Pub Date : 2022-06-30DOI: 10.5121/ijwmn.2022.14304
Mitrabinda Khuntia, Satya Ranjan Das, K. Sinha, Bhabani P. Sinha
The upcoming 6G communication network will revolutionize the scenario of customer services and related applications by building smart, autonomous systems. We first discuss here about 6G enabled smart applications like healthcare, smart city building, industrial IoTs, etc. We next provide a brief survey of the enabling technologies for achieving the required goals of 6G, such as terahertz communication, cell-free communication, holographic communication using beamforming, wireless power transfer, ultra-low latency communication, etc., with a view to tackle very large amounts of data traffic from several billions of smart interconnected devices while supporting ultra-low end-to-end communication latency. Finally, we present various research challenges involved in 6G communication towards building such smart systems.
{"title":"State-of-the-Art Strategies and Research Challenges in Wireless Communication for Building Smart Systems","authors":"Mitrabinda Khuntia, Satya Ranjan Das, K. Sinha, Bhabani P. Sinha","doi":"10.5121/ijwmn.2022.14304","DOIUrl":"https://doi.org/10.5121/ijwmn.2022.14304","url":null,"abstract":"The upcoming 6G communication network will revolutionize the scenario of customer services and related applications by building smart, autonomous systems. We first discuss here about 6G enabled smart applications like healthcare, smart city building, industrial IoTs, etc. We next provide a brief survey of the enabling technologies for achieving the required goals of 6G, such as terahertz communication, cell-free communication, holographic communication using beamforming, wireless power transfer, ultra-low latency communication, etc., with a view to tackle very large amounts of data traffic from several billions of smart interconnected devices while supporting ultra-low end-to-end communication latency. Finally, we present various research challenges involved in 6G communication towards building such smart systems.","PeriodicalId":339265,"journal":{"name":"International Journal of Wireless & Mobile Networks","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116403316","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-06-30DOI: 10.5121/ijwmn.2022.14303
Oyibo Uchechukwu Moses, Nosiri Onyebuchi Chikezie
Rice production plays a significant role in food security in the globe. The automation of rice production remains the paradigm shift to meet up with the consumer demand considering the tremendous increase in consumption rate. The paper aimed at implementing some selected key performance indicators (KPIs) for enhanced rice production by addressing five major challenges that face rice farmers, especially in Nigeria. The Non-availability of water/rain for year-round cultivation, disproportionate application of fertilizer, weed control/prevention, pest/disease control, and rodents and bird’s invasion are outlined as observed constraints. A Zigbee-based Enhanced Wireless Sensor Network (eWSN) was used to model various network scenarios to demonstrate data sensing of different environmental variables in a given farm land. This was achieved by varying network devices at different scenarios using OPNET simulator and understudying the network performances. Each new set of network devices was integrated to a Zigbee Coordinator (ZC) which assigns an address to its members and forms a personal area network (PAN), thus representing data sensing of a particular environmental variable. Three different scenarios were designed and simulated in the study. Each of the temperature and humidity, motion and soil nutrient sensors generated about 29bps of traffic. At the Coordinators, steady stream of traffic was received. The temperature and humidity Coordinators, received a traffic of 64bps each, while the soil nutrient Coordinator received data traffic of 96bps. The outcome of the design demonstrates effective communication between different network components and provides insight on how WSN could be used simultaneously to monitor a number of different environmental variables on a farm field. By implementing the KPIs, the simulation result provided an estimated yield increase from 2.2 to 8.7 metric ton per hectare of a rice farm.
{"title":"KPI Deployment for Enhanced Rice Production in a Geo-Location Environment using a Wireless Sensor Network","authors":"Oyibo Uchechukwu Moses, Nosiri Onyebuchi Chikezie","doi":"10.5121/ijwmn.2022.14303","DOIUrl":"https://doi.org/10.5121/ijwmn.2022.14303","url":null,"abstract":"Rice production plays a significant role in food security in the globe. The automation of rice production remains the paradigm shift to meet up with the consumer demand considering the tremendous increase in consumption rate. The paper aimed at implementing some selected key performance indicators (KPIs) for enhanced rice production by addressing five major challenges that face rice farmers, especially in Nigeria. The Non-availability of water/rain for year-round cultivation, disproportionate application of fertilizer, weed control/prevention, pest/disease control, and rodents and bird’s invasion are outlined as observed constraints. A Zigbee-based Enhanced Wireless Sensor Network (eWSN) was used to model various network scenarios to demonstrate data sensing of different environmental variables in a given farm land. This was achieved by varying network devices at different scenarios using OPNET simulator and understudying the network performances. Each new set of network devices was integrated to a Zigbee Coordinator (ZC) which assigns an address to its members and forms a personal area network (PAN), thus representing data sensing of a particular environmental variable. Three different scenarios were designed and simulated in the study. Each of the temperature and humidity, motion and soil nutrient sensors generated about 29bps of traffic. At the Coordinators, steady stream of traffic was received. The temperature and humidity Coordinators, received a traffic of 64bps each, while the soil nutrient Coordinator received data traffic of 96bps. The outcome of the design demonstrates effective communication between different network components and provides insight on how WSN could be used simultaneously to monitor a number of different environmental variables on a farm field. By implementing the KPIs, the simulation result provided an estimated yield increase from 2.2 to 8.7 metric ton per hectare of a rice farm.","PeriodicalId":339265,"journal":{"name":"International Journal of Wireless & Mobile Networks","volume":"65 Supplement 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126829904","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-06-30DOI: 10.5121/ijwmn.2022.14301
Mathieu K. Kourouma, Ratana P. Warren, Deidra S. Atkins-Ball, Lynette Jackson, N. Gwee, Sudhir K. Trivedi, Tania Breaux
Wireless and mobile devices are part of our lives. Wireless technology encompasses Internet of Things (IoT). Some key features of these devices are sensors, connectivity, and artificial intelligence and they can be found in health clinics, homes, buildings, vehicles, cities, wearables, etc. However, wireless and IoT technologies are sources of a variety of security threats to privacy and data and are becoming targets for attackers or hackers. In this paper, the authors strive to answer to the following research questions: 1) What types of threats can wireless and IoT technologies pose? 2) What type of threats can be exploited for attack and how? 3) What techniques are used to mitigate the threats and attacks? 4) What can wireless and IoT users do to protect their privacy and data? As a result, we investigate different types of security threats and attacks, and common security countermeasures used in wireless and IoT.
{"title":"Investigating Wireless and Internet of Things Technologies Security Threats and Attacks","authors":"Mathieu K. Kourouma, Ratana P. Warren, Deidra S. Atkins-Ball, Lynette Jackson, N. Gwee, Sudhir K. Trivedi, Tania Breaux","doi":"10.5121/ijwmn.2022.14301","DOIUrl":"https://doi.org/10.5121/ijwmn.2022.14301","url":null,"abstract":"Wireless and mobile devices are part of our lives. Wireless technology encompasses Internet of Things (IoT). Some key features of these devices are sensors, connectivity, and artificial intelligence and they can be found in health clinics, homes, buildings, vehicles, cities, wearables, etc. However, wireless and IoT technologies are sources of a variety of security threats to privacy and data and are becoming targets for attackers or hackers. In this paper, the authors strive to answer to the following research questions: 1) What types of threats can wireless and IoT technologies pose? 2) What type of threats can be exploited for attack and how? 3) What techniques are used to mitigate the threats and attacks? 4) What can wireless and IoT users do to protect their privacy and data? As a result, we investigate different types of security threats and attacks, and common security countermeasures used in wireless and IoT.","PeriodicalId":339265,"journal":{"name":"International Journal of Wireless & Mobile Networks","volume":"72 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114708738","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-04-30DOI: 10.5121/ijwmn.2022.14202
Lucy Dash, Sayan Sen Sarma, K. Sinha, Bhabani P. Sinha
In this paper, we propose a Voronoi diagram based spatio-temporal data redundancy elimination approach for RFID systems having multiple readers so that every RFID tag will be read by only one reader depending on the distance between the tag and the center of the Minimum Enclosing Circle (MEC) of the Voronoi cell which the reader belongs to. Thus, the spatial redundancy in the gathered data is completely eliminated. Temporal redundancy is also minimized by reading the RFID tags at regular time intervals larger than an appropriately chosen threshold value. Existing methods of reducing data redundancy in RFID systems are often associated with loss of data, false positive errors and false negative errors. In contrast to this, our proposed technique is free from any false positive and false negative errors with no loss of data and every tag being read by only one single reader. Simulation of our proposed approach also establishes its superiority to the existing techniques in terms of these performance parameters.
{"title":"A Novel Spatio-Temporal Data Redundancy Elimination Approach for RFID Systems with Multiple Readers","authors":"Lucy Dash, Sayan Sen Sarma, K. Sinha, Bhabani P. Sinha","doi":"10.5121/ijwmn.2022.14202","DOIUrl":"https://doi.org/10.5121/ijwmn.2022.14202","url":null,"abstract":"In this paper, we propose a Voronoi diagram based spatio-temporal data redundancy elimination approach for RFID systems having multiple readers so that every RFID tag will be read by only one reader depending on the distance between the tag and the center of the Minimum Enclosing Circle (MEC) of the Voronoi cell which the reader belongs to. Thus, the spatial redundancy in the gathered data is completely eliminated. Temporal redundancy is also minimized by reading the RFID tags at regular time intervals larger than an appropriately chosen threshold value. Existing methods of reducing data redundancy in RFID systems are often associated with loss of data, false positive errors and false negative errors. In contrast to this, our proposed technique is free from any false positive and false negative errors with no loss of data and every tag being read by only one single reader. Simulation of our proposed approach also establishes its superiority to the existing techniques in terms of these performance parameters.","PeriodicalId":339265,"journal":{"name":"International Journal of Wireless & Mobile Networks","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-04-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123807990","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-04-30DOI: 10.5121/ijwmn.2022.14204
Wardah Saleh, S. Chowdhury
A significant purpose of 5G networks is allowing sharing resources among different network tenants such as service providers and Mobile Virtual network Operators. Numerous domains are taken in account regarding resource sharing containing different infrastructure (storage, compute and networking), Radio Access Network (RAN) and Radio Frequency (RF) spectrum. RAN and spectrum, transport. Spectrum sharing and RAN are anticipated as the fundamental part in multi-tenant 5G network. Nevertheless, there is a shortage of evaluation platforms to determine the number of benefits that can be acquired from multilevel spectrum sharing rather than single-level spectrum sharing. The work presented in this paper intend to address this issue by presenting a modified SimuLTE model is used for evaluating active RAN based on multi-tenant 5G networks. The result shows an understanding into the actual advantages of RAN slicing for multi-tenants in 5G networks.
{"title":"RANSlicing: Towards Multi-Tenancy in 5G Radio Access Networks","authors":"Wardah Saleh, S. Chowdhury","doi":"10.5121/ijwmn.2022.14204","DOIUrl":"https://doi.org/10.5121/ijwmn.2022.14204","url":null,"abstract":"A significant purpose of 5G networks is allowing sharing resources among different network tenants such as service providers and Mobile Virtual network Operators. Numerous domains are taken in account regarding resource sharing containing different infrastructure (storage, compute and networking), Radio Access Network (RAN) and Radio Frequency (RF) spectrum. RAN and spectrum, transport. Spectrum sharing and RAN are anticipated as the fundamental part in multi-tenant 5G network. Nevertheless, there is a shortage of evaluation platforms to determine the number of benefits that can be acquired from multilevel spectrum sharing rather than single-level spectrum sharing. The work presented in this paper intend to address this issue by presenting a modified SimuLTE model is used for evaluating active RAN based on multi-tenant 5G networks. The result shows an understanding into the actual advantages of RAN slicing for multi-tenants in 5G networks.","PeriodicalId":339265,"journal":{"name":"International Journal of Wireless & Mobile Networks","volume":"50 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-04-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129449710","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-02-28DOI: 10.5121/ijwmn.2022.14101
Mayada S. A. Mustafa, Borhanuddin M Ali, Mfa Rasid, Shaiful J. Hashim, I. A. Saeed
A tree topology is a commonly employed topology for wireless sensor networks (WSN) to connect sensors to one or more remote gateways. In many-to-one traffic, routing imposes a heavy burden on downstream nodes, as the same routes are repeatedly used for packet forwarding from one or more sensor chains. The challenge is traffic paths that ensure balanced energy consumption at sink-hole to protect sensors from fast death. This paper proposes an energy consumption pattern-aware greedy routing protocol that proactively protects many-to-one topology from the sink-hole formation. The proposed protocol, Energy Balance-Based Energy Hole Alleviation in Tree Topology (EBEHA-T), precludes energy hole formation rather than retrospectively responding to a hole detection. Updated status of variations in energy consumption patterns at the sink-hole and construction feature of joint nodes in the tree topology aids in routing decision. Performance evaluation of EBEHA-T against benchmark method RaSMaLai shows increased energy-saving across the entire network and a marked improvement in energy consumption balance in energy hole zones. This precludes energy hole formation and the consequent network partitioning, leading to improved network lifetime beyond that of the RasMaLai.
{"title":"A Proactive Greedy Routing Protocol Precludes Sink-Hole Formation in Wireless Sensor Networks","authors":"Mayada S. A. Mustafa, Borhanuddin M Ali, Mfa Rasid, Shaiful J. Hashim, I. A. Saeed","doi":"10.5121/ijwmn.2022.14101","DOIUrl":"https://doi.org/10.5121/ijwmn.2022.14101","url":null,"abstract":"A tree topology is a commonly employed topology for wireless sensor networks (WSN) to connect sensors to one or more remote gateways. In many-to-one traffic, routing imposes a heavy burden on downstream nodes, as the same routes are repeatedly used for packet forwarding from one or more sensor chains. The challenge is traffic paths that ensure balanced energy consumption at sink-hole to protect sensors from fast death. This paper proposes an energy consumption pattern-aware greedy routing protocol that proactively protects many-to-one topology from the sink-hole formation. The proposed protocol, Energy Balance-Based Energy Hole Alleviation in Tree Topology (EBEHA-T), precludes energy hole formation rather than retrospectively responding to a hole detection. Updated status of variations in energy consumption patterns at the sink-hole and construction feature of joint nodes in the tree topology aids in routing decision. Performance evaluation of EBEHA-T against benchmark method RaSMaLai shows increased energy-saving across the entire network and a marked improvement in energy consumption balance in energy hole zones. This precludes energy hole formation and the consequent network partitioning, leading to improved network lifetime beyond that of the RasMaLai.","PeriodicalId":339265,"journal":{"name":"International Journal of Wireless & Mobile Networks","volume":"1207 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-02-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120960598","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}