Academic & Scientific Articles
Permanent URI for this communityhttp://dl.cerist.dz/handle/CERIST/3
Browse
29 results
Search Results
Item DFIOT: Data Fusion for Internet of Things(Springer Science, 2020) Boulkaboul, Sahar; Djenouri, DjamelIn Internet of Things (IoT) ubiquitous environments, a high volume of heterogeneous data is produced from different devices in a quick span of time. In all IoT applications, the quality of information plays an important role in decision making. Data fusion is one of the current research trends in this arena that is considered in this paper. We particularly consider typical IoT scenarios where the sources measurements highly conflict, which makes intuitive fusions prone to wrong and misleading results. This paper proposes a taxonomy of decision fusion methods that rely on the theory of belief. It proposes a data fusion method for the Internet of Things (DFIOT) based on Dempster–Shafer (D–S) theory and an adaptive weighted fusion algorithm. It considers the reliability of each device in the network and the conflicts between devices when fusing data. This is while considering the information lifetime, the distance separating sensors and entities, and reducing computation. The proposed method uses a combination of rules based on the Basic Probability Assignment (BPA) to represent uncertain information or to quantify the similarity between two bodies of evidence. To investigate the effectiveness of the proposed method in comparison with D–S, Murphy, Deng and Yuan, a comprehensive analysis is provided using both benchmark data simulation and real dataset from a smart building testbed. Results show that DFIOT outperforms all the above mentioned methods in terms of reliability, accuracy and conflict management. The accuracy of the system reached up to 99.18% on benchmark artificial datasets and 98.87% on real datasets with a conflict of 0.58%. We also examine the impact of this improvement from the application perspective (energy saving), and the results show a gain of up to 90% when using DFIOT.Item REFIACC: Reliable, efficient, fair and interference-aware congestion control protocol for wireless sensor networks(Elsevier, 2017) Kafi, Mohamed Amine; Ben-Othman, Jalel; Ouadjaout, Abdelraouf; Bagaa, MiloudThe recent wireless sensor network applications are resource greedy in terms of throughput and net- work reliability. However, the wireless shared medium leads to links interferences in addition to wireless losses due to the harsh environment. The effect of these two points translates on differences in links bandwidth capacities, lack of reliability and throughput degradation. In this study, we tackle the prob- lem of throughput maximization by proposing an efficient congestion control-based schedule algorithm, dubbed REFIACC (Reliable, Efficient, Fair and Interference-Aware Congestion Control) protocol. REFIACC prevents the interferences and ensures a high fairness of bandwidth utilization among sensor nodes by scheduling the communications. The congestion and the interference in inter and intra paths hot spots are mitigated through tacking into account the dissimilarity between links’ capacities at the scheduling process. Linear programming is used to reach optimum utilization efficiency of the maximum available bandwidth. REFIACC has been evaluated by simulation and compared with two pertinent works. The re- sults show that the proposed solution outperforms the others in terms of throughput and reception ratio (more than 80%) and can scale for large networks.Item MAC Protocols with Wake-up Radio for Wireless Sensor Networks: A Review(IEEE Communications Society, 2016-10) Djiroun, Fatma Zohra; Djenouri, DjamelThe use of a low-power wake-up radio in wireless sensor networks is considered in this paper, where relevant medium access control solutions are studied. A variety of asynchronous wake-up MAC protocols have been proposed in the literature, which take advantage of integrating a second radio to the main one for waking it up. However, a complete and a comprehensive survey particularly on these protocols is missing in the literature. This paper aims at filling this gap, proposing a relevant taxonomy, and pro- viding deep analysis and discussions. From both per- spectives of energy efficiency and latency reduction, as well as their operation principles, state-of-the-art wake-up MAC protocols are grouped into three main categories: i) duty cycled wake-up MAC protocols, ii) non-cycled wake-up protocols, and iii) path reserva- tion wake-up protocols. The first category includes two subcategories, i) static wake-up protocols vs. ii) traffic adaptive wake-up protocols. Non-cycled wake- up MAC protocols are again divided into two classes i) always-on wake-up protocol, and ii) radio-triggered wake-up protocols. The latter is in turn split into two subclasses: i) passive wake-up MAC protocols, vs. ii) ultra low power active wake-up MAC protocols. Two schemes could be identified for the last category, broadcast based wake-up vs. addressing based wake- up. All these classes are discussed and analized in this paper, and canonical protocols are investigated following the proposed taxonomy.Item Congestion Detection Strategies in Wireless Sensor Networks: A Comparative Study with Testbed Experiments(Elsevier, 2014-09) Kafi, Mohamed Amine; Djenouri, Djamel; Ouadjaout, Abdelraouf; Badache, NadjibEvent based applications of Wireless Sensor Networks (WSNs) are prone to traffic congestion, where unpredicted event detection yields simultaneous generation of traffic at spatially co-related nodes, and its propagation towards the sink. This results in loss of information and waste energy. Early congestion detection is thus of high importance in such WSN applications to avoid the propagation of such a problem and to reduce its consequences. Different detection metrics are used in the congestion control literature. However, a comparative study that investigates the different metrics in real sensor motes environment is missing. This paper focuses on this issue and compares some detection metrics in a testbed network with MICAz motes. Results show the effectiveness of each method in different scenarios and concludes that the combination of buffer length and channel load constitute the better candidate for early and fictive detection.Item Interference-aware Congestion Control Protocol for Wireless Sensor Networks(Elsevier, 2014-09) Kafi, Mohamed Amine; Djenouri, Djamel; Ben Othman, Jalel; Ouadjaout, Abdelraouf; Bagaa, Miloud; Lasla, Noureddine; Badache, NadjibThis paper deals with congestion and interference control in wireless sensor networks (WSN), which is essential for improving the throughput and saving the scarce energy in networks where nodes have different capacities and traffic patterns. A scheme called IACC (Interference-Aware Congestion Control) is proposed. It allows maximizing link capacity utilization for each node by controlling congestion and interference. This is achieved through fair maximum rate control of interfering nodes in inter and intra paths of hot spots. The proposed protocol has been evaluated by simulation, where the results rival the effectiveness of our scheme in terms of energy saving and throughput. In particular, the results demonstrate the protocol scalability and considerable reduction of packet loss that allow to achieve as high packet delivery ratio as 80% for large networks.Item REFIACC: Reliable, Efficient, Fair and Interference-Aware Congestion Control Protocol for Wireless Sensor Networks(Elsevier, 2016-05-28) Kafi, Mohamed Amine; Ben Othman, Jalel; Ouadjaout, Abdelraouf; Bagaa, Miloud; Badache, NadjibThe recent wireless sensor network applications are resource greedy in terms of throughput and network reliability. However, the wireless shared medium leads to links interferences in addition to wireless losses due to the harsh environment. The effect of these two points translates on differences in links bandwidth capacities, lack of reliability and throughput degradation. In this study, we tackle the problem of throughput maximization by proposing an efficient congestion control-based schedule algorithm, dubbed REFIACC (Reliable, Efficient, Fair and Interference-Aware Congestion Control) protocol. REFIACC prevents the interferences and ensures a high fairness of bandwidth utilization among sensor nodes by scheduling the communications. The congestion and the interference in inter and intra paths hot spots are mitigated through tacking into account the dissimilarity between links' capacities at the scheduling process. Linear programming is used to reach optimum utilization efficiency of the maximum available bandwidth. REFIACC has been evaluated by simulation and compared with two pertinent works. The results show that the proposed solution outperforms the others in terms of throughput and reception ratio (more than 80%) and can scale for large networks.Item CCS_WHMS: A Congestion Control Scheme for Wearable Health Management System(Springer Link, 2015-10-21) Kafi, Mohamed Amine; Ben Othman, Jalel; Bagaa, Miloud; Badache, NadjibWearable computing is becoming a more and more attracting field in the last years thanks to the miniaturisation of electronic devices. Wearable healthcare monitoring systems (WHMS) as an important client of wearable computing technology has gained a lot. Indeed, the wearable sensors and their surrounding healthcare applications bring a lot of benefits to patients, elderly people and medical staff, so facilitating their daily life quality. But from a research point of view, there is still work to accomplish in order to overcome the gap between hardware and software parts. In this paper, we target the problem of congestion control when all these healthcare sensed data have to reach the destination in a reliable manner that avoids repetitive transmission which wastes precious energy or leads to loss of important information in emergency cases, too. We propose a congestion control scheme CCS_WHMS that ensures efficient and fair data delivery while used in the body wearable system part or in the multi-hop inter bodies wearable ones to get the destination. As the congestion detection paradigm is very important in the control process, we do experimental tests to compare between state of the art congestion detection methods, using MICAz motes, in order to choose the appropriate one for our scheme.Item Delay-efficient MAC protocol with traffic differentiation and run-time parameter adaptation for energy-constrained wireless sensor networks(Springer US, 2015-06) Doudou, Messaoud; Djenouri, Djamel; Barcelo-Ordinas, Jose M.; Badache, NadjibThis paper presents an asynchronous cascading wake-up MAC protocol for heterogeneous traffic gathering in low-power wireless sensor networks. It jointly considers energy/delay optimization and switches between two modes, according to the traffic type and delay requirements. The first mode is high duty cycle, where energy is traded-off for a reduced latency in presence of realtime traffic (RT). The second mode is low duty cycle, which is used for non-realtime traffic and gives more priority to energy saving. The proposed protocol, DuoMAC, has many features. First, it quietly adjusts the wake-up of a node according to (1) its parent’s wake-up time and, (2) its estimated load. Second, it incorporates a service differentiation through an improved contention window adaptation to meet delay requirements. A comprehensive analysis is provided in the paper to investigate the effectiveness of the proposed protocol in comparison with some state-of-the-art energy-delay efficient duty-cycled MAC protocols, namely DMAC, LL-MAC, and Diff-MAC. The network lifetime and the maximum end-to-end packet latency are adequately modeled, and numerically analyzed. The results show that LL-MAC has the best performance in terms of energy saving, while DuoMAC outperforms all the protocols in terms of delay reduction. To balance the delay/energy objectives, a runtime parameter adaptation mechanism has been integrated to DuoMAC. The mechanism relies on a constrained optimization problem with energy minimization in the objective function, constrained by the delay required for RT. The proposed protocol has been implemented on real motes using MicaZ and TinyOS. Experimental results show that the protocol clearly outperforms LL-MAC in terms of latency reduction, and more importantly, that the runtime parameter adaptation provides additional reduction of the latency while further decreasing the energy cost.Item CCS_WHMS: A Congestion Control Scheme for Wearable Health Management System(Springer US, 2015-12) Kafi, Mohamed Amine; Ben Othman, Jalel; Bagaa, Miloud; Badache, NadjibWearable computing is becoming a more and more attracting field in the last years thanks to the miniaturisation of electronic devices. Wearable healthcare monitoring systems (WHMS) as an important client of wearable computing technology has gained a lot. Indeed, the wearable sensors and their surrounding healthcare applications bring a lot of benefits to patients, elderly people and medical staff, so facilitating their daily life quality. But from a research point of view, there is still work to accomplish in order to overcome the gap between hardware and software parts. In this paper, we target the problem of congestion control when all these healthcare sensed data have to reach the destination in a reliable manner that avoids repetitive transmission which wastes precious energy or leads to loss of important information in emergency cases, too. We propose a congestion control scheme CCS_WHMS that ensures efficient and fair data delivery while used in the body wearable system part or in the multi-hop inter bodies wearable ones to get the destination. As the congestion detection paradigm is very important in the control process, we do experimental tests to compare between state of the art congestion detection methods, using MICAz motes, in order to choose the appropriate one for our scheme.Item Improved coverage through area-based localization in wireless sensor networks(IEEE, 2013-10) Lasla, Noureddine; Younis, Mohamed; Badache, NadjibEnsuring area coverage is one of the key requirements of wireless sensor networks (WSNs). When nodes are randomly placed in the area of interest, redundancy is often provisioned in order to lower the probability of having voids, where part of the area is not within the detection range of any sensor. To extend the lifetime of the network, a duty cycle mechanism is often applied in which only a subset of the nodes are activated at a certain time while the other nodes switch to low-power mode. The set of active nodes are changed over time in order to balance the load on the individual sensors. The selection of active nodes is subject to meeting the coverage requirement. Assessing the coverage of a sensor is based on knowing its position. However, localization schemes usually yield a margin of errors which diminishes the coverage fidelity. Conservative approaches for mitigating the position inaccuracy assume the worst-case error across the network and end up activating excessive number of nodes and reduces the network lifetime. In this paper, we present an approach for estimating a bound on the maximum error for the position of each sensor and propose a distributed algorithm for achieving high fidelity coverage while engaging only a subset of the sensors. The simulation results confirm the performance advantages of our approach.
- «
- 1 (current)
- 2
- 3
- »