The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Offloading has been widely adopted as an effective technique to overcome the processing and computation limitation in mobile networks. In this work, we consider the problem of offloading in a mobile ad hoc environment in order to improve the processing capability and power efficiency. We formulate this as an incentive-based workload assignment problem. For maximizing the individual utility, the buyer/seller...
Restricted Access Window (RAW) has been introduced to IEEE 802.11ah MAC layer for application of smart grid networks to decrease collision probability. The number of devices involved and duration affect both transmission energy and overhead information. However, few work has been done on energy efficient RAW. In this paper, we investigate an energy efficient RAW optimization problem for IEEE 802.11ah...
Restricted Access Window (RAW) has been introduced for IEEE 802.11ah MAC layer to decrease collision probability. However, both the number of devices involved and duration of a RAW affect the transmission energy and overhead information. In this paper, we study the energy efficiency of the uplink communications of IEEE 802.11ah networks and propose an access window algorithm using probability theory...
Machine to machine (M2M) communications is one of the key underpinning technologies for Internet of Things (IoT) applications in 5G networks. The large scale of M2M devices imposes challenge on conventional medium access control protocols. In this paper, we propose a reinforcement learning (RL) based duty cycle control for dominant short-range technology IEEE 802.15.4 to provide high performance and...
IEEE 802.15.4 beacon-enabled mode adopts duty cycle to achieve energy efficiency and provides an optional acknowledgement (ACK) mechanism to ensure the transmission reliability. However, frequently sending ACK introduces additional ACK transmission energy consumption and increases end-to-end delay. In this paper, we focus on a duty cycle optimisation problem with joint consideration on energy efficiency,...
IEEE 802.15.4 defines a duty cycle based medium access control (MAC) protocol to reduce the energy consumption for devices in wireless sensor networks (WSNs). A low duty cycle significantly improves the energy efficiency but reduces the available transmission time, thereby increases end-to-end delay. In this paper, we solve an adaptive duty cycle control problem for beacon-enabled IEEE 802.15.4 networks,...
In wireless sensor networks (WSNs), periodically switching nodes into sleep mode is an effective way to reduce the energy consumption. However, the sleep period introduces additional end-to-end delay into packet delivery. We propose an optimal transmission policy, which assigns the number of packets per node should receive at each active period to minimize the end-to-end delay and the energy consumption...
In Long Term Evolution (LTE) networks, Energy-Efficient (EE) and Mobility Load Balancing (MLB) are two important functions to optimize the network performance. In order to deal with the energy consumption in downlink LTE system for unbalanced low load scenarios, we built an effective EE resource allocation optimization model and employed a low complexity method to achieve the goal of the optimization...
LEACH protocol is one of the clustering routing protocols in wireless sensor networks. The advantage of LEACH is that each node has the equal probability to be a cluster head, which makes the energy dissipation of each node be relatively balanced. In LEACH protocol, time is divided into many rounds, in each round, all the nodes contend to be cluster head according to a predefined criterion. This paper...
In wireless sensor networks (WSNs), providing source-location privacy through secure routing is one of the most prosperous techniques. In this paper, we propose a routing technique to provide adequate source-location privacy with low energy consumption. We introduce this technique as the Sink Toroidal Region (STaR) routing. With this technique, the source node randomly selects an intermediate node...
Wireless sensor networks (WSNs) have the potential to be widely used in many areas for unattended event monitoring. Mainly due to lack of a protected physical boundary, wireless communications are vulnerable to unauthorized interception and detection. Privacy is becoming one of the major issues that jeopardize the successful deployment of wireless sensor networks. While confidentiality of the message...
Communication privacy is becoming an essential security requirement for mission critical communications and communication infrastructure protection. This is especially true for mobile ad hoc networks (MANETs) due to mobility of the communication nodes and the nature of wireless communications. Existing research in privacy-preserving communications can largely be divided into two categories: cryptosystem-based...
In order to analyze the structure and behaviour characteristics of enterprise energy consumption process, the evolution rules of enterprise energy consumption process model based on fuzzy timed Petri nets are introduced in detail. The conflicts existing in the model and the conflicts resolving approaches are analyzed. Moreover, the effective conflicts are defined from the aspects of resource conflicts...
Topology control algorithm for wireless sensor networks is of great significance to save nodes' energy and prolong the lifetime of the network. Nowadays, there are two ways for wireless sensor networks to save energy: hierarchical topology control and power control; In this paper, we propose a new topology control method, Sleep-supported and Cone-based Topology Control method (SCTC), which integrates...
Energy aware routing protocol plays an important role in the performance of mobile ad hoc networks because mobile hosts in such networks are usually battery-operated. In this paper, based on TORA, we present an energy-aware routing protocol E-TORA. E-TORA selects routes according to hop count and residual energy of nodes. The nodes that have more energy have more probability chosen by E-TORA. Simulation...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.