109/ANTS.2018.8710124","DOIUrl":"https://doi.org/10.1109/ANTS.2018.8710124","url":null,"abstract":"The advent of various bandwidth-hungry applications now-a-days has increased the spectrum demand, thereby resulting in spectrum scarcity. Cognitive Radio Networks (CRN), proposed by the researchers, is a probable solution to the problem. CRN allows licensed Primary Users (PUs) to partly lease their unutilized spectrum to the opportunistic Secondary Users (SU) for effective Channel Utilization (CU) and enhanced Quality of Service (QoS). Now, use of buffers is a common approach to provide improved QoS to the SUs. However, if the waiting time of the SUs in the buffers exceed their time-out interval, the QoS degrades instead of improving. Thus, in this work, firstly, a CRN has been modeled using two buffers, namely, the New Queue (NQ) and the Pre-empted Queue (PQ). The NQ holds the newly requesting SUs while the PQ holds the SUs pre-empted by the PUs. Next, a model to determine the dynamic length of buffers has been proposed. It works based on the prior activity of the end-users and the requesting SU's waiting threshold. The model ensures service to user if it is admitted in the network. Otherwise, it is blocked or dropped. Blocking or dropping of the calls in this case provides a chance to the SUs to transmit via other base stations. The system is modeled using a multidimensional Continuous Time Markov Chain (CTMC) model. The dynamic queue helps to restrict the Level of Impatience (LOI) to 19.90% for the New Queue SUs and 14.93% for Preempted Queue SUs while achieving 99.33% CU.","PeriodicalId":273443,"journal":{"name":"2018 IEEE International Conference on Advanced Networks and Telecommunications Systems (ANTS)","volume":"867 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121029248","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-12-01DOI: 10.1109/ANTS.2018.8710131
Pragya Swami, V. Bhatia, Satyanarayana Vuppala, T. Ratnarajah
The increase in number of cellular users had lead to the evolution from the traditional cellular networks to the more efficient heterogeneous cellular networks (HetNet) to handle the traffic. Offloading plays a vital role in handling the traffic from the congested macro base station by handing users to the less congested femto base stations (FBS). Further, non-orthogonal multiple access (NOMA) has proved to be efficient for the future generation networks. In this work, we study the offloading in HetNets, where the FBS tier serves the users using NOMA. Imperfect channel state information (CSI) is considered to analyze the outage probability of offloaded user, since, in practice CSI estimation requires significant system overhead, especially when the number of users are large. Hence, for practical systems, the analyses with imperfect CSI is more relevant. Some important observations regarding offloading to FBS tier with NOMA based on imperfect CSI are drawn. The analytical results are validated using Monte Carlo simulations.
{"title":"Performance Analysis of Offloading in NOMA-HetNets using Imperfect CSI","authors":"Pragya Swami, V. Bhatia, Satyanarayana Vuppala, T. Ratnarajah","doi":"10.1109/ANTS.2018.8710131","DOIUrl":"https://doi.org/10.1109/ANTS.2018.8710131","url":null,"abstract":"The increase in number of cellular users had lead to the evolution from the traditional cellular networks to the more efficient heterogeneous cellular networks (HetNet) to handle the traffic. Offloading plays a vital role in handling the traffic from the congested macro base station by handing users to the less congested femto base stations (FBS). Further, non-orthogonal multiple access (NOMA) has proved to be efficient for the future generation networks. In this work, we study the offloading in HetNets, where the FBS tier serves the users using NOMA. Imperfect channel state information (CSI) is considered to analyze the outage probability of offloaded user, since, in practice CSI estimation requires significant system overhead, especially when the number of users are large. Hence, for practical systems, the analyses with imperfect CSI is more relevant. Some important observations regarding offloading to FBS tier with NOMA based on imperfect CSI are drawn. The analytical results are validated using Monte Carlo simulations.","PeriodicalId":273443,"journal":{"name":"2018 IEEE International Conference on Advanced Networks and Telecommunications Systems (ANTS)","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125313414","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
A federated cloud environment helps different cloud service providers (CSP) to improve their performances in terms of Quality of Service $(mathrm {Q}mathrm {o}mathrm {S})$. For a federation to deliver its best, the workloads on its member CSPs should be balanced. Overloading a CSP leads to degradation in performance which is absolutely undesirable. To balance the workloads among the member CSPs of a federation, detection of the overloaded CSPs is important. The proposed model, Overloaded Cloud Provider Detection Algorithm(OCPDA), uses Multiple Linear Regression (MLR) based technique to estimate the loads of CSPs. Extensive simulation has been conducted which shows that OCPDA successfully detects overloaded CSPs in a federation.
{"title":"OCPDA: A novel approach towards detection of overloaded cloud providers in a federated environment","authors":"Benay Kumar Ray, Oindrilla Ghosh, Srimoyee Bhattacherjee, Sarbani Roy, Sunirmal Khatua","doi":"10.1109/ANTS.2018.8710148","DOIUrl":"https://doi.org/10.1109/ANTS.2018.8710148","url":null,"abstract":"A federated cloud environment helps different cloud service providers (CSP) to improve their performances in terms of Quality of Service $(mathrm {Q}mathrm {o}mathrm {S})$. For a federation to deliver its best, the workloads on its member CSPs should be balanced. Overloading a CSP leads to degradation in performance which is absolutely undesirable. To balance the workloads among the member CSPs of a federation, detection of the overloaded CSPs is important. The proposed model, Overloaded Cloud Provider Detection Algorithm(OCPDA), uses Multiple Linear Regression (MLR) based technique to estimate the loads of CSPs. Extensive simulation has been conducted which shows that OCPDA successfully detects overloaded CSPs in a federation.","PeriodicalId":273443,"journal":{"name":"2018 IEEE International Conference on Advanced Networks and Telecommunications Systems (ANTS)","volume":"48 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133279580","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-12-01DOI: 10.1109/ANTS.2018.8710066
R. Sanjeetha, A. Prasanna, D. P. Kumar, A. Kanavalli
One of the major constraint of a Software Defined Network (SDN) is the limited size of the flow table in the switch. These flow tables are required for forwarding packets to the desired destination. To deliver a packet in SDN, the controller installs flow table rules on the source switch i.e. the switch which connects to the source host, multiple intermediate switches through which the packet will be transmitted, and the destination switch which connects to the destination host. In high traffic scenarios, the flow tables of these switches become full and the flow rules must be repeatedly replaced by the controller. Hiep T. Nguyen Tri et al. proposed a solution for the same, by using an OpenDaylight controller feature that forwards packets to the destination switch directly and install a flow table rules only on it. In this paper we show how a DDoS attack can be instigated on a primary server i.e. the server providing important services like web server, file server etc., present in SDN which uses the abovementioned solution during high traffic scenarios. The attack is instigated by generating huge number of packets with destination IP addresses such that it compels the controller to always choose the switch which connects the primary sever to the rest of the network as the destination switch. The flow table rules are repeatedly installed by the controller into this switch, leading to exhaustion of its flow table space. This blocks the genuine traffic between the primary server and its clients as the flow rules that would service legitimate clients get replaced by flow rules that process this attack traffic.
软件定义网络(SDN)的主要限制之一是交换机中流表的有限大小。这些流表是将数据包转发到所需目的地所必需的。为了在SDN中传送数据包,控制器在源交换机上安装流表规则,即连接到源主机的交换机、传输数据包的多个中间交换机以及连接到目的主机的目的交换机。在高流量场景下,这些交换机的流表会被填满,流规则必须被控制器反复替换。Hiep T. Nguyen Tri等人提出了同样的解决方案,通过使用OpenDaylight控制器功能将数据包直接转发到目标交换机,并仅在其上安装流表规则。在本文中,我们展示了如何在主服务器上煽动DDoS攻击,即提供重要服务的服务器,如web服务器,文件服务器等,存在于SDN中,在高流量场景中使用上述解决方案。这种攻击是通过生成大量带有目的IP地址的数据包来煽动的,这样就迫使控制器总是选择连接主服务器和网络其余部分的交换机作为目的交换机。流表规则被控制器反复安装到该开关中,导致其流表空间耗尽。这将阻止主服务器与其客户端之间的真实流量,因为将为合法客户端提供服务的流规则将被处理攻击流量的流规则所取代。
{"title":"Mitigation of Controller induced DDoS Attack on Primary Server in High Traffic Scenarios of Software Defined Networks","authors":"R. Sanjeetha, A. Prasanna, D. P. Kumar, A. Kanavalli","doi":"10.1109/ANTS.2018.8710066","DOIUrl":"https://doi.org/10.1109/ANTS.2018.8710066","url":null,"abstract":"One of the major constraint of a Software Defined Network (SDN) is the limited size of the flow table in the switch. These flow tables are required for forwarding packets to the desired destination. To deliver a packet in SDN, the controller installs flow table rules on the source switch i.e. the switch which connects to the source host, multiple intermediate switches through which the packet will be transmitted, and the destination switch which connects to the destination host. In high traffic scenarios, the flow tables of these switches become full and the flow rules must be repeatedly replaced by the controller. Hiep T. Nguyen Tri et al. proposed a solution for the same, by using an OpenDaylight controller feature that forwards packets to the destination switch directly and install a flow table rules only on it. In this paper we show how a DDoS attack can be instigated on a primary server i.e. the server providing important services like web server, file server etc., present in SDN which uses the abovementioned solution during high traffic scenarios. The attack is instigated by generating huge number of packets with destination IP addresses such that it compels the controller to always choose the switch which connects the primary sever to the rest of the network as the destination switch. The flow table rules are repeatedly installed by the controller into this switch, leading to exhaustion of its flow table space. This blocks the genuine traffic between the primary server and its clients as the flow rules that would service legitimate clients get replaced by flow rules that process this attack traffic.","PeriodicalId":273443,"journal":{"name":"2018 IEEE International Conference on Advanced Networks and Telecommunications Systems (ANTS)","volume":"79 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134580769","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-12-01DOI: 10.1109/ANTS.2018.8710086
Anders Frøytlog, Linga Reddy Cenkeramaddi
In this paper, we present the design and prototype implementation of an ultra-low power wake-up radio for wireless IoT devices. The prototyped wake-up radio consumes only 580nA from 3V power supply, covers distance range of up to 55 meters and achieves a sensitivity of -49.5dBm. This wakeup radio module can easily be integrated into wireless IoT devices and thereby reducing the overall power consumption of the battery powered and energy harvesting based devices. The prolonged life time of the devices can reduce the overall costs when deployed in large scale.
{"title":"Design and Implementation of an Ultra-Low Power Wake-up Radio for Wireless IoT Devices","authors":"Anders Frøytlog, Linga Reddy Cenkeramaddi","doi":"10.1109/ANTS.2018.8710086","DOIUrl":"https://doi.org/10.1109/ANTS.2018.8710086","url":null,"abstract":"In this paper, we present the design and prototype implementation of an ultra-low power wake-up radio for wireless IoT devices. The prototyped wake-up radio consumes only 580nA from 3V power supply, covers distance range of up to 55 meters and achieves a sensitivity of -49.5dBm. This wakeup radio module can easily be integrated into wireless IoT devices and thereby reducing the overall power consumption of the battery powered and energy harvesting based devices. The prolonged life time of the devices can reduce the overall costs when deployed in large scale.","PeriodicalId":273443,"journal":{"name":"2018 IEEE International Conference on Advanced Networks and Telecommunications Systems (ANTS)","volume":"112 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115275614","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-12-01DOI: 10.1109/ANTS.2018.8710133
Parthiban Annamalai, Jyotsna L. Bapat, D. Das
Internet of Things (IoT) is expected to play a prominent role in the envisioned networked society. In IoT ecosystem, Machine Type Communication (MTC) is the access technology that ensures wireless connectivity for end-user devices to the network. Diverse IoT applications pose conflicting requirements and challenges that must be resolved to fully realize the IoT ecosystem. Although the right access technology to address all these challenges is not available yet, notable progress has been made in the recent times to address most of the key requirements. Extended Coverage (EC)-GSM-IoT and Narrow Band (NB)-IoT have been standardized by 3GPP in Release 13 as the access technologies for IoT. Among non-3GPP community, Long Range (LoRa) has attracted significant attention. In this paper, the suitability of the aforementioned access technologies to various IoT services in terms of the relevant system parameters is explored. We have also identified many system design parameters that will have adverse implications if not configured correctly for the right IoT use case. Important open challenges to be addressed from physical layer (PHY) perspective are highlighted here that will help to realize a truly connected world.
{"title":"Emerging Access Technologies and Open Challenges in 5G IoT: From Physical Layer Perspective","authors":"Parthiban Annamalai, Jyotsna L. Bapat, D. Das","doi":"10.1109/ANTS.2018.8710133","DOIUrl":"https://doi.org/10.1109/ANTS.2018.8710133","url":null,"abstract":"Internet of Things (IoT) is expected to play a prominent role in the envisioned networked society. In IoT ecosystem, Machine Type Communication (MTC) is the access technology that ensures wireless connectivity for end-user devices to the network. Diverse IoT applications pose conflicting requirements and challenges that must be resolved to fully realize the IoT ecosystem. Although the right access technology to address all these challenges is not available yet, notable progress has been made in the recent times to address most of the key requirements. Extended Coverage (EC)-GSM-IoT and Narrow Band (NB)-IoT have been standardized by 3GPP in Release 13 as the access technologies for IoT. Among non-3GPP community, Long Range (LoRa) has attracted significant attention. In this paper, the suitability of the aforementioned access technologies to various IoT services in terms of the relevant system parameters is explored. We have also identified many system design parameters that will have adverse implications if not configured correctly for the right IoT use case. Important open challenges to be addressed from physical layer (PHY) perspective are highlighted here that will help to realize a truly connected world.","PeriodicalId":273443,"journal":{"name":"2018 IEEE International Conference on Advanced Networks and Telecommunications Systems (ANTS)","volume":"112 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123546934","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}