A cross-layer communication module for the Internet of Things
نویسندگان
چکیده
1389-1286/$ see front matter 2012 Elsevier B.V http://dx.doi.org/10.1016/j.comnet.2012.10.003 ⇑ Corresponding author. Tel.: +1 404 894 6616. E-mail addresses: [email protected] (C. gatech.edu (J.M. Jornet), [email protected] (E. Fa edu (I.F. Akyildiz). The Internet of Things (IoT) is a novel networking paradigm which allows the communication among all sorts of physical objects over the Internet. The IoT defines a world-wide cyber-physical system with a plethora of applications in the fields of domotics, e-health, goods monitoring and logistics, among others. The use of cross-layer communication schemes to provide adaptive solutions for the IoT is motivated by the high heterogeneity in the hardware capabilities and the communication requirements among things. In this paper, a novel cross-layer module for the IoT is proposed to accurately capture both the high heterogeneity of the IoT and the impact of the Internet as part of the network architecture. The fundamental part of the module is a mathematical framework, which is developed to obtain the optimal routing paths and the communication parameters among things, by exploiting the interrelations among different layer functionalities in the IoT. Moreover, a cross-layer communication protocol is presented to implement this optimization framework in practical scenarios. The results show that the proposed solution can achieve a global communication optimum and outperforms existing layered solutions. The novel cross-layer module is a primary step towards providing efficient and reliable end-to-end communication in the IoT. 2012 Elsevier B.V. All rights reserved.
منابع مشابه
A method to increasing the Quality of Service (QoS) in Wireless body area networks by providing a MAC layer Protocol based of Internet of Things
With the development of technology, the use of wireless telecommunication networks for the various affairs is essential. These networks are one of the safest and most widely used networks, for instance, in medical care and remote patient monitoring. What matters is the quality of service in these networks. The purpose of this paper is to increase packet transduction in a wireless body area netw...
متن کاملA Mobile and Fog-based Computing Method to Execute Smart Device Applications in a Secure Environment
With the rapid growth of smart device and Internet of things applications, the volume of communication and data in networks have increased. Due to the network lag and massive demands, centralized and traditional cloud computing architecture are not accountable to the high users' demands and not proper for execution of delay-sensitive and real time applications. To resolve these challenges, we p...
متن کاملRole and Application of RFID Technology in Internet of Things: Communication, Authentication, Risk, and Security Concerns
The Internet of Things (IoT) is a very encouraging and fast-growing area that brings together the benefits of wireless systems, sensor networks, actuators, etc.A wide range of IoT applications have been targeted and several aspects of this field have been identified to address specific issues, as well as technologies and standards developed in various domains such as in radio frequency id...
متن کاملInvestigating the Effect of Internet of Things on Human Resource Development and Training in the Organization (Case Study: State Airlines)
The Internet of Things is a new phenomenon that has changed the way we interact with our environment and affects all areas of life and the workplace. The purpose of this study is to investigate the effect of Internet of Things on the development and training of human resources in the organization. The present research is one of the applied researches and is considered as a descriptive-survey re...
متن کاملDistance-Aware Beamforming for Multiuser Secure Communication Systems
Typical cryptography schemes are not well suited for low complexity types of equipment, e.g., Internet of things (IoT) devices, as they may need high power or impose high computational complexity on the device. Physical (PHY) layer security techniques such as beamforming (in multiple antennas systems) are possible alternatives to provide security for such applications. In this paper, we consid...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید
ثبت ناماگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید
ورودعنوان ژورنال:
- Computer Networks
دوره 57 شماره
صفحات -
تاریخ انتشار 2013