2019
DOI: 10.1109/access.2019.2913899
|View full text |Cite
|
Sign up to set email alerts
|

Toward Interference Aware IoT Framework: Energy and Geo-Location-Based-Modeling

Abstract: In multi-hop wireless communication, a sensor node should consume its energy efficiently for relaying of data packets. However, most IoT-devices are equipped with limited battery power and computing resources for wireless communications, and thus energy optimization becomes one of the major concerns in wireless sensors routing design. The wireless technologies usually use unlicensed frequency bands of 2.4 GHz to transmit the data. Due to the broadcasting medium, the wireless transmission interferes with the re… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
17
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
4
3
1
1

Relationship

2
7

Authors

Journals

citations
Cited by 30 publications
(17 citation statements)
references
References 25 publications
0
17
0
Order By: Relevance
“…drEdgE. (27) Comparing (27) and (14), shows that both expressions are similar with maximum distance R = r max and source power P s . Thus, using (20), M χE (z) = M ψ (zP s |r max ) and we obtain from (20) and (26) the expression…”
Section: B Computation Of Moment Generating Functionsmentioning
confidence: 84%
See 1 more Smart Citation
“…drEdgE. (27) Comparing (27) and (14), shows that both expressions are similar with maximum distance R = r max and source power P s . Thus, using (20), M χE (z) = M ψ (zP s |r max ) and we obtain from (20) and (26) the expression…”
Section: B Computation Of Moment Generating Functionsmentioning
confidence: 84%
“…The significance of investigating the physical layer security in a vehicular network is crucial due to rapid advancements towards autonomous vehicles and smart/cognitive transportation networks to minimise the risk from compromise. It has however been observed that the effect of interference on the physical layer security has received much less attention, even though interference is inherent within shared networks [14] and has been shown to affect the secrecy performance. For example, in [15] the effect of interference on the secrecy capacity of a cognitive radio (CR) network was examined, while in [16], the effect of interference on secrecy outage probability was considered in a Rayleigh faded channel.…”
Section: Introductionmentioning
confidence: 99%
“…This protocol is based on the neuro-fuzzy inference system to decide the CH and neural network for data routing decisions. Another load balancing and routing based on energy and geolocation-based modeling (EGBM) protocol is proposed in [45]. This protocol attempts to handle interference issues that result in a drop in the number of packets to the BS.…”
Section: Related Workmentioning
confidence: 99%
“…The widely growing application domains for underwater sensor networks (UWSNs) have attracted potential attention in R&D from the Internet of Things (IoT)-oriented industries and academia [1][2][3]. The growing domains include border security-centric military applications [4,5], energy and cost-centric…”
Section: Introductionmentioning
confidence: 99%