Fig 1 - uploaded by Murat Uysal
Content may be subject to copyright.
Expected number of connected devices to the Internet. This chart is obtained from recent reports developed by both Cisco and Ericsson. The reports discuss the expected growth in the number of connected devices by 2020 due to the introduction of the M2M market.
Source publication
In this article, we present the major challenges of future machine-to-machine
(M2M) cellular networks such as spectrum scarcity problem, support for
low-power, low-cost, and numerous number of devices. As being an integral part
of the future Internet-of-Things (IoT), the true vision of M2M communications
cannot be reached with conventional solution...
Similar publications
Information-Centric Networking (ICN) is being realized as a promising approach to accomplish the shortcomings of current IP-address based networking. ICN models are based on naming the content to get rid of address-space scarcity, accessing the content via name-based-routing, caching the content at intermediate nodes to provide reliable, efficient...
Citations
... Applications including digital video broadcasting (DVB), wireless local area networks (WiFi), wireless sensor networks (ZigBee), mobile telephony, and the Internet of things require a vast amount of radio spectrum, which is still expanding (1,2). It is anticipated that this exponential increase will continue (3). ...
Cognitive Radio Networks Technology is a technology that can be employed in radio contexts to make better use of idle or underutilized spectrum. A cognitive radio (CR) is a radio that may be dynamically designed and adjusted to use the best nearby wireless channels to reduce user interference and congestion. Such a radio modifies its transmission or reception settings in accordance with available channels in the wireless spectrum to enable more wireless communications to take place simultaneously in a specific spectrum band at one location. This work highlights the functionalities of a Cognitive Wireless Network, mentioned how unlicensed secondary user devices can opportunistically access spectrum holes, Interference Modeling and Cognitive Radio Technology Standards that have been developed, Upper Layer Issues like Medium Access Control Strategies, Common Control Channel, Routing, Error Control, Security and finally, Cognitive Radio Applications.
... Coexistence with current systems will then play an important role in the entire progress of development of next mobile generations [12], [13]. ...
This paper presents several analytic closed-form approximations of the aggregated interference statistics within the framework of uplink massive machine-type communications (mMTC), taking into account the random activity of the sensors. Given its discrete nature and the large number of devices involved, a continuous approximation based on the Gram--Charlier series expansion of a truncated Gaussian kernel is proposed. We use this approximation to derive an analytic closed-form expression for the outage probability, corresponding to the event of the signal-to-interference-and-noise ratio being below a detection threshold. This metric is useful since it can be used for evaluating the performance of mMTC systems. We analyze, as an illustrative application of the previous approximation, a scenario with several multi-antenna collector nodes, each equipped with a set of predefined spatial beams. We consider two setups, namely single- and multiple-resource, in reference to the number of resources that are allocated to each beam. A graph-based approach that minimizes the average outage probability, and that is based on the statistics approximation, is used as allocation strategy. Finally, we describe an access protocol where the resource identifiers are broadcast (distributed) through the beams. Numerical simulations prove the accuracy of the approximations and the benefits of the allocation strategy.
... While LPWAN LTE CAT-0 is commonly used to implement M2M/IoT, CAT-M reduces complexity keeping the coverage aspect using existing mobile cellular network infrastructure [23,24]. LTE eMTC counts on the same mobile technology benefits as security, privacy, data reliability, and device identification [25]. ...
The Internet of Things (IoT) is a network of interconnected devices, and as this network grows, so does the need for an effective and safe protocol. Internet of Things (IoT) technologies are advancing quickly to meet the demand for the characteristics needed by applications, such as coverage area, scalability, transmission data rate, and applicability, referring to the designs of protocols. This is because of the vast range of uses and diversity of features required to meet an application. This article offers a thorough analysis of IoT protocols, including a comprehensive explanation of each protocol categorized by long-and short-distance coverage. For every set of protocols, a comparative analysis is carried out to offer insights into their traits, constraints, and behavior.
... Although anomaly detection has been explored in various domains, there is a need for further research and evaluation in cloud environments [5,[27][28][29][30]. The timeliness of detection, rate of change, scale, conciseness, and incident description are all important factors to consider when detecting anomalies in systems [25]. ...
The growth of cloud computing is hindered by concerns about privacy and security. Despite the widespread use of network intrusion detection systems (NIDS), the issue of false positives remains prevalent. Furthermore, few studies have approached the intrusion detection problem as a time series issue, requiring time series modeling. In this study, we propose a novel technique for the early detection of intrusions in cloud computing using time series data. Our approach involves a method for Feature Selection (FS) and a prediction model based on the Facebook Prophet model to assess its efficiency. The FS method we propose is a collaborative feature selection model that integrates time series analysis techniques with anomaly detection, stationary, and causality tests. This approach specifically addresses the challenge of misleading connections between time series anomalies and attacks. Our results demonstrate a significant reduction in predictors employed in our prediction model, from 70 to 10 predictors, while improving performance metrics such as Mean Absolute Error (MAE), Mean Squared Error (MSE), Root Mean Squared Error (RMSE), Mean Absolute Percentage Error (MAPE), Median Absolute Percentage Error (MdAPE), and Dynamic Time Warping (DTW). Furthermore, our approach has resulted in reduced training, prediction, and cross-validation times of approximately 85%, 15%, and 97%, respectively. Although memory consumption remains similar, the utilization time has been significantly reduced, resulting in substantial resource usage reduction. Overall, our study presents a comprehensive methodology for effective early detection of intrusions in cloud computing based on time series anomalies, employing a collaborative feature selection model and the Facebook Prophet prediction model. Our findings highlight the efficiency and performance improvements achieved through our approach, contributing to the advancement of intrusion detection techniques in the context of cloud computing security.
... Bandwidths access functions coordinate to sense the idle spectrum and update the WBAN's channel access time. The amount of radio spectrum required for applications, such as mobile telephony, digital video broadcasting (DVB), wireless local area networks (Wi-Fi), wireless sensor networks (ZigBee), and the Internet of things [15,16], is immense and continues to rise. By 2021, nearly 50 billion cellular devices will be linked, necessitating a significant amount of spectrum [17]. ...
... Bandwidths access functions coordinate to sense the idle spectrum and update the WBAN's channel access time. The amount of radio spectrum required for applications, such as mobile telephony, digital video broadcasting (DVB), wireless local area networks (Wi-Fi), wireless sensor networks (ZigBee), and the Internet of things [15][16], is immense and continues to rise. By 2021, nearly 50 billion cellular devices will be linked, necessitating a significant amount of spectrum [17]. ...
Programmable Object Interfaces are increasingly intriguing researchers because of their broader applications, especially in the medical field. In a Wireless Body Area Network (WBAN), for example, patients' health can be monitored using clinical nano sensors. Exchanging such sensitive data requires a high level of security and protection against attacks. To that end, the literature is rich with security schemes that include the advanced encryption standard, secure hashing algorithm, and digital signatures that aim to secure the data exchange. However, such schemes elevate the time complexity, rendering the data transmission slower. Cognitive radio technology with a medical body area network system involves communication links between WBAN gateways, server and nano sensors, which renders the entire system vulnerable to security attacks. In this paper, a novel DNA-based encryption technique is proposed to secure medical data sharing between sensing devices and central repositories. It has less computational time throughout authentication, encryption, and decryption. Our analysis of experimental attack scenarios shows that our technique is better than its counterparts.
... Cellular infrastructures have been mainly designed and optimized toward not only adapting ever-increasing amount of mobile applications but also enabling communication of massive number of Internet-of-Things (IoT) devices [1]. Recently, in order to avoid signal congestion and network management caused by small cell deployment based on cellular infrastructure, the use of heterogeneous networks, i.e., IoT-based cellular systems, has been emerged as one of effective solutions [2]. Accordingly, these networks have been extensively investigated for many different scenarios. ...
This paper investigates short-packet communications (SPCs) of a cooperative non-orthogonal multiple access (NOMA) Internet-of-Things (IoT)-based cellular network where an IoT master node acts as: (1) a relay for the cellular system and (2) a source for the IoT system. Accurate and asymptotic closedform expressions for the average block error rates (BLERs) of cellular user (CU) and IoT user (IU) are derived in the presence of imperfect successive interference cancellation (SIC) and channel state information (CSI). Notably, numerical results show that: (i) IUs’ performance is significantly improved by exploitation of NOMA technique and is not dominated by decode-andforward (DF) or amplify-and-forward (AF) relaying protocol; (ii) CUs’ performance may not perform well compared with orthogonal multiple access (OMA)-based systems for both AF and DF protocols; (iii) higher antenna configuration at the cellular transmitter results in a rapid BLER convergence for CU.
... A D2D user (DU) may or may not be a cellular subscriber. It could be a low-cost low-power Internet-of-Things (IoT) device or even a machine [1]. A DU may utilize the spectral resource allocated for a cellular user (CU) to communicate. ...
... The sampling rate f s is directly proportional to P D . Assume that Let Pr 1 and Pr 0 denote the respective probabilities of CU 1 actually transmitting and not transmitting, Pr (1) and Pr (0) the respective probabilities of DU 1 perceiving CU 1 to be transmitting and not transmitting. Note that perception may not represent reality. ...
... Likewise, Pr (1) is contributed by two other conditions: (1) if the CU 1 is not transmitting but there is a false alarm, and (2) if the CU 1 is actively transmitting and there is no miss detection. ...
Device-to-device (D2D) communication is introduced in cellular networks to allow devices in close proximity to communicate directly with each other, freeing up spectral and other system resources. We propose a scheme that promotes the coexistence of cellular users (CUs) and D2D users (DUs). DUs are allowed to access the CU channel for D2D communications, enhancing the spectral efficiency. On the other hand, DU is expected to protect the secrecy of CU’s data by transmitting artificial noise to jam any potential eavesdroppers near the CU link, which may include other DUs. This enhances the cellular secrecy capacity at the expense of DU’s energy, which motivates us to assess the CU’s secrecy capacity and DU’s energy efficiency of this scheme. We have identified the causes and conditions of increased energy efficiency under certain secrecy capacity requirement, e.g. an optimal DU’s sensing duration that results in maximal energy efficiency. Such information is important for the planning of an efficient access control and scheduling scheme for the DU links in cellular networks.
... Machine type communication (MTC) [1][2][3] is anticipated to connect numerous and diverse machines in various environments on the Internet of Things (IoT). That is, an MTC machine transmits packets to another MTC machine or receives packets from another MTC machine automatically and cost-efficiently, which has been discussed in many fields such as smart health-care, smart shopping system, smart environmental protection, and smart city, etc. ...
Cognitive radio could satisfy the demand for radio spectrum urgently required by the Internet of Things employing machine type communication to connect numerous machines. In cognitive radio based machine type communication, a time division multiple access (TDMA) based interface with a reservation scheme was proposed to utilize long time opportunities due to its spectrum-efficient, energy-efficient, and deployment-economical benefits. Previous literature indicates that short idle time opportunities exist during the activities of primary users. However, it is spectrum-inefficient to use single size multi-frames in a channel of mixed short and long time opportunities; in contrast, the difficulty of using multi-frames of different lengths is how to appropriately determine that an idle period is in short or long time opportunities. Thus, this paper proposes a multiple access control (MAC) which incorporates short and long multi-frames into the TDMA based interface with a reservation scheme. With the aid of the sensing of a full-duplex gateway, the proposed MAC adaptively uses long and short multi-frames in a channel of long and fixed-length short time opportunities such that the trade-off between throughput and interference is balanced. Extensive simulation results show that the proposed multiple access control with short and long multi-frames produces high throughput while the interference of primary users is kept at a low level.
... The enhanced machine-type communication (eMTC) technology is also known as the long term evolution category M1, i.e., LTE Cat-M1 technology. The eMTC technology was developed to provide packet reliability, device identification, low complexity, and security [97]. The eMTC was designed according to the 3GPP specifications so as to realize a lowpower consumption as well as extend the existing communication technology coverage. ...
Internet of things (IoT) is a concept that is currently gaining a lot of popularity as a result of its potential to be incorporated into many heterogeneous systems. Because of its diversity, integrating IoT is conceivable in almost all fields, including the healthcare sector. For instance, a promising technology in the healthcare sector known as wireless body area network (WBAN) could be integrated with the IoT to enhance its productivity. However, in order to guarantee the optimization of the operation of the healthcare applications facilitated by the WBAN-enabled IoT technology, there must be enough support from all the different protocol stack layers so as to satisfy the critical quality-of-service (QoS) requirements of the WBAN systems. Consequently, the medium access control (MAC) protocol has recently been gaining lots of attention in the area of WBANs due to its ability to manage and coordinate when a shared communication channel can be accessed. For the purpose of achieving efficient MAC protocols for WBAN-enabled IoT technology, this paper investigates some key MAC protocols that could be exploited in WBANs based on their characteristics, service specifications, technical issues such as energy wastage issues, and possible technical solutions were provided to enhance energy efficiency, channel utilization, data transmission rate, and dealy rate. Also, these MAC protocols were grouped and compared based on short- and long-range communication standards. Following this, future directions and open research issues are pointed out.
... I Nternet-of-Things (IoT), machine-to-machine communications (M2M), and cloud computing are among the main ground-breaking technologies for the wireless communications sector [1]- [3]. The integration of these technologies will enable the deployment of a gigantic number of lowcost and low-power devices, such as sensors, actuators, smart meters, etc. ...
... Due to the high efficiency and flexibility of IoT and M2M communications, they are anticipated to be deployed at a very large scale in several environments. According to recent reports, it is predicted that more than fifty billion IoT devices will be connected to the Internet in 2020 [1]. Consequently, the demand will continue for improved performance in terms of bandwidth, power, delay, error rate, cost, etc. ...
This paper considers the problem of efficient network design for data collection from various sensors in smart environments using flying base stations, which are realized using unmanned aerial vehicles (UAVs), or drones. The system efficiency is enhanced by maximizing the number of served sensors using the minimum number of UAVs while satisfying particular network constraints. Towards this end, a joint optimization problem is formulated for UAVs placement and sensors assignment in smart environments with massive sensor deployment. Due to the complexity of the optimal solution, a probabilistic learning approach is utilized to find a near-optimal solution. Further, a non-death penalty constraint handling approach is used to deal with difficult and conflicting constraints. Monte Carlo simulation is performed to evaluate the performance of the proposed algorithm in various scenarios, and compare it with the optimal solution to validate the efficiency of the proposed solution. The presented numerical results show that the solutions obtained using the proposed algorithm are generally close or equal to the optimal solution for several scenarios, but with significant complexity reduction, which confirms the efficiency of the proposed algorithm. Moreover, the proposed solution shows significant performance improvement when compared with an efficient greedy algorithm.