International Journal Papers

Permanent URI for this collectionhttp://dl.cerist.dz/handle/CERIST/17

Browse

Search Results

Now showing 1 - 10 of 11
  • Thumbnail Image
    Item
    DFIOT: Data Fusion for Internet of Things
    (Springer Science, 2020) Boulkaboul, Sahar; Djenouri, Djamel
    In Internet of Things (IoT) ubiquitous environments, a high volume of heterogeneous data is produced from different devices in a quick span of time. In all IoT applications, the quality of information plays an important role in decision making. Data fusion is one of the current research trends in this arena that is considered in this paper. We particularly consider typical IoT scenarios where the sources measurements highly conflict, which makes intuitive fusions prone to wrong and misleading results. This paper proposes a taxonomy of decision fusion methods that rely on the theory of belief. It proposes a data fusion method for the Internet of Things (DFIOT) based on Dempster–Shafer (D–S) theory and an adaptive weighted fusion algorithm. It considers the reliability of each device in the network and the conflicts between devices when fusing data. This is while considering the information lifetime, the distance separating sensors and entities, and reducing computation. The proposed method uses a combination of rules based on the Basic Probability Assignment (BPA) to represent uncertain information or to quantify the similarity between two bodies of evidence. To investigate the effectiveness of the proposed method in comparison with D–S, Murphy, Deng and Yuan, a comprehensive analysis is provided using both benchmark data simulation and real dataset from a smart building testbed. Results show that DFIOT outperforms all the above mentioned methods in terms of reliability, accuracy and conflict management. The accuracy of the system reached up to 99.18% on benchmark artificial datasets and 98.87% on real datasets with a conflict of 0.58%. We also examine the impact of this improvement from the application perspective (energy saving), and the results show a gain of up to 90% when using DFIOT.
  • Thumbnail Image
    Item
    REFIACC: Reliable, efficient, fair and interference-aware congestion control protocol for wireless sensor networks
    (Elsevier, 2017) Kafi, Mohamed Amine; Ben-Othman, Jalel; Ouadjaout, Abdelraouf; Bagaa, Miloud
    The recent wireless sensor network applications are resource greedy in terms of throughput and net- work reliability. However, the wireless shared medium leads to links interferences in addition to wireless losses due to the harsh environment. The effect of these two points translates on differences in links bandwidth capacities, lack of reliability and throughput degradation. In this study, we tackle the prob- lem of throughput maximization by proposing an efficient congestion control-based schedule algorithm, dubbed REFIACC (Reliable, Efficient, Fair and Interference-Aware Congestion Control) protocol. REFIACC prevents the interferences and ensures a high fairness of bandwidth utilization among sensor nodes by scheduling the communications. The congestion and the interference in inter and intra paths hot spots are mitigated through tacking into account the dissimilarity between links’ capacities at the scheduling process. Linear programming is used to reach optimum utilization efficiency of the maximum available bandwidth. REFIACC has been evaluated by simulation and compared with two pertinent works. The re- sults show that the proposed solution outperforms the others in terms of throughput and reception ratio (more than 80%) and can scale for large networks.
  • Thumbnail Image
    Item
    MAC Protocols with Wake-up Radio for Wireless Sensor Networks: A Review
    (IEEE Communications Society, 2016-10) Djiroun, Fatma Zohra; Djenouri, Djamel
    The use of a low-power wake-up radio in wireless sensor networks is considered in this paper, where relevant medium access control solutions are studied. A variety of asynchronous wake-up MAC protocols have been proposed in the literature, which take advantage of integrating a second radio to the main one for waking it up. However, a complete and a comprehensive survey particularly on these protocols is missing in the literature. This paper aims at filling this gap, proposing a relevant taxonomy, and pro- viding deep analysis and discussions. From both per- spectives of energy efficiency and latency reduction, as well as their operation principles, state-of-the-art wake-up MAC protocols are grouped into three main categories: i) duty cycled wake-up MAC protocols, ii) non-cycled wake-up protocols, and iii) path reserva- tion wake-up protocols. The first category includes two subcategories, i) static wake-up protocols vs. ii) traffic adaptive wake-up protocols. Non-cycled wake- up MAC protocols are again divided into two classes i) always-on wake-up protocol, and ii) radio-triggered wake-up protocols. The latter is in turn split into two subclasses: i) passive wake-up MAC protocols, vs. ii) ultra low power active wake-up MAC protocols. Two schemes could be identified for the last category, broadcast based wake-up vs. addressing based wake- up. All these classes are discussed and analized in this paper, and canonical protocols are investigated following the proposed taxonomy.
  • Thumbnail Image
    Item
    REFIACC: Reliable, Efficient, Fair and Interference-Aware Congestion Control Protocol for Wireless Sensor Networks
    (Elsevier, 2016-05-28) Kafi, Mohamed Amine; Ben Othman, Jalel; Ouadjaout, Abdelraouf; Bagaa, Miloud; Badache, Nadjib
    The recent wireless sensor network applications are resource greedy in terms of throughput and network reliability. However, the wireless shared medium leads to links interferences in addition to wireless losses due to the harsh environment. The effect of these two points translates on differences in links bandwidth capacities, lack of reliability and throughput degradation. In this study, we tackle the problem of throughput maximization by proposing an efficient congestion control-based schedule algorithm, dubbed REFIACC (Reliable, Efficient, Fair and Interference-Aware Congestion Control) protocol. REFIACC prevents the interferences and ensures a high fairness of bandwidth utilization among sensor nodes by scheduling the communications. The congestion and the interference in inter and intra paths hot spots are mitigated through tacking into account the dissimilarity between links' capacities at the scheduling process. Linear programming is used to reach optimum utilization efficiency of the maximum available bandwidth. REFIACC has been evaluated by simulation and compared with two pertinent works. The results show that the proposed solution outperforms the others in terms of throughput and reception ratio (more than 80%) and can scale for large networks.
  • Thumbnail Image
    Item
    CCS_WHMS: A Congestion Control Scheme for Wearable Health Management System
    (Springer Link, 2015-10-21) Kafi, Mohamed Amine; Ben Othman, Jalel; Bagaa, Miloud; Badache, Nadjib
    Wearable computing is becoming a more and more attracting field in the last years thanks to the miniaturisation of electronic devices. Wearable healthcare monitoring systems (WHMS) as an important client of wearable computing technology has gained a lot. Indeed, the wearable sensors and their surrounding healthcare applications bring a lot of benefits to patients, elderly people and medical staff, so facilitating their daily life quality. But from a research point of view, there is still work to accomplish in order to overcome the gap between hardware and software parts. In this paper, we target the problem of congestion control when all these healthcare sensed data have to reach the destination in a reliable manner that avoids repetitive transmission which wastes precious energy or leads to loss of important information in emergency cases, too. We propose a congestion control scheme CCS_WHMS that ensures efficient and fair data delivery while used in the body wearable system part or in the multi-hop inter bodies wearable ones to get the destination. As the congestion detection paradigm is very important in the control process, we do experimental tests to compare between state of the art congestion detection methods, using MICAz motes, in order to choose the appropriate one for our scheme.
  • Thumbnail Image
    Item
    Delay-efficient MAC protocol with traffic differentiation and run-time parameter adaptation for energy-constrained wireless sensor networks
    (Springer US, 2015-06) Doudou, Messaoud; Djenouri, Djamel; Barcelo-Ordinas, Jose M.; Badache, Nadjib
    This paper presents an asynchronous cascading wake-up MAC protocol for heterogeneous traffic gathering in low-power wireless sensor networks. It jointly considers energy/delay optimization and switches between two modes, according to the traffic type and delay requirements. The first mode is high duty cycle, where energy is traded-off for a reduced latency in presence of realtime traffic (RT). The second mode is low duty cycle, which is used for non-realtime traffic and gives more priority to energy saving. The proposed protocol, DuoMAC, has many features. First, it quietly adjusts the wake-up of a node according to (1) its parent’s wake-up time and, (2) its estimated load. Second, it incorporates a service differentiation through an improved contention window adaptation to meet delay requirements. A comprehensive analysis is provided in the paper to investigate the effectiveness of the proposed protocol in comparison with some state-of-the-art energy-delay efficient duty-cycled MAC protocols, namely DMAC, LL-MAC, and Diff-MAC. The network lifetime and the maximum end-to-end packet latency are adequately modeled, and numerically analyzed. The results show that LL-MAC has the best performance in terms of energy saving, while DuoMAC outperforms all the protocols in terms of delay reduction. To balance the delay/energy objectives, a runtime parameter adaptation mechanism has been integrated to DuoMAC. The mechanism relies on a constrained optimization problem with energy minimization in the objective function, constrained by the delay required for RT. The proposed protocol has been implemented on real motes using MicaZ and TinyOS. Experimental results show that the protocol clearly outperforms LL-MAC in terms of latency reduction, and more importantly, that the runtime parameter adaptation provides additional reduction of the latency while further decreasing the energy cost.
  • Thumbnail Image
    Item
    CCS_WHMS: A Congestion Control Scheme for Wearable Health Management System
    (Springer US, 2015-12) Kafi, Mohamed Amine; Ben Othman, Jalel; Bagaa, Miloud; Badache, Nadjib
    Wearable computing is becoming a more and more attracting field in the last years thanks to the miniaturisation of electronic devices. Wearable healthcare monitoring systems (WHMS) as an important client of wearable computing technology has gained a lot. Indeed, the wearable sensors and their surrounding healthcare applications bring a lot of benefits to patients, elderly people and medical staff, so facilitating their daily life quality. But from a research point of view, there is still work to accomplish in order to overcome the gap between hardware and software parts. In this paper, we target the problem of congestion control when all these healthcare sensed data have to reach the destination in a reliable manner that avoids repetitive transmission which wastes precious energy or leads to loss of important information in emergency cases, too. We propose a congestion control scheme CCS_WHMS that ensures efficient and fair data delivery while used in the body wearable system part or in the multi-hop inter bodies wearable ones to get the destination. As the congestion detection paradigm is very important in the control process, we do experimental tests to compare between state of the art congestion detection methods, using MICAz motes, in order to choose the appropriate one for our scheme.
  • Thumbnail Image
    Item
    Mobile sink and power management for efficient data dissemination in wireless sensor networks
    (Springer US, 2014-11) Guerroumi, Mohamed; Badache, Nadjib; Moussaoui, Samira
    Data dissemination in wireless sensor networks is the main goal and the final waited objective of the sensor network deployment. In such environment which consists of a large number of low cost devices, sensor nodes generate sensed data of stimulus and forward them to sinks via wireless multi-hops communication. In typical wireless sensor network, the sensor nodes are equipped with irreplaceable batteries and characterized by limited computing capability. Therefore, minimizing the energy consumption of the sensor nodes and thus maximizing the lifetime of sensor networks is one of the most important research issues. In this paper, we present new data dissemination protocol based energy-efficient called energy-based data dissemination protocol. In this protocol, we propose new energy management scheme using a dynamic power threshold and we introduce also new sink mobility scheme to balance the network load between sensor nodes and thus improve the performances. Firstly, in the initialization phase, the sensor nodes organized under clusters and cluster head should be selected for each cluster. Secondly, in the data dissemination phase, the cluster head collects and transmits the sensed data based on the data dissemination process. In this phase, sensor sink may move toward any cluster based on its sensed data frequency to minimize energy consumption of sensor nodes near the fixed sinks due to relaying of large amount of data. The simulation result shows that the proposal protocol permits to reduce the energy consumption and prolong the network life.
  • Thumbnail Image
    Item
    Congestion Control Protocols in Wireless Sensor Networks: A Survey
    (2014-03-05) Kafi, Mohamed Amine; Djenouri, Djamel; Ben Othman, Jalel; Badache, Nadjib
    The performance of wireless sensor networks (WSN) is affected by the lossy communication medium, application diversity, dense deployment, limited processing power and storage capacity, frequent topology change. All these limitations provide significant and unique design challenges to data transport control in wireless sensor networks. An effective transport protocol should consider reliable message delivery, energy-efficiency, quality of service and congestion control. The latter is vital for achieving a high throughput and a long network lifetime. Despite the huge number of protocols proposed in the literature, congestion control in WSN remains challenging. A review and taxonomy of the state-of-the-art protocols from the literature up to 2013 is provided in this paper. First, depending on the control policy, the protocols are divided into resource control vs. traffic control. Traffic control protocols are either reactive or preventive (avoiding). Reactive solutions are classified following the reaction scale, while preventive solutions are split up into buffer limitation vs. interference control. Resource control protocols are classified according to the type of resource to be tuned.
  • Thumbnail Image
    Item
    Efficient data aggregation with in-network integrity control for WSN
    (Elsevier, 2012-10) Bagaa, Miloud; Challal, Yacine; Ouadjaout, Abdelraouf; Lasla, Noureddine; Badache, Nadjib
    Energy is a scarce resource in Wireless Sensor Networks (WSN). Some studies show that more than 70% of energy is consumed in data transmission in WSN. Since most of the time, the sensed information is redundant due to geographically collocated sensors, most of this energy can be saved through data aggregation. Furthermore, data aggregation improves bandwidth usage and reduces collisions due to interference. Unfortunately, while aggregation eliminates redundancy, it makes data integrity verification more complicated since the received data is unique. In this paper, we present a new protocol that provides control integrity for aggregation in wireless sensor networks. Our protocol is based on a two-hop verification mechanism of data integrity. Our solution is essentially different from existing solutions in that it does not require referring to the base station for verifying and detecting faulty aggregated readings, thus providing a totally distributed scheme to guarantee data integrity. We carried out numerical analysis and simulations using the TinyOS environment. Results show that the proposed protocol yields significant savings in energy consumption while preserving data integrity, and outperforms comparable solutions with respect to some important performance criteria.