Explore chapters and articles related to this topic
IPv6 Adaptation in Ultrasonic NFC IoT Communications
Published in Bhawana Rudra, Anshul Verma, Shekhar Verma, Bhanu Shrestha, Futuristic Research Trends and Applications of Internet of Things, 2022
In this chapter, we introduced a full NFC IoT protocol stack can be used in scenarios where the use of traditional radio-based communications is neither possible nor reliable. UV23, a novel physical and link layer scheme, that combines multiple ITU-T V.23 modems tuned to transmit over ultrasonic bands was detailed. In order to comply with IoT requirements, 6LoWPAN was selected as the preferred adaptation mechanism in order to enable end-to-end IPv6 connectivity. A CoAP session layer was introduced to support REST interaction between the devices. All these components were put together in the context of an experimental framework that includes an application, a sensor, and a gateway. This setup is used, in turn, to obtain performance parameters. Clearly the distance d1 between the devices and the gateway is critical to determine the level of degradation of the scheme. A coverage hard limit of 30 centimeters makes the solution an excellent candidate for NFC in the context of IoT. On the other hand, this chapter introduced a mathematical model that can be used to estimate the performance of the stack as a function of the network packet loss. The network packet loss can be measured and the throughput as well as the latency can be calculated and compared against specific goals. This can be used to trigger real-time protocol stack parameter adjustments like configuring Forward Error Correction (FEC) levels [29].
Network node grouping algorithm and evaluation model based on clustering and Bayesian classifier
Published in International Journal of Computers and Applications, 2023
The numerical attributes x3, x4 and x5 of the network nodes and are respectively after normalization. At the same time, the weights of the contribution of three numerical values are set to be and respectively. Thus, the distance between numerical attributes x3, x4 and x5 is defined as: By analyzing the experimental data of network delay, network hops and network packet loss rate, according to the degree of dispersion of each attribute value and the contribution of each attribute to the degree of network node dissimilarity. When and are setting, Formula (5) can measure the differences in numerical attributes of network nodes.
Covert Cognizance: A Novel Predictive Modeling Paradigm
Published in Nuclear Technology, 2021
Arvind Sundaram, Hany Abdel-Khalik
Before explaining how the C2 paradigm satisfies the two aforementioned requirements, a few examples employing the idea of hiding information in plain sight are first overviewed. By way of a first example, in covert communication, the goal is to transmit secret information over channels not intended for information transfer. This can be achieved by adding information in the header fields of a network packet to communicate a secret message that is undetected by firewalls and intrusion detection systems since they typically scan the data portion of the packet for information.10 In this case, the courier variables are the header fields that do not impact system behavior. To ensure zero observability, the altered header information must not contain a pattern that can be detected. For example, if the header information comprises zeros and ones with a given entropy, the same entropy must be observed when the hidden information is added. Any alteration of the entropy from its expected value would indicate the presence of covert communication channels.
Positioning algorithm based on linear embedding optimization in internet of sensor network
Published in International Journal of Computers and Applications, 2021
Figure 4 shows the network packet delivery ratio comparison of the proposed algorithm, RSLM algorithm and SOCP algorithm under high network node density. According to the figure, under high network node density, the network packet delivery ratio of the proposed algorithm tends to be continuously increased, while the network packet delivery ratio of RSLM algorithm and SOCP algorithm tends to be continuously reduced, because the proposed algorithm can better position the nodes under high network node density, and the neighborhood rotating-hop iteration mechanism is especially introduced to reduce the dead chain phenomenon caused by the node searching failure in network data transmission process. However, under high network node density, the algorithm performance of RSLM algorithm and SOCP algorithm is not significantly improved, and the quantity of the nodes of which the position cannot correctly determined is continuously increased, and accordingly the quantity of the dead chain phenomena caused by the searching failure of the corresponding nodes in the data transmission process is continuously increased to reduce the network packet delivery ratio.