134 results on '"Machine-to-machine (M2M)"'
Search Results
2. Using the Internet of Everything for Data Centers
- Author
-
Deng, Rongyu, Chen, Juan, Cheng, Xinghua, Impagliazzo, John, Akan, Ozgur, Editorial Board Member, Bellavista, Paolo, Editorial Board Member, Cao, Jiannong, Editorial Board Member, Coulson, Geoffrey, Editorial Board Member, Dressler, Falko, Editorial Board Member, Ferrari, Domenico, Editorial Board Member, Gerla, Mario, Editorial Board Member, Kobayashi, Hisashi, Editorial Board Member, Palazzo, Sergio, Editorial Board Member, Sahni, Sartaj, Editorial Board Member, Shen, Xuemin, Editorial Board Member, Stan, Mircea, Editorial Board Member, Jia, Xiaohua, Editorial Board Member, Zomaya, Albert Y., Editorial Board Member, Pereira, Teresa, editor, Impagliazzo, John, editor, Santos, Henrique, editor, and Chen, Juan, editor
- Published
- 2024
- Full Text
- View/download PDF
3. A Survey on Energy Management Evolution and Techniques for Green IoT Environment
- Author
-
Shanmugapriya, I., Angrisani, Leopoldo, Series Editor, Arteaga, Marco, Series Editor, Panigrahi, Bijaya Ketan, Series Editor, Chakraborty, Samarjit, Series Editor, Chen, Jiming, Series Editor, Chen, Shanben, Series Editor, Chen, Tan Kay, Series Editor, Dillmann, Rüdiger, Series Editor, Duan, Haibin, Series Editor, Ferrari, Gianluigi, Series Editor, Ferre, Manuel, Series Editor, Hirche, Sandra, Series Editor, Jabbari, Faryar, Series Editor, Jia, Limin, Series Editor, Kacprzyk, Janusz, Series Editor, Khamis, Alaa, Series Editor, Kroeger, Torsten, Series Editor, Li, Yong, Series Editor, Liang, Qilian, Series Editor, Martín, Ferran, Series Editor, Ming, Tan Cher, Series Editor, Minker, Wolfgang, Series Editor, Misra, Pradeep, Series Editor, Möller, Sebastian, Series Editor, Mukhopadhyay, Subhas, Series Editor, Ning, Cun-Zheng, Series Editor, Nishida, Toyoaki, Series Editor, Oneto, Luca, Series Editor, Pascucci, Federica, Series Editor, Qin, Yong, Series Editor, Seng, Gan Woon, Series Editor, Speidel, Joachim, Series Editor, Veiga, Germano, Series Editor, Wu, Haitao, Series Editor, Zamboni, Walter, Series Editor, Zhang, Junjie James, Series Editor, Bindhu, V., editor, Tavares, João Manuel R. S., editor, and Vuppalapati, Chandrasekar, editor
- Published
- 2023
- Full Text
- View/download PDF
4. ES-SECS/GEM: An Efficient Security Mechanism for SECS/GEM Communications
- Author
-
Shams Ul Arfeen Laghari, Selvakumar Manickam, Ayman Khallel Al-Ani, Mahmood A. Al-Shareeda, and Shankar Karuppayah
- Subjects
SECS/GEM communications ,machine-to-machine (M2M) ,Internet of Things (IoT) ,security mechanism ,Electrical engineering. Electronics. Nuclear engineering ,TK1-9971 - Abstract
Industry 4.0, as a driving force, is making massive achievements, notably in the manufacturing sector, where all key components engaged in the production processes are being digitally interconnected. However, when combined with enhanced automation and robotics, machine learning, artificial intelligence, big data, cloud computing, and the Internet of Things (IoT), this open network interconnectivity renders industrial systems more vulnerable to cyberattacks. Cyberattacks may have a variety of different impacts and goals, but they always have negative repercussions for manufacturers. These repercussions include financial losses, disruption of supply chains, loss of reputation and competitiveness, and theft of corporate secrets. Semiconductor Equipment Communication Standard/Generic Equipment Model (SECS/GEM) is a legacy Machine-to-Machine (M2M) communication protocol used profoundly in the semiconductor and other manufacturing industries. SECS/GEM is mainly designed to be utilized in a trusted, controlled, and regulated factory environment separated from external networks. Industry 4.0 has revolutionized the manufacturing industry and has brought SECS/GEM back to the limelight, as SECS/GEM is completely devoid of security features. This research proposes ES-SECS/GEM, an Efficient Security mechanism that provides authentication, integrity, and protection against cyberattacks. The proposed mechanism is compared to other security mechanisms in terms of processing time, control overhead, and resilience against cyber-attacks. The ES-SECS/GEM demonstrated promising results, suggesting that it allowed SECS/GEM devices to only connect with authorized industrial equipment, maintained message integrity, discarded forged messages, and prevented cyberattacks on SECS/GEM communications. In terms of processing time and control, ES-SECS/GEM likewise outperformed other mechanisms and incurred the lowest values for these metrics.
- Published
- 2023
- Full Text
- View/download PDF
5. Evaluation of quality of service parameters for MQTT communication in IoT application by using deep neural network
- Author
-
Pawar, Shital, Jadhav, D. B., Lokhande, Meghana, Raskar, Punam, and Patil, Megha
- Published
- 2024
- Full Text
- View/download PDF
6. Role of the Fourth Industrial Revolution Towards Sustainable Development
- Author
-
Nath, Rintu, Kumar, Amit, Series Editor, Suganthan, Ponnuthurai Nagaratnam, Series Editor, Senatore, Sabrina, Editorial Board Member, Gao, Xiao-Zhi, Editorial Board Member, Mozar, Stefan, Editorial Board Member, Srivastava, Pradeep Kumar, Editorial Board Member, Haase, Jan, Editorial Board Member, Choudhury, Amitava, editor, Singh, T. P., editor, Biswas, Arindam, editor, and Anand, Mrinal, editor
- Published
- 2022
- Full Text
- View/download PDF
7. A User Specific APDS for Smart City Applications
- Author
-
Sahoo, Goutam Kumar, Pradhan, Prasanta Kumar, Das, Santos Kumar, Singh, Poonam, Kacprzyk, Janusz, Series Editor, Pal, Nikhil R., Advisory Editor, Bello Perez, Rafael, Advisory Editor, Corchado, Emilio S., Advisory Editor, Hagras, Hani, Advisory Editor, Kóczy, László T., Advisory Editor, Kreinovich, Vladik, Advisory Editor, Lin, Chin-Teng, Advisory Editor, Lu, Jie, Advisory Editor, Melin, Patricia, Advisory Editor, Nedjah, Nadia, Advisory Editor, Nguyen, Ngoc Thanh, Advisory Editor, Wang, Jun, Advisory Editor, Kumar, Raghvendra, editor, Quang, Nguyen Ho, editor, Kumar Solanki, Vijender, editor, Cardona, Manuel, editor, and Pattnaik, Prasant Kumar, editor
- Published
- 2021
- Full Text
- View/download PDF
8. Resource Management for Massive Internet of Things in IEEE 802.11ah WLAN: Potentials, Current Solutions, and Open Challenges.
- Author
-
Farhad, Arshad and Pyun, Jae-Young
- Subjects
- *
INTERNET of things , *RESOURCE management , *NETWORK performance , *RESOURCE allocation , *ENERGY consumption , *ACCESS control , *MACHINE-to-machine communications - Abstract
IEEE 802.11ah, known as Wi-Fi HaLow, is envisioned for long-range and low-power communication. It is sub-1 GHz technology designed for massive Internet of Things (IoT) and machine-to-machine devices. It aims to overcome the IoT challenges, such as providing connectivity to massive power-constrained devices distributed over a large geographical area. To accomplish this objective, IEEE 802.11ah introduces several unique physical and medium access control layer (MAC) features. In recent years, the MAC features of IEEE 802.11ah, including restricted access window, authentication (e.g., centralized and distributed) and association, relay and sectorization, target wake-up time, and traffic indication map, have been intensively investigated from various aspects to improve resource allocation and enhance the network performance in terms of device association time, throughput, delay, and energy consumption. This survey paper presents an in-depth assessment and analysis of these MAC features along with current solutions, their potentials, and key challenges, exposing how to use these novel features to meet the rigorous IoT standards. [ABSTRACT FROM AUTHOR]
- Published
- 2022
- Full Text
- View/download PDF
9. Device Clouds : Cloud-Plattformen schlagen die Brücke zwischen Industrie 4.0 und dem Internet der Dinge
- Author
-
Kubach, Uwe, ten Hompel, Michael, Section editor, Feldmann, Felix, Section editor, ten Hompel, Michael, editor, Bauernhansl, Thomas, editor, and Vogel-Heuser, Birgit, editor
- Published
- 2020
- Full Text
- View/download PDF
10. Messaging, Internet of Things, and Positioning Determination Services via Small Satellite Constellations
- Author
-
Pelton, Joseph N., Pelton, Joseph N., editor, and Madry, Scott, editor
- Published
- 2020
- Full Text
- View/download PDF
11. Dynamic Tree-Splitting Algorithm for Massive Random Access of M2M Communications in IoT Networks.
- Author
-
Althumali, Huda, Othman, Mohamed, Noordin, Nor Kamariah, and Mohd Hanapi, Zurina
- Abstract
Enabling machine-to-machine (M2M) communications on cellular networks will provide a promising future for smart cities and the Internet of Things. M2M systems involve a huge number of connected devices that may synchronously be activated to react to some event. This massive synchronous access causes intensive congestion and collisions in the random access channel (RACH), which is used as a first step to access network resources. In this article, we introduce a dynamic tree-splitting (DTS) algorithm to resolve RACH collisions for delay-sensitive devices during burst arrival scenarios. The DTS algorithm assigns a specific number of preambles to the collided devices for their next access attempt. The number of preambles is determined based on the mean number of collisions in each random access opportunity, with the aim of increasing the utilization of preambles. A mathematical analysis of the proposed algorithm is presented as well as the derivations of throughput and access delay. The analysis and simulation results show that DTS reduced access delay and increased RACH throughput by approximately 12%, compared to recent benchmarks, with a mean of three preamble transmissions and a success rate above 0.98, which indicates the efficiency and reliability of the proposed algorithm. [ABSTRACT FROM AUTHOR]
- Published
- 2022
- Full Text
- View/download PDF
12. Forensic Analysis on Internet of Things (IoT) Device Using Machine-to-Machine (M2M) Framework.
- Author
-
Mazhar, Muhammad Shoaib, Saleem, Yasir, Almogren, Ahmad, Arshad, Jehangir, Jaffery, Mujtaba Hussain, Rehman, Ateeq Ur, Shafiq, Muhammad, and Hamam, Habib
- Subjects
INTERNET of things ,COMPUTER performance ,MACHINE-to-machine communications ,MACHINE learning ,COMPUTER storage devices ,DECISION trees - Abstract
The versatility of IoT devices increases the probability of continuous attacks on them. The low processing power and low memory of IoT devices have made it difficult for security analysts to keep records of various attacks performed on these devices during forensic analysis. The forensic analysis estimates how much damage has been done to the devices due to various attacks. In this paper, we have proposed an intelligent forensic analysis mechanism that automatically detects the attack performed on IoT devices using a machine-to-machine (M2M) framework. Further, the M2M framework has been developed using different forensic analysis tools and machine learning to detect the type of attacks. Additionally, the problem of an evidence acquisition (attack on IoT devices) has been resolved by introducing a third-party logging server. Forensic analysis is also performed on logs using forensic server (security onion) to determine the effect and nature of the attacks. The proposed framework incorporates different machine learning (ML) algorithms for the automatic detection of attacks. The performance of these models is measured in terms of accuracy, precision, recall, and F1 score. The results indicate that the decision tree algorithm shows the optimum performance as compared to the other algorithms. Moreover, comprehensive performance analysis and results presented validate the proposed model. [ABSTRACT FROM AUTHOR]
- Published
- 2022
- Full Text
- View/download PDF
13. Leveraging Low-Power Wide Area Networks for Precision Farming: Limabora—A Smart Farming Case Using LoRa Modules, Gateway, TTN and Firebase in Kenya
- Author
-
Mabele, Leonard, Mutegi, Lorna, Kacprzyk, Janusz, Series Editor, Pal, Nikhil R., Advisory Editor, Bello Perez, Rafael, Advisory Editor, Corchado, Emilio S., Advisory Editor, Hagras, Hani, Advisory Editor, Kóczy, László T., Advisory Editor, Kreinovich, Vladik, Advisory Editor, Lin, Chin-Teng, Advisory Editor, Lu, Jie, Advisory Editor, Melin, Patricia, Advisory Editor, Nedjah, Nadia, Advisory Editor, Nguyen, Ngoc Thanh, Advisory Editor, Wang, Jun, Advisory Editor, Auer, Michael E., editor, and Tsiatsos, Thrasyvoulos, editor
- Published
- 2019
- Full Text
- View/download PDF
14. From IoT-based cloud manufacturing approach to intelligent additive manufacturing: industrial Internet of Things—an overview.
- Author
-
Haghnegahdar, Lida, Joshi, Sameehan S., and Dahotre, Narendra B.
- Subjects
- *
INTERNET of things , *ARTIFICIAL intelligence , *MECHANICAL movements , *ADVANCED planning & scheduling , *MANUFACTURING processes , *INDUSTRY 4.0 , *PRODUCTION planning , *THREE-dimensional printing - Abstract
The industrial Internet of Things (IIoT) has grown to empower advantages of advanced manufacturing machinery and smarter control. The cloud-based technology of remote data collection, intelligent machine interconnectivity, and sensor monitoring provide the opportunity for a pattern modification across all manufacturing divisions including the latest and rapidly growing technology of additive manufacturing (AM) or 3D printing. AM is a type of direct manufacturing and revolutionary technology that enables complicated production and a formation which can shorten manufacturing processes and supply chain procedures. Data is a key factor in the age of big data, embedded IIoT solutions, and services in the new machinery and mechanism that bring an additional capability to integrate and manage data streams within the Internet of Things (IoT) cloud-based platform. Movement and merging conventional (legacy) manufacturing technology into the shared and modern machinery required for the state-of-the-art manufacturing technology such as AM is complex and challenging, but it needs to be organized and fixed resourcefully, while it remains linked, flexible, and scalable. AM is an advanced manufacturing system and technology involving the new era of complex machinery and operating systems. AM has been identified as a special value to the industry which has many applications in the different industries such as aerospace, medical and healthcare, energy, and automotive. Hence, high-performance computation and processing will be very important in AM. This research takes an overview of the cloud-based model and concept of cloud computing (CC), cloud manufacturing (CM), IoT, and their relations and influences in the AM industry 4.0 era. This study contributes as a theoretical basis and as a comprehensive framework for AM integration. Furthermore, this paper presents CM applications and integration with AM and proposes an integrated AM cloud platform. [ABSTRACT FROM AUTHOR]
- Published
- 2022
- Full Text
- View/download PDF
15. An Enhanced Cooperative Communication Scheme for Physical Uplink Shared Channel in NB-IoT.
- Author
-
Hassan, Mona Bakri, Alsharif, Sameer, Alhumyani, Hesham, Ali, Elmustafa Sayed, Mokhtar, Rania A., and Saeed, Rashid A.
- Subjects
WIDE area networks ,INTERNET of things ,SUPPLY & demand ,COOPERATIVE societies ,MATHEMATICAL optimization ,MULTICASTING (Computer networks) - Abstract
Narrowband-IoT (NB-IoT) is a standard-based Low Power Wide Area Network technology developed to connect a wide range of new Internet of Things (IoT) devices and services. NB-IoT bandwidth is limited to a single narrow-band of 180 kHz. Although NB-IoT provides low-cost connectivity, it provides channel to large number of smart IoT installed in households, building etc. However, in NB-IoT systems, repeating same signal over additional period of time has been taken as a key technique to enhance radio coverage up to 20 dB compared to the conventional LTE. Performance of NB-IoT system optimization and modeling are still challenging particularly coverage improvement in the case of real applications. For example, the narrow bandwidth in IoT and low energy have led to problematic issues in communication between IoT devices and network station, which results in low transmitter channel quality. Repetition process is used in the paper to enhance coverage and throughput, however in mean time increase the number of repetitions demands high bandwidth. So, an enhanced cooperative relay is used with repetition to reduce the demanded bandwidth. In this paper, we proposed an enhanced repetitions cooperative process of narrowband physical uplink shared channel (NPUSCH). The NPUSCH is transmitted using one or more resource units (RUs) and each of these RUs are repeated up to 128 times to enhance coverage as well as to meet requirement of ultra-low end IoT. The optimum number of repetitions of identical slots for NPUSCH per RUs is calculated and then simulated. In addition, the paper describes the analytical simulation to evaluate the proposed repetition of cooperative process performance for LTE-NPUSCH channel. Results show dramatical enhancement of uplink NB-IoT channel quality where the performance evaluation metrics were BLER, data rate, system throughput, spectral efficiency and transmission delay. The enhanced cooperative communication scheme for NPUSCH transmission channel in NB-IoT is achieved an average 23% enhancement in overall network throughput. [ABSTRACT FROM AUTHOR]
- Published
- 2021
- Full Text
- View/download PDF
16. Comparative Analysis of Application Layer Internet of Things (IoT) Protocols
- Author
-
Chaudhary, Himadri, Vaishnav, Naman, Tank, Birju, Kacprzyk, Janusz, Series editor, Mishra, Durgesh Kumar, editor, Nayak, Malaya Kumar, editor, and Joshi, Amit, editor
- Published
- 2018
- Full Text
- View/download PDF
17. Measurement and Classification of Smart Systems Data Traffic Over 5G Mobile Networks
- Author
-
Dighriri, Mohammed, Lee, Gyu Myoung, Baker, Thar, Dastbaz, Mohammad, editor, Arabnia, Hamid, editor, and Akhgar, Babak, editor
- Published
- 2018
- Full Text
- View/download PDF
18. Resource Management for Massive Internet of Things in IEEE 802.11ah WLAN: Potentials, Current Solutions, and Open Challenges
- Author
-
Arshad Farhad and Jae-Young Pyun
- Subjects
IEEE 802.11ah ,Internet of Things ,machine-to-machine (M2M) ,low-power communication ,medium access control layer (MAC) ,Chemical technology ,TP1-1185 - Abstract
IEEE 802.11ah, known as Wi-Fi HaLow, is envisioned for long-range and low-power communication. It is sub-1 GHz technology designed for massive Internet of Things (IoT) and machine-to-machine devices. It aims to overcome the IoT challenges, such as providing connectivity to massive power-constrained devices distributed over a large geographical area. To accomplish this objective, IEEE 802.11ah introduces several unique physical and medium access control layer (MAC) features. In recent years, the MAC features of IEEE 802.11ah, including restricted access window, authentication (e.g., centralized and distributed) and association, relay and sectorization, target wake-up time, and traffic indication map, have been intensively investigated from various aspects to improve resource allocation and enhance the network performance in terms of device association time, throughput, delay, and energy consumption. This survey paper presents an in-depth assessment and analysis of these MAC features along with current solutions, their potentials, and key challenges, exposing how to use these novel features to meet the rigorous IoT standards.
- Published
- 2022
- Full Text
- View/download PDF
19. Pulse Index Modulation.
- Author
-
Aldirmaz-Colak, Sultan, Aydin, Erdogan, Celik, Yasin, Acar, Yusuf, and Basar, Ertugrul
- Abstract
Emerging systems such as Internet-of-things (IoT) and machine-to-machine (M2M) communications have strict requirements on the power consumption of used equipments and associated complexity in the transceiver design. To meet these requirements, we propose a novel index modulation (IM) scheme, namely pulse index modulation (PIM) for single-input single-output (SISO) schemes. The proposed model uses well-localized and orthogonal Hermite-Gaussian pulses for data transmission and provides high spectral efficiency owing to the Hermite-Gaussian pulse indices. Considering the high complexity of maximum-likelihood (ML) detector, we propose a matched filtering-based low complexity detector to implement the PIM scheme in practice. Besides, it has been shown via analytical derivations and computer simulations that the proposed PIM system has better error performance and considerable signal-to-noise ratio (SNR) gain compared to existing spatial modulation (SM), code index modulation aided spread-spectrum (CIM-SS), CIM-SM, and traditional M-ary systems. [ABSTRACT FROM AUTHOR]
- Published
- 2021
- Full Text
- View/download PDF
20. Device Clouds: Cloud-Plattformen schlagen die Brücke zwischen Industrie 4.0 und dem Internet der Dinge
- Author
-
Kubach, Uwe, Vogel-Heuser, Birgit, editor, Bauernhansl, Thomas, editor, and ten Hompel, Michael, editor
- Published
- 2017
- Full Text
- View/download PDF
21. A Statistical Framework for Performance Analysis of Diversity Framed Slotted Aloha With Interference Cancellation.
- Author
-
Cassara, Pietro, Gotta, Alberto, and de Cola, Tomaso
- Subjects
- *
INTERNET of things , *TELECOMMUNICATION satellites , *MACHINE-to-machine communications , *SCIENTIFIC community , *TELEMETRY - Abstract
As the Internet of Things (IoT)/machine-to-machine market is rapidly growing, a special role is expected to be played by satellite communications in that they offer ubiquitous coverage and therefore enable typical monitoring, telemetry, and control services also in areas with a poor terrestrial infrastructure. In this respect, the case of massive IoT devices deployment calls for random access solutions, which have been long analyzed by the scientific satellite community in the last ten years. This article further elaborates on the relation between the normalized offered load and the achievable performance in terms of packet loss rate, which was not much addressed so far at high loads. The proposed theoretical framework has been validated through extensive simulation campaigns, which show an excellent match at different loads and number of interfering packets configurations, by significantly improving the results achievable through other existing theoretical frameworks. [ABSTRACT FROM AUTHOR]
- Published
- 2020
- Full Text
- View/download PDF
22. Beam‐aware energy harvesting discontinuous reception in machine‐to‐machine millimeter‐wave 5G communications.
- Author
-
Philip, Ninu Rachel and Balakrishnan, Malarkodi
- Subjects
- *
ENERGY harvesting , *MACHINE-to-machine communications , *5G networks , *SLEEP-wake cycle , *ENERGY consumption , *INFORMATION networks , *KEY performance indicators (Management) - Abstract
Summary: Machine‐to‐machine (M2M) communication interconnects a large number of machines to exchange information in a network. These battery operated devices exhaust their energy after continuous usage for a long period of time. Discontinuous reception (DRX) standardized by the third generation partnership project (3GPP) is an efficient power saving protocol used in wireless networks. The power saving achieved by the DRX mechanism is often compromised with the ensuing buffering delay suffered by the packets. DRX mechanism with energy harvesting improves the performance of the M2M devices by exploiting the extra sleep cycles yielded by the harvested energy. However, the operation of the energy harvesting‐DRX (EH‐DRX) in the fifth generation (5G) millimeter‐wave (mm‐wave) systems with beamforming results in poor performance metrics. Beamforming is used in 5G mm‐wave networks for a base station to communicate with a group of devices situated in a particular direction. In this paper, an analytical model is devised by merging a beam‐aware mechanism with the EH‐DRX in the M2M mm‐wave 5G networks to improve the energy efficiency. As a result, the power saving at the user equipment (UE)/M2M device is enhanced by 16% by the proposed method compared with the original EH‐DRX mechanism. [ABSTRACT FROM AUTHOR]
- Published
- 2020
- Full Text
- View/download PDF
23. GSMAC: Group-Scheduled MAC Protocol with Energy Beamforming in M2M Networks.
- Author
-
Zhou, Ce, Kim, Yunmin, and Lee, Tae-Jin
- Subjects
BEAMFORMING ,DATA packeting ,ENERGY harvesting ,MULTICASTING (Computer networks) ,ACCESS control ,ENERGY transfer - Abstract
In Machine-to-Machine (M2M) networks, an enormous number of stations with low energy budgets contend for the channel access in order to get the transmission opportunity, leading to huge amount of congestion. Energy beamforming technology enables wireless devices to replenish their energy much faster than the traditional energy harvesting strategies. In this paper, a group-scheduled Medium Access Control (GSMAC) protocol is proposed as a solution of managing the access of stations that transmit bursts of data packets while taking into account the benefit of energy beamforming technology in M2M networks. In the proposed protocol, nodes are grouped by multiple Power Beacons in order to reduce the high collision probability. Nodes first contend the channel access in each group for reservation opportunities so that the reserved nodes can transmit data and harvest energy simultaneously by Access Point scheduling the data and energy transfer order. Simulation and analytical results show that GSMAC has significant improvements compared with the traditional distributed coordination function in terms of saturation throughput, delay, and energy-related performances. [ABSTRACT FROM AUTHOR]
- Published
- 2020
- Full Text
- View/download PDF
24. 60-GHz UWB System Performance Analysis for Gigabit M2M Communications
- Author
-
Geng, Suiyan, Cheng, Linlin, Li, Xing, Zhao, Xiongwen, and Zeng, Qing-An, editor
- Published
- 2016
- Full Text
- View/download PDF
25. A Cloud Based Type-2 Diabetes Mellitus Lifestyle Self-Management System
- Author
-
Chang, Shih-Hao, Li, Chih-Ning, Hutchison, David, Series editor, Kanade, Takeo, Series editor, Kittler, Josef, Series editor, Kleinberg, Jon M., Series editor, Mattern, Friedemann, Series editor, Mitchell, John C., Series editor, Naor, Moni, Series editor, Pandu Rangan, C., Series editor, Steffen, Bernhard, Series editor, Terzopoulos, Demetri, Series editor, Tygar, Doug, Series editor, Weikum, Gerhard, Series editor, Li, Xiao-Li, editor, Cao, Tru, editor, Lim, Ee-Peng, editor, Zhou, Zhi-Hua, editor, Ho, Tu-Bao, editor, and Cheung, David, editor
- Published
- 2015
- Full Text
- View/download PDF
26. Modeling Radio Resource Allocation Scheme with Fixed Transmission Zones for Multiservice M2M Communications in Wireless IoT Infrastructure
- Author
-
Shorgin, Sergey, Samouylov, Konstantin, Gaidamaka, Yuliya, Chukarin, Alexey, Buturlin, Ivan, Begishev, Vyacheslav, Goebel, Randy, Series editor, Tanaka, Yuzuru, Series editor, Wahlster, Wolfgang, Series editor, Nguyen, Ngoc Thanh, editor, Trawiński, Bogdan, editor, and Kosala, Raymond, editor
- Published
- 2015
- Full Text
- View/download PDF
27. Evaluation of Image Quality Assessment Metrics for Semantic Segmentation in a Machine-to-Machine Communication Scenario
- Author
-
Marie, Alban, Desnos, Karol, Morin, Luce, Zhang, Lu, Institut National des Sciences Appliquées - Rennes (INSA Rennes), Institut National des Sciences Appliquées (INSA), Université de Rennes (UR), Institut d'Électronique et des Technologies du numéRique (IETR), Université de Rennes (UR)-Institut National des Sciences Appliquées - Rennes (INSA Rennes), Institut National des Sciences Appliquées (INSA)-Institut National des Sciences Appliquées (INSA)-CentraleSupélec-Centre National de la Recherche Scientifique (CNRS)-Nantes Université - pôle Sciences et technologie, and Nantes Université (Nantes Univ)-Nantes Université (Nantes Univ)
- Subjects
[INFO.INFO-TS]Computer Science [cs]/Signal and Image Processing ,Image Quality Assessment (IQA) ,Machine-to-Machine (M2M) ,[INFO.INFO-CV]Computer Science [cs]/Computer Vision and Pattern Recognition [cs.CV] ,[INFO]Computer Science [cs] ,block-based ,compression ,Rate-Distortion Optimization (RDO) ,Video Coding for Machines (VCM) ,[INFO.INFO-AI]Computer Science [cs]/Artificial Intelligence [cs.AI] - Abstract
International audience; Image and video compression aims at finding an optimal trade-off between rate and distortion. This is done through Rate-Distortion Optimization (RDO) in traditional encoders with the use of Image Quality Assessment (IQA) metrics. While it is known that most IQA metrics are designed to be correlated with human perception, there is no evidence that this observation can be generalized in a Video Coding for Machines (VCM) context, where the receiver is not a human anymore but a machine. In this paper, we propose an evaluation protocol to measure the correlation level between conventional Full-Reference (FR) IQA metrics and machine perception through the semantic segmentation vision task. Experiments showed a relatively low correlation between them when measured on the block-level. This observation implies the need of RDO algorithms that are better suited for Machine-to-Machine (M2M) communications. In order to facilitate the emergence of IQA metrics that better reflect machine perception, the code and dataset used to perform this study is made freely available at https://github.com/albmarie/iqa m2m segmentation.
- Published
- 2023
28. Challenges of M2M Technologies for eHealth
- Author
-
Pérez-Cebollada, Eduardo, Martínez-Ruiz, Ignacio, Bernal-Agustín, José L., Park, James J. (Jong Hyuk), editor, Pan, Yi, editor, Kim, Cheon-Shik, editor, and Yang, Yun, editor
- Published
- 2014
- Full Text
- View/download PDF
29. A Delay Optimal Multiclass Packet Scheduler for General M2M Uplink.
- Author
-
Kumar, Akshay, Abdelhadi, Ahmed, and Clancy, Charles
- Abstract
The uplink data arriving at the Machine-to-Machine (M2M) Application Server (AS) via M2M Aggregators (MAs) is fairly heterogeneous along several dimensions such as maximum permissible packet delay, arrival rate, and payload size, thus necessitating the design of Quality-of-Service (QoS) aware packet schedulers. In this paper, we classify the M2M uplink data into multiple QoS classes and use sigmoidal function to map the delay requirements of each class onto utility functions. We propose a delay-optimal multiclass packet scheduler at AS obtained by iteratively searching for the optimal fraction of time-sharing between all preemptive priority scheduling policies, such that it maximizes a proportionally fair system utility metric. The iterative optimization process leads to reduced complexity, thus facilitating its online implementation. We then extend this work to determine a jointly optimal packet scheduler at the MAs and AS. We significantly reduce its computational complexity by iteratively solving a distributed optimization problem, independently at MAs and AS. Using Monte Carlo simulations, we show that the proposed joint packet scheduler outperforms other state-of-the-art packet schedulers and results in (desirable) near-minimal delay-jitter for delay-sensitive traffic at the expense of (tolerable) higher delay-jitter for delay-tolerant traffic. [ABSTRACT FROM AUTHOR]
- Published
- 2019
- Full Text
- View/download PDF
30. Securing the Industrial-Tactile Internet of Things With Deterministic Silicon Photonics Switches
- Author
-
Ted H. Szymanski
- Subjects
Security ,smart systems ,machine-to-machine (M2M) ,deterministic virtual private networks ,green industrial Internet of Things ,green tactile Internet of Things ,Electrical engineering. Electronics. Nuclear engineering ,TK1-9971 - Abstract
Today's best-effort (BE) Internet of Things (IoT) faces challenges in providing the end-to-end-performance, security, and energy efficiency needed for the Smart Systems of the 21st century. These future smart systems will include smart cities, smart transportation systems, and smart manufacturing. This paper surveys the security weaknesses of the BE IoT. The BE-IoT cannot be partitioned into distinct interference-free virtual networks, which compromises performance, cyber-security, and energy efficiency. The design of a secure deterministic industrial-tactile IoT core network, which can embed millions of distinct secure deterministic virtual networks (SD-VNs) in layer 2, is then presented. Deterministic communications, combined with low-jitter scheduling, offers several benefits: 1) the removal of all congestion, interference, and DOS attacks; 2) a significant reduction in IoT router buffer sizes; 3) a significant reduction in IoT energy use; 4) a reduction of end-to-end IoT delays to the speed of light in fiber; and 5) deterministic packet-switches are relatively easy to synthesize using FPGA technologies. These benefits apply to optical and 5G wireless networks. Future smart systems can reserve their own congestion-free SD-VNs in layer 2 to manage their traffic, with significantly improved performance, security, and energy efficiency. A speed-of-light deterministic IoT core network can transform cloud services in the 21st century by exploiting a new technology: FPGAs combined with silicon photonics transceivers to achieve terabits/second of optical bandwidth. To illustrate the transformational potential, Big Data green cloud computing over a secure deterministic IoT spanning the European Union is explored.
- Published
- 2016
- Full Text
- View/download PDF
31. An Architecture for QoS-Enabled Mobile Video Surveillance Applications in a 4G EPC and M2M Environment
- Author
-
Mohammad Abu-Lebdeh, Fatna Belqasmi, and Roch Glitho
- Subjects
Video surveillance ,4G ,evolved packet core (EPC) ,machine-to-machine (M2M) ,Electrical engineering. Electronics. Nuclear engineering ,TK1-9971 - Abstract
Mobile video surveillance applications are used widely nowadays. They offer real-time video monitoring for homes, offices, warehouses, airports, and so on with live and pre-recorded on-demand video streaming. Quality of service (QoS) remains a key challenge faced by most of these applications. In this article, we propose an architecture for mobile video surveillance applications with a guaranteed and differentiated QoS support. The architecture relies on the 3GPP 4G evolved packet core (EPC). The main components are the QoS enabler, media server, and machine-to-machine gateway and surveillance application. To demonstrate its feasibility, a proof of concept prototype has been implemented and deployed. We also took measurements to evaluate the performance. Several lessons were learned. For instance, multimedia frameworks must allow for buffering controls in media streaming to reduce live streaming delay. In addition, we have learned that publicly available materials related to the EPC prototyping platform we have used (i.e., OpenEPC) are scarce. This has made our prototyping task rather difficult.
- Published
- 2016
- Full Text
- View/download PDF
32. Assistive Tools for Machine Communication for Preventing Children and Disabled Persons from Electric Hazard Using Cyber Physical System
- Author
-
Hemalatha, S., Tamilselvi, T., Kumar, R. Saravana, Julaiha M. E, A. G. Noorul, Thangamani, M., Lakshmi , S., and Gulati, Kamal
- Subjects
Machine Learning ,Wireless Network ,Home Automation System ,Electric Hazard ,Machine-to-Machine (M2M) ,Cyber Physical System (CPS) - Abstract
The determination of this research is to conduct a survey on how current technical electrical equipment are replacing human daily housework. Different electrical gadgets are installed in each home, depending on the necessities. At the same time, the number of people who are exposed to electric hazards is growing. According to a report, children and disabled people are the main sources of electric danger pointing devices. It cautions due to a lack of information regarding electric equipment. As a result, monitoring systems must be developed in order to prevent electric hazards for children and handicapped people. Machine learning techniques are used to learn about and control machine activity. Communication between heterogeneous systems is provided by a cyber-physical system. These two technologies are combined in the proposed effort to create a gadget that can manage electric hazards for children and the disabled. Motion sensors are used in the proposed work to continually monitor the object's movement. If an object comes close to an electric machine, such as a washing machine, refrigerator, or ironing board, the circuit will automatically cut off unless the object moves away from the electric equipment. In addition, the gadget may create a sound signal to warn youngsters about the dangers of electronic devices and disable them. The suggested work, in addition to machine learning and cyber physical systems, makes use of the Internet of Things to link the status of devices and objects to the responsible personnel, all of whom are in an inaccessible place. The Internet of Things may help with communication, control, and data processing integration across several systems. The Internet of Things allows things to be sensed and controlled remotely. The Internet of Things (IoT) Wireless House Automation System (WHAS) is a system that combines computers and GPRS to automate basic house functions and features. An automated house is frequently referred to as a smart home since it uses GPRS to connect to the internet from anywhere in the globe. A cloud-based home automation system with IoT that uses the Wireless Sensors which is used to connect the controller and the user section. Children and handicapped people will have a safer existence as a result of the use of technological equipment
- Published
- 2023
33. A Novel Machine-to-Machine Traffic Multiplexing in LTE-A System Using Wireless In-Band Relaying
- Author
-
Marwat, Safdar Nawaz Khan, Zaki, Yasir, Chen, Jay, Timm-Giel, Andreas, Göerg, Carmelita, Akan, Ozgur, Series editor, Bellavista, Paolo, Series editor, Cao, Jiannong, Series editor, Dressler, Falko, Series editor, Ferrari, Domenico, Series editor, Gerla, Mario, Series editor, Kobayashi, Hisashi, Series editor, Palazzo, Sergio, Series editor, Sahni, Sartaj, Series editor, Shen, Xuemin (Sherman), Series editor, Stan, Mircea, Series editor, Xiaohua, Jia, Series editor, Zomaya, Albert, Series editor, Coulson, Geoffrey, Series editor, Pesch, Dirk, editor, Timm-Giel, Andreas, editor, Calvo, Ramón Agüero, editor, Wenning, Bernd-Ludwig, editor, and Pentikousis, Kostas, editor
- Published
- 2013
- Full Text
- View/download PDF
34. Towards the Web of Things: Open Research Issues and the BAS-AMI Use Case
- Author
-
Sun, Jun-Zhao and Zhang, Ying, editor
- Published
- 2012
- Full Text
- View/download PDF
35. Environmental Impact Assessment Model for Wireless Sensor Networks
- Author
-
Bonvoisin, Jérémy, Lelah, Alan, Mathieux, Fabrice, Brissaud, Daniel, Hesselbach, Jürgen, editor, and Herrmann, Christoph, editor
- Published
- 2011
- Full Text
- View/download PDF
36. A Review of Wireless and Satellite-Based M2M/IoT Services in Support of Smart Grids.
- Author
-
Sohraby, Kazem, Minoli, Daniel, Occhiogrosso, Benedict, and Wang, Wei
- Subjects
- *
SMART power grids , *WIRELESS communications , *DATA acquisition systems , *INTERNET of things ,ENERGY consumption management - Abstract
The Smart Grid (SG) is an evolution of the electricity network that dynamically integrates the activities and energy control of power consumers, power generators, distribution systems, and devices connected to the grid (e.g., substations, transformers, and so on). The goal of the SG is to economically and efficiently deliver a sustainable, reliable, and secure electricity supply. Machine-to-Machine (M2M) technology is designed for automated data exchange between devices, and thus has applicability to SGs. With M2M technology, organizations track and manage assets; inventories; transportation fleets; oil and gas pipelines; mines; wide-spread infrastructure; natural phenomena such as weather conditions, crop production, forestry condition, and water flows; and, as noted, SGs. Wireless communication is a staple of M2M. These wireless technologies range from unlicensed local connectivity, to licensed 3G/4G/5G cellular, to Low Earth Orbit (LEO) satellites. All of these technologies are relevant to the SG. Utilities have started to gradually support M2M and Supervisory Control And Data Acquisition (SCADA) systems over satellite links. This article focuses on wireless and satellite-based M2M services, as applicable to the Smart Grid, including the use of Internet of Things (IoT), particularly for the transmission and distribution (T&D) space sector; some comparisons to wireline solutions are also discussed. [ABSTRACT FROM AUTHOR]
- Published
- 2018
- Full Text
- View/download PDF
37. A Novel Latin-Square-Based Secret Sharing for M2M Communications.
- Author
-
Shen, Jian, Zhou, Tianqi, Liu, Xingang, and Chang, Yao-Chung
- Abstract
Machine-to-machine (M2M) communication, an automated communications technology for the equipment or devices, holds great promise in every corner of the modern society, such as civil transportation, smart homes, smart grids, and industrial automation. The M2M technology is still in its infancy, and further development and deployment of M2M systems hinges on establishing an efficient and secure information management system with a satisfactory security level. In this paper, we extend the idea of $(t,n)$ secret sharing for information transmission in M2M with high security and efficiency. Specifically, a secret is divided into $2k$ shares, and then, transmitted through $2k$ node-disjoint paths constructed by the Latin square. Note that in our scheme, the secret key is simultaneously transmitted along with the encrypted message through these $2k$ paths from the source node to the destination node, which greatly improves the efficiency of point-to-point communications in M2M systems. Furthermore, owing to the properties of $(t,n)$ secret sharing, the security of M2M communications is guaranteed. In addition, to avoid dishonest participants, verifiable secret sharing is supported in the proposed scheme. Sufficient theoretical proof and performance analysis demonstrate that our scheme is secure and efficient for M2M communications. [ABSTRACT FROM AUTHOR]
- Published
- 2018
- Full Text
- View/download PDF
38. An Ultra-Low-Power 4.7mA-Rx 22.4mA-Tx Transceiver Circuit in 65-nm CMOS for M2M Satellite Communications.
- Author
-
Ouvry, L., Lachartre, D., Bernier, C., Lepin, F., Dehmas, F., and Deslandes, V.
- Abstract
As of today, the machine-to-machine and Internet of Things (IoT) markets have significantly benefited from the deployment of diverse and efficient terrestrial low-power wide area networks (LPWAN) thanks to technologies such as SIGFOX UNB, LoRa, or NB-IoT. To further increase the coverage of such networks to remote areas, a satellite-based network with close interconnection to a terrestrial one is required. In this brief, we show the feasibility of a satellite link based on system and technological concepts similar to those used for LPWAN. We additionally prove the possibility of integrating the terminal transceiver in a single CMOS IC with power consumption and cost of the same order of magnitude as the terrestrial one. To this end, a complete L-band transceiver has been implemented. The transmitter modulates 400 symbols/s QPSK signals at as high as +12 dBm output power for 22.4 mA consumption under 3.3 V. The receiver consumes 4.7 mA while detecting the presence of low Earth orbit satellite pilots and demodulating the 20 ksymbols/s QPSK signal with −112 dBm sensitivity. The baseband processing handles up to 40 kHz Doppler shift and +/ − 440 Hz/s Doppler drift. The IC is processed in 65-nm CMOS technology from Taiwan Semiconductor Manufacturing Company Limited. [ABSTRACT FROM PUBLISHER]
- Published
- 2018
- Full Text
- View/download PDF
39. A Survey on M2M Systems for mHealth: A Wireless Communications Perspective
- Author
-
Elli Kartsakli, Aris S. Lalos, Angelos Antonopoulos, Stefano Tennina, Marco Di Renzo, Luis Alonso, and Christos Verikoukis
- Subjects
Machine-to-machine (M2M) ,mHealth ,eHealth ,healthcare ,WBAN ,end-to-end communications ,IEEE 802.15.6 ,Chemical technology ,TP1-1185 - Abstract
In the new era of connectivity, marked by the explosive number of wireless electronic devices and the need for smart and pervasive applications, Machine-to-Machine (M2M) communications are an emerging technology that enables the seamless device interconnection without the need of human interaction. The use of M2M technology can bring to life a wide range of mHealth applications, with considerable benefits for both patients and healthcare providers. Many technological challenges have to be met, however, to ensure the widespread adoption of mHealth solutions in the future. In this context, we aim to provide a comprehensive survey on M2M systems for mHealth applications from a wireless communication perspective. An end-to-end holistic approach is adopted, focusing on different communication aspects of the M2M architecture. Hence, we first provide a systematic review ofWireless Body Area Networks (WBANs), which constitute the enabling technology at the patient’s side, and then discuss end-to-end solutions that involve the design and implementation of practical mHealth applications. We close the survey by identifying challenges and open research issues, thus paving the way for future research opportunities.
- Published
- 2014
- Full Text
- View/download PDF
40. Forensic Analysis on Internet of Things (IoT) Device Using Machine-to-Machine (M2M) Framework
- Author
-
Muhammad Shoaib Mazhar, Yasir Saleem, Ahmad Almogren, Jehangir Arshad, Mujtaba Hussain Jaffery, Ateeq Ur Rehman, Muhammad Shafiq, and Habib Hamam
- Subjects
Computer Networks and Communications ,Hardware and Architecture ,Control and Systems Engineering ,Signal Processing ,cyber security ,machine learning ,internet of things (IoT) ,forensic analysis ,machine-to-machine (M2M) ,attack detection ,Electrical and Electronic Engineering - Abstract
The versatility of IoT devices increases the probability of continuous attacks on them. The low processing power and low memory of IoT devices have made it difficult for security analysts to keep records of various attacks performed on these devices during forensic analysis. The forensic analysis estimates how much damage has been done to the devices due to various attacks. In this paper, we have proposed an intelligent forensic analysis mechanism that automatically detects the attack performed on IoT devices using a machine-to-machine (M2M) framework. Further, the M2M framework has been developed using different forensic analysis tools and machine learning to detect the type of attacks. Additionally, the problem of an evidence acquisition (attack on IoT devices) has been resolved by introducing a third-party logging server. Forensic analysis is also performed on logs using forensic server (security onion) to determine the effect and nature of the attacks. The proposed framework incorporates different machine learning (ML) algorithms for the automatic detection of attacks. The performance of these models is measured in terms of accuracy, precision, recall, and F1 score. The results indicate that the decision tree algorithm shows the optimum performance as compared to the other algorithms. Moreover, comprehensive performance analysis and results presented validate the proposed model.
- Published
- 2022
- Full Text
- View/download PDF
41. A Novel Random Access Mechanism for Timely Reliable Communications for Smart Meters.
- Author
-
Karupongsiri, Chalakorn, Munasinghe, Kumudu S., and Jamalipour, Abbas
- Abstract
Smart meter (SM) is a key component of the smart grid, which reports power consumption to a centralized control center at regular intervals. The long term evolution (LTE) network has gained much attention as an attractive communication platform for SM traffic due to its high bandwidth, low latency, and coverage. However, when a large number of SMs simultaneously access the LTE network, it is very likely to result in preamble congestion. This eventually becomes a contributing factor for prolonged delays at the eNode-B, which would eventually degrade the performance of the LTE network. Hence, a random access mechanism is desirable for preamble signatures to occupy resource blocks for SMs. In this paper, we introduce a novel technique that combines contention- and noncontention-based random access methods. Our proposed method does not require a backoff time and regeneration of a new preamble if the first attempt is unsuccessful. Although SMs have fixed periodic communications, under the proposed random access mechanism preamble signatures do not need to be reserved. We analyze the proposed mechanism's efficiency in terms of metrics collision probability and packet delay. The simulation results are validated against the 3GPP standard. [ABSTRACT FROM PUBLISHER]
- Published
- 2017
- Full Text
- View/download PDF
42. A Collaboration-Oriented M2M Messaging Mechanism for the Collaborative Automation between Machines in Future Industrial Networks.
- Author
-
Zhaozong Meng, Zhipeng Wu, and Gray, John
- Subjects
- *
MACHINE-to-machine communications , *AUTOMATION , *INTERNET of things , *UBIQUITOUS computing , *INTERNETWORKING - Abstract
Machine-to-machine (M2M) communication is a key enabling technology for industrial internet of things (IIoT)-empowered industrial networks, where machines communicate with one another for collaborative automation and intelligent optimisation. This new industrial computing paradigm features high-quality connectivity, ubiquitous messaging, and interoperable interactions between machines. However, manufacturing IIoT applications have specificities that distinguish them from many other internet of things (IoT) scenarios in machine communications. By highlighting the key requirements and the major technical gaps of M2M in industrial applications, this article describes a collaboration-oriented M2M (CoM2M) messaging mechanism focusing on flexible connectivity and discovery, ubiquitous messaging, and semantic interoperability that are well suited for the production line-scale interoperability of manufacturing applications. The designs toward machine collaboration and data interoperability at both the communication and semantic level are presented. Then, the application scenarios of the presented methods are illustrated with a proof-of-concept implementation in the PicknPack food packaging line. Eventually, the advantages and some potential issues are discussed based on the PicknPack practice. [ABSTRACT FROM AUTHOR]
- Published
- 2017
- Full Text
- View/download PDF
43. M2M Security Technology of CPS Based on Blockchains.
- Author
-
Shiyong Yin, Jinsong Bao, Yiming Zhang, and Xiaodi Huang
- Subjects
- *
MACHINE-to-machine communications , *COMPUTER network security , *CYBER physical systems , *BLOCKCHAINS , *COTTON spinning , *PROBLEM solving - Abstract
As the core of intelligent manufacturing, cyber-physical systems (CPS) have serious security issues, especially for the communication security of their terminal machine-to-machine (M2M) communications. In this paper, blockchain technology is introduced to address such a security problem of communications between different types of machines in the CPS. According to the principles of blockchain technology, we designed a blockchain for secure M2M communications. As a communication system, M2M consists of public network areas, device areas, and private areas, and we designed a sophisticated blockchain structure between the public area and private area. For validating our design, we took cotton spinning production as a case study to demonstrate our solution to M2M communication problems under the CPS framework. We have demonstrated that the blockchain technology can effectively solve the safety of expansion of machines in the production process and the communication data between the machines cannot be tampered with. [ABSTRACT FROM AUTHOR]
- Published
- 2017
- Full Text
- View/download PDF
44. On Timing Reacquisition and Enhanced Primary Synchronization Signal (ePSS) Design for Energy Efficient 3GPP LTE MTC.
- Author
-
Balasubramanya, Naveen Mysore, Lampe, Lutz, Vos, Gustav, and Bennett, Steve
- Subjects
INTERNET of things ,MEDICAL care ,MACHINE-to-machine communications ,LONG-Term Evolution (Telecommunications) ,ENERGY consumption - Abstract
Machine Type Communications (MTC) is one of the major drivers for the future growth of the Third Generation Partnership Project (3GPP) Long Term Evolution (LTE)/LTE-Advanced (LTE-A) standards. A primary challenge associated with MTC using LTE/LTE-A is to cater to varied requirements of the User Equipment (UE) like coverage enhancement, low complexity, low power consumption, etc. The current LTE/LTE-A standards incorporate the Discontinuous Reception (DRX) mechanism for reduced energy consumption where the UE wakes up periodically to check for a paging message from the base-station. On each wake-up occasion, the UE has to decode the paging information, which requires accurate timing resynchronization. In the case of the MTC UEs, especially when the devices are deployed in low coverage areas, the resynchronization consumes a significant amount of time which increases the ON time of the UE leading to higher energy consumption. In this paper, we introduce the Enhanced Primary Synchronization Signal (ePSS) within the LTE/LTE-A standardization framework and propose a novel DRX mechanism which uses our ePSS for faster resynchronization and reduced energy consumption. We demonstrate that our mechanisms are more energy efficient than the legacy DRX mechanism for the MTC UEs with coverage enhancement. [ABSTRACT FROM AUTHOR]
- Published
- 2017
- Full Text
- View/download PDF
45. Proximity Effect of Metallic Environments on Cylindrical Dielectric Resonator Antenna for Smart Metering Applications.
- Author
-
Allabouche, K., Ferrero, F., Lizzi, L., Ribero, J-M., Jorio, M., and El Idrissi, N. El Amrani
- Subjects
DIELECTRIC resonator antennas ,ANTENNA radiation patterns ,DIELECTRIC materials ,COMPUTER simulation ,WIRELESS communications ,RADAR - Abstract
Dielectric resonator antennas (DRA), that is antennas where the radiating element is constituted by a block of dielectric material, have been effectively used for several applications, including wireless communications radar and satellite systems. In this paper, we present design of an environment independent cylindrical DRA for smart metering application. Numerical simulations displaying the fundamental antenna parameters for a cylindrical DRA have been carried out for three excitation modes (HEM
11δ , TE01δ and TM01δ ). The three modes are compared in order to demonstrate and reveal the robustness of dielectric resonators to the effects of close environment variations. The comparative study relies on numerical results obtained using Ansoft High Frequency Structure Simulator (HFSS). The obtained results give a better understanding of the impact of the excited mode on the environment independence of cylindrical DRAs. [ABSTRACT FROM AUTHOR]- Published
- 2017
46. Enabling Technologies for Green Internet of Things.
- Author
-
Shaikh, Faisal Karim, Zeadally, Sherali, and Exposito, Ernesto
- Abstract
Recent technological advances have led to an increase in the carbon footprint. Energy efficiency in the Internet of Things (IoT) has been attracting a lot of attention from researchers and designers over the last couple of years, paving the way for an emerging area called green IoT. There are various aspects (such as key enablers, communications, services, and applications) of IoT, where efficient utilization of energy is needed to enable a green IoT environment. We explore and discuss how the various enabling technologies (such as the Internet, smart objects, sensors, etc.) can be efficiently deployed to achieve a green IoT. Furthermore, we also review various IoT applications, projects and standardization efforts that are currently under way. Finally, we identify some of the emerging challenges that need to be addressed in the future to enable a green IoT. [ABSTRACT FROM PUBLISHER]
- Published
- 2017
- Full Text
- View/download PDF
47. International Electronical Committee (IEC) 61850 Mapping with Constrained Application Protocol (CoAP) in Smart Grids Based European Telecommunications Standard Institute Machine-to-Machine (M2M) Environment.
- Author
-
In-Jae Shin, Byung-Kwen Song, and Doo-Seop Eom
- Subjects
- *
SMART power grids , *MACHINE-to-machine communications , *POWER supply quality , *GATEWAYS (Computer networks) - Abstract
As power systems develop rapidly into smarter and more flexible configurations, so too must the communication technologies that support them. Machine-to-machine (M2M) communication in power systems enables information collection by combining sensors and communication protocols. In doing so, M2M technology supports communication between machines to improve power quality and protection coordination. When functioning in a "smart grid" environment, M2M has been labelled by the European Telecommunications Standard Institute (ETSI). International Electronical Committee (IEC) 61850 as the most important standard in power network systems. As evidence, this communication platform has been used for device data collection/control in substation automation systems and distribution automation systems. If the IEC 61850 information model were to be combined with a set of contemporary web protocols, the potential benefits would be enormous. Therefore, a constrained application protocol (CoAP) has been adopted to create an ETSI M2M communication architecture. CoAP is compared with other protocols (MQTT, SOAP) to demonstrate the validity of using it. This M2M communication technology is applied in an IEC61850, and use the OPNET Modeler 17.1 to demonstrate intercompatibility of CoAP Gateway. The proposed IEC 61850 and CoAP mapping scheme reduces the mapping time and improves throughput. CoAP is useful in the ETSI M2M environment where device capability is able to be limited. [ABSTRACT FROM AUTHOR]
- Published
- 2017
- Full Text
- View/download PDF
48. Hybrid S-ALOHA/TDMA Protocol for LTE/LTE-A Networks with Coexistence of H2H and M2M Traffic.
- Author
-
Nannan Sui, Cong Wang, Wei Xie, and Youyun Xu
- Subjects
ALOHABOB'S PC-Relocator (Computer software) ,COMPUTER software ,COMPUTER networks ,ELECTRONIC systems - Abstract
The machine-to-machine (M2M) communication is featured by tremendous number of devices, small data transmission, and large uplink to downlink traffic ratio. The massive access requests generated by M2M devices would result in the current medium access control (MAC) protocol in LTE/LTE-A networks suffering from physical random access channel (PRACH) overload, high signaling overhead, and resource underutilization. As such, fairness should be carefully considered when M2M traffic coexists with human-to-human (H2H) traffic. To tackle these problems, we propose an adaptive Slotted ALOHA (S-ALOHA) and time division multiple access (TDMA) hybrid protocol. In particular, the proposed hybrid protocol divides the reserved uplink resource blocks (RBs) in a transmission cycle into the S-ALOHA part for M2M traffic with small-size packets and the TDMA part for H2H traffic with large-size packets. Adaptive resource allocation and access class barring (ACB) are exploited and optimized to maximize the channel utility with fairness constraint.Moreover, an upper performance bound for the proposed hybrid protocol is provided by performing the system equilibrium analysis. Simulation results demonstrate that, compared with pure S-ALOHA and pure TDMA protocol under a target fairness constraint of 0.9, our proposed hybrid protocol can improve the capacity by at least 9.44% when λ
1 :λ2 = 1:1 and by at least 20.53% when λ1 :λ2 = 10 :1, where λ1 ,λ2 are traffic arrival rates of M2M and H2H traffic, respectively. [ABSTRACT FROM AUTHOR]- Published
- 2017
- Full Text
- View/download PDF
49. Expert Training: Enhancing AI Resilience to Image Coding Artifacts
- Author
-
Alban Marie, Karol Desnos, Luce Morin, Lu Zhang, Institut d'Électronique et des Technologies du numéRique (IETR), Université de Nantes (UN)-Université de Rennes (UR)-Institut National des Sciences Appliquées - Rennes (INSA Rennes), Institut National des Sciences Appliquées (INSA)-Institut National des Sciences Appliquées (INSA)-CentraleSupélec-Centre National de la Recherche Scientifique (CNRS), and MARIE, Alban
- Subjects
[INFO.INFO-AI] Computer Science [cs]/Artificial Intelligence [cs.AI] ,Image coding ,Machine-to-Machine (M2M) ,Artificial Intelligence (AI) ,Data_CODINGANDINFORMATIONTHEORY ,[INFO.INFO-AI]Computer Science [cs]/Artificial Intelligence [cs.AI] - Abstract
International audience; In the Machine-to-Machine (M2M) transmission context, there is a great need to reduce the amount of transmitted information using lossy compression. However, commonly used image compression methods are designed for human perception, not for Artificial Intelligence (AI) algorithms performances. It is known that these compression distortions affect many deep learning based architectures on several computer vision tasks. In this paper, we focus on the classification task and propose a new approach, named expert training, to enhance Convolutional Neural Networks (CNNs) resilience to compression distortions. We validated our approach using MnasNet and ResNet50 architectures, against image compression distortions introduced by three commonly used methods (JPEG, J2K and BPG), on the ImageNet dataset. The results showed a better robustness of these two architectures against the tested coding artifacts using the proposed expert training approach. Our code is publicly available at https://github.com/albmarie/expert training.
- Published
- 2022
50. A Mutual Authentication and Key Establishment Scheme for M2M Communication in 6LoWPAN Networks.
- Author
-
Qiu, Yue and Ma, Maode
- Abstract
The machine-to-machine (M2M) communication, which plays a vital role in the Internet of Things (IoT), allows wireless and wired systems to monitor environments and exchange the information among various machines automatically without human interventions. In order to promote the development of the IoT and exploit the M2M applications, the Internet Engineering Task Force (IETF) has been developing a standard named Internet Protocol version 6 (IPv6) over low-power wireless personal area networks (6LoWPAN) to enable IP-based M2M devices to connect to the open Internet. Although the 6LoWPAN standard has specified the important issues in the M2M communications, various security issues have not been addressed. In this paper, an enhanced mutual authentication and key establishment scheme is designed for the M2M communications in 6LoWPAN networks. The proposed scheme enables a 6LoWPAN device to securely authenticate with the remote server with a session key established between them. The security proof by the protocol composition logic can prove the logic correctness of the proposed scheme. The formal verification and the simulation show that the proposed scheme in 6LoWPAN could not only enhance the security functionality with the ability to prevent various malicious attacks, but also incur less computational and transmission overhead. [ABSTRACT FROM PUBLISHER]
- Published
- 2016
- Full Text
- View/download PDF
Catalog
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.