Open Access. Powered by Scholars. Published by Universities.®

Systems and Communications Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 5 of 5

Full-Text Articles in Systems and Communications

Assessing The Performance Of A Particle Swarm Optimization Mobility Algorithm In A Hybrid Wi-Fi/Lora Flying Ad Hoc Network, William David Paredes Jan 2023

Assessing The Performance Of A Particle Swarm Optimization Mobility Algorithm In A Hybrid Wi-Fi/Lora Flying Ad Hoc Network, William David Paredes

UNF Graduate Theses and Dissertations

Research on Flying Ad-Hoc Networks (FANETs) has increased due to the availability of Unmanned Aerial Vehicles (UAVs) and the electronic components that control and connect them. Many applications, such as 3D mapping, construction inspection, or emergency response operations could benefit from an application and adaptation of swarm intelligence-based deployments of multiple UAVs. Such groups of cooperating UAVs, through the use of local rules, could be seen as network nodes establishing an ad-hoc network for communication purposes.

One FANET application is to provide communication coverage over an area where communication infrastructure is unavailable. A crucial part of a FANET implementation is …


Detecting Iot Attacks Using An Ensemble Machine Learning Model, Vikas Tomar, Sachin Sharma Mar 2022

Detecting Iot Attacks Using An Ensemble Machine Learning Model, Vikas Tomar, Sachin Sharma

Articles

Malicious attacks are becoming more prevalent due to the growing use of Internet of Things (IoT) devices in homes, offices, transportation, healthcare, and other locations. By incorporating fog computing into IoT, attacks can be detected in a short amount of time, as the distance between IoT devices and fog devices is smaller than the distance between IoT devices and the cloud. Machine learning is frequently used for the detection of attacks due to the huge amount of data available from IoT devices. However, the problem is that fog devices may not have enough resources, such as processing power and memory, …


Energy-Efficient Dynamic Directional Modulation With Electrically Small Antennas, Adam Narbudowicz, Abel Zandamela, Nicola Marchetti, Max Ammann Jan 2022

Energy-Efficient Dynamic Directional Modulation With Electrically Small Antennas, Adam Narbudowicz, Abel Zandamela, Nicola Marchetti, Max Ammann

Articles

This letter proposes a compact and energy-efficient directional modulation scheme for small and power constrained devices (e.g., Internet of Things wireless sensors). The scheme uses a uniform circular array of monopole antennas, with a single radiofrequency chain and antenna active at a time. The antennas can be located in close proximity, offering significant size reduction. Furthermore, the schemewas demonstrated to operate successfully with an array of 0.6 λ diameter. The system does not generate additional artificial noise, limiting interference to other systems. Finally, the antenna switching sequence can be randomly generated and without fine-tuned synchronization with the transmitter.


Situation-Aware Quality Of Service Enhancement For Heterogeneous Ultra-Dense Wireless Iot Networks, Sabin Bhandari Dec 2021

Situation-Aware Quality Of Service Enhancement For Heterogeneous Ultra-Dense Wireless Iot Networks, Sabin Bhandari

Electronic Thesis and Dissertation Repository

By engaging a massive number of heterogeneous devices, future Internet of Things (IoT) systems are expected to support diverse applications ranging from eHealthcare to industrial control. In highly-dense deployment scenarios such as Industrial IoT (IIoT) systems, meeting the stringent Quality of Service (QoS) requirements such as low-latency and high reliability becomes challenging due to the uncertainty and dynamics within the IoT networks. To enhance the overall QoS performance, this thesis aims to address the technical challenges of IoT networks. Firstly, to enhance the network reliability, a cloud-assisted priority-based channel access and data aggregation scheme is proposed to minimize the network …


Ldakm-Eiot: Lightweight Device Authentication And Key Management Mechanism For Edge-Based Iot Deployment, Mohammad Wazid, Ashok Kumar Das, Sachin Shetty, Joel J. P. C. Rodrigues, Youngho Park Dec 2019

Ldakm-Eiot: Lightweight Device Authentication And Key Management Mechanism For Edge-Based Iot Deployment, Mohammad Wazid, Ashok Kumar Das, Sachin Shetty, Joel J. P. C. Rodrigues, Youngho Park

VMASC Publications

In recent years, edge computing has emerged as a new concept in the computing paradigm that empowers several future technologies, such as 5G, vehicle-to-vehicle communications, and the Internet of Things (IoT), by providing cloud computing facilities, as well as services to the end users. However, open communication among the entities in an edge based IoT environment makes it vulnerable to various potential attacks that are executed by an adversary. Device authentication is one of the prominent techniques in security that permits an IoT device to authenticate mutually with a cloud server with the help of an edge node. If authentication …