The integration of simultaneous wireless information and power transfer (SWIPT) and cooperative relay (CoR) techniques has evolved as a new phenomenon for the next-generation wireless communication system. CoR is used to get energy and spectral efficient network and to solve the issues of fading, path loss, shadowing, and smaller coverage area. Relay nodes are battery-constrained or battery-less devices. They need some charging systems externally as replacing or recharging of their batteries sometimes which are not feasible and convenient. Energy harvesting (EH) is the most cost-effective, suitable, and safer solutions to power up these relays. Among various types of the EH, SWIPT is the most prominent technique as it provides spectral efficiency by delivering energy and information to the relays at the same time. This paper reviews the combination of CoR and SWIPT. From basic to advanced architectures, applications and taxonomies of CoR and SWIPT are presented, various forms of resource allocation and relay selection algorithms are covered. The usage of CoR and SWIPT in the fifth-generation wireless networks is discussed. This paper focuses on the integral aspects of the CoR and SWIPT to other next-generation wireless communication systems and techniques such as multiple-input-multiple-output, wireless sensor network, cognitive radio, vehicular ad hoc network, non-orthogonal multiple access, beamforming technique, and the Internet of Things. Some open issues and future directions and challenges are given in this paper.
The domain of underwater wireless sensor networks (UWSNs) had received a lot of attention recently due to its significant advanced capabilities in the ocean surveillance, marine monitoring and application deployment for detecting underwater targets. However, the literature have not compiled the state-of-the-art along its direction to discover the recent advancements which were fuelled by the underwater sensor technologies. Hence, this paper offers the newest analysis on the available evidences by reviewing studies in the past five years on various aspects that support network activities and applications in UWSN environments. This work was motivated by the need for robust and flexible solutions that can satisfy the requirements for the rapid development of the underwater wireless sensor networks. This paper identifies the key requirements for achieving essential services as well as common platforms for UWSN. It also contributes a taxonomy of the critical elements in UWSNs by devising a classification on architectural elements, communications, routing protocol and standards, security, and applications of UWSNs. Finally, the major challenges that remain open are presented as a guide for future research directions.
Internet of Drones (IoD) is a decentralized network and management framework that links drones' access to the controlled airspace and provides inter-location navigation services. The interconnection of drones in the IoD network is through the Internet of Things (IoT). Hence the IoD network is vulnerable to all the security and privacy threats that affect IoT networks. It is highly required to safeguard a good atmosphere free from security and privacy threats to get the desired performance from IoD applications. Security and privacy issues have significantly restricted the overall influence of the IoD paradigm. There are existing survey studies that helped lay a vital foundation for understanding the IoD security and privacy issues. However, not all have thoroughly investigated the level of security and privacy threats associated with the various drone categories. Besides, most existing review studies do not examine secured IoD architecture. This paper aims to assess the recent trends in the security and privacy issues that affect the IoD network. We investigate the level of security and privacy threats of the various drone categories. We then highlight the need for secured IoD architecture and propose one. We also give a comprehensive taxonomy of the attacks on the IoD network. Moreover, we review the recent IoD attack mitigating techniques. We also provide the performance evaluation methods and the performance metrics employed by the techniques. Finally, we give research future direction to help researchers identify the latest opportunities in IoD research.
Internet of things (IoT) is considered as a collection of heterogeneous devices, such as sensors, Radio-frequency identification (RFID) and actuators, which form a huge network, enabling non-internet components in the network to produce a better world of services, like smart home, smart city, smart transportation, and smart industries. On the other hand, security and privacy are the most important aspects of the IoT network, which includes authentication, authorization, data protection, network security, and access control. Additionally, traditional network security cannot be directly used in IoT networks due to its limitations on computational capabilities and storage capacities. Furthermore, authentication is the mainstay of the IoT network, as all components undergo an authentication process before establishing communication. Therefore, securing authentication is essential. In this paper, we have focused on IoT security particularly on their authentication mechanisms. Consequently, we highlighted enormous attacks and technical methods on the IoT authentication mechanism. Additionally, we discussed existing security verification techniques and evaluation schemes of IoT authentication. Furthermore, analysis against current existing protocols have been discussed in all parts and provided some recommendation. Finally, the aim of our study is to help the future researcher by providing security issues, open challenges and future scopes in IoT authentication.
Interference and energy holes formation in underwater wireless sensor networks (UWSNs) threaten the reliable delivery of data packets from a source to a destination. Interference also causes inefficient utilization of the limited battery power of the sensor nodes in that more power is consumed in the retransmission of the lost packets. Energy holes are dead nodes close to the surface of water, and their early death interrupts data delivery even when the network has live nodes. This paper proposes a localization-free interference and energy holes minimization (LF-IEHM) routing protocol for UWSNs. The proposed algorithm overcomes interference during data packet forwarding by defining a unique packet holding time for every sensor node. The energy holes formation is mitigated by a variable transmission range of the sensor nodes. As compared to the conventional routing protocols, the proposed protocol does not require the localization information of the sensor nodes, which is cumbersome and difficult to obtain, as nodes change their positions with water currents. Simulation results show superior performance of the proposed scheme in terms of packets received at the final destination and end-to-end delay.
Nowadays, machine learning (ML), which is one of the most rapidly growing technical tools, is extensively used to solve critical challenges in various domains. Vehicular ad hoc network (VANET) is expected to be the key role player in reducing road casualties and traffic congestion. To ensure this role, a gigantic amount of data should be exchanged. However, current allocated wireless access for VANET is inadequate to handle such massive data amounts. Therefore, VANET faces a spectrum scarcity issue. Cognitive radio (CR) is a promising solution to overcome such an issue. CR-based VANET or CR-VANET must achieve several performance enhancement measures, including ultra-reliable and lowlatency communication. ML methods can be integrated with CR-VANET to make CR-VANET highly intelligent, achieve rapid adaptability to the dynamicity of the environment, and improve the quality of service in an energy-efficient manner. This paper presents an overview of ML, CR, VANET, and CR-VANET, including their architectures, functions, challenges, and open issues. The applications and roles of ML methods in CR-VANET scenarios are reviewed. Insights into the use of ML for autonomous or driverless vehicles are also presented. Current advancements in the amalgamation of these prominent technologies and future research directions are discussed. INDEX TERMS Machine learning, VANET, cognitive radio, autonomous vehicles, smart transportation system. performance of CR-VANET [15]. Security enhancement is one of the major issues in CR-VANET. Here, a vehicle can pretend to be a PU and propagate false information to obtain spectrum access selfishly. ML can be used to detect such actions and enhance security [16], [17]. ML also provides an optimum route to CR-VANET users to avoid traffic jams and road accidents. ML can also play a vital role in the best infotainment experience in CR-VANET. It can be used for appropriate scheduling, selecting the best channel, and prioritizing messages. CR and ML can play a major role in the next-generation driverless car system. The role of CR in the next-generation transportation system has been presented in previous discussions. This survey shows how ML can be applied to reduce road accidents and traffic congestion. CR can be used to accommodate the spectrum required to support massive data communication among automated driverless vehicles and networks. ML can be an integral part of this driverless or automated vehicle system. Similar to a robot, an autonomous vehicle (AV) can learn the surrounding environment and communicate with increased safety, reliability, QoS, and energy efficiency by applying such learning. This paper presents the dynamic usages of ML in CR-VANET elaborately. Several of the benefits of CR in VANETs and ML in VANETs and CR-VANETs are presented in Table 1. B. CONTRIBUTIONS OF THIS SURVEY ARTICLE Many survey articles describe CR, VANET, ML, and CR-VANETs individually or describe a few aspects of their amalgamation. To the best of our knowledge, surveys that cover the usage of ML in CR-VANET...
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.
hi@scite.ai
10624 S. Eastern Ave., Ste. A-614
Henderson, NV 89052, USA
Copyright © 2024 scite LLC. All rights reserved.
Made with 💙 for researchers
Part of the Research Solutions Family.