Advanced search in
Searching FieldsTerms
Any field
arrow_drop_down
includes
arrow_drop_down
The following results are related to Rural Digital Europe. Are you interested to view more results? Visit OpenAIRE - Explore.

  • Rural Digital Europe
  • Publications
  • IN
  • Transactions on Emerging Telecommun...

Date (most recent)
arrow_drop_down
  • image/svg+xml Jakob Voss, based on art designer at PLoS, modified by Wikipedia users Nina and Beao Closed Access logo, derived from PLoS Open Access logo. This version with transparent background. http://commons.wikimedia.org/wiki/File:Closed_Access_logo_transparent.svg Jakob Voss, based on art designer at PLoS, modified by Wikipedia users Nina and Beao
    Authors: Nellore Kapileswar; P. Phani Kumar;

    AbstractThe underwater wireless sensor network (UWSN) faces many problems such as limited bandwidth, large path loss, high attenuation, and limited battery power. In recent times, different routing protocols have been proposed in the Internet of Things (IoT) enabled UWSN (IoT‐UWSNs) to explore the underwater environment for different purposes, that is, scientific and military purposes. However, high energy consumption (EC), end to end (E2E) delay, low packet delivery ratio (PDR) and minimum network lifetime make the energy efficient communication a challenging task in UWSN. The high E2E delay, EC, and reliable data delivery are the critical issues, which play an important role to enhance the network throughput. For effective achievement of EC, proposed a new routing algorithm called bald eagle search (BES). It is a nature‐inspired optimization algorithm that copied bald eagle hunting behavior. The proposed routing protocol includes three stages: initialization stage, construction stage, and the data transmission phase. The nodes identify the location and the sector during the initialization process. The construction phase includes two steps, neighbor node selection, and identification of energy efficient path. Then the last phase includes the transmission, in this the broadcasting node chooses the nodes with high residual energy (RE) in comparison to the average RE of the entire network. The proposed method is implemented in MATLAB. The outcomes of simulation confirm that the BES algorithm has better performance on EC, average RE, and network lifetime than the three existing algorithm in UWSN.

    image/svg+xml Jakob Voss, based on art designer at PLoS, modified by Wikipedia users Nina and Beao Closed Access logo, derived from PLoS Open Access logo. This version with transparent background. http://commons.wikimedia.org/wiki/File:Closed_Access_logo_transparent.svg Jakob Voss, based on art designer at PLoS, modified by Wikipedia users Nina and Beao Transactions on Emer...arrow_drop_down
    image/svg+xml Jakob Voss, based on art designer at PLoS, modified by Wikipedia users Nina and Beao Closed Access logo, derived from PLoS Open Access logo. This version with transparent background. http://commons.wikimedia.org/wiki/File:Closed_Access_logo_transparent.svg Jakob Voss, based on art designer at PLoS, modified by Wikipedia users Nina and Beao
    Transactions on Emerging Telecommunications Technologies
    Article . 2021 . Peer-reviewed
    License: Wiley Online Library User Agreement
    Data sources: Crossref
    addClaim

    This Research product is the result of merged Research products in OpenAIRE.

    You have already added works in your ORCID record related to the merged Research product.
    15
    citations15
    popularityTop 10%
    influenceAverage
    impulseTop 10%
    BIP!Powered by BIP!
    more_vert
      image/svg+xml Jakob Voss, based on art designer at PLoS, modified by Wikipedia users Nina and Beao Closed Access logo, derived from PLoS Open Access logo. This version with transparent background. http://commons.wikimedia.org/wiki/File:Closed_Access_logo_transparent.svg Jakob Voss, based on art designer at PLoS, modified by Wikipedia users Nina and Beao Transactions on Emer...arrow_drop_down
      image/svg+xml Jakob Voss, based on art designer at PLoS, modified by Wikipedia users Nina and Beao Closed Access logo, derived from PLoS Open Access logo. This version with transparent background. http://commons.wikimedia.org/wiki/File:Closed_Access_logo_transparent.svg Jakob Voss, based on art designer at PLoS, modified by Wikipedia users Nina and Beao
      Transactions on Emerging Telecommunications Technologies
      Article . 2021 . Peer-reviewed
      License: Wiley Online Library User Agreement
      Data sources: Crossref
      addClaim

      This Research product is the result of merged Research products in OpenAIRE.

      You have already added works in your ORCID record related to the merged Research product.
  • image/svg+xml Jakob Voss, based on art designer at PLoS, modified by Wikipedia users Nina and Beao Closed Access logo, derived from PLoS Open Access logo. This version with transparent background. http://commons.wikimedia.org/wiki/File:Closed_Access_logo_transparent.svg Jakob Voss, based on art designer at PLoS, modified by Wikipedia users Nina and Beao
    Authors: Ankush Manocha;

    AbstractIndoor environment pollution is one of the significant concerns related to the individual's health of every category. As a majority of the population is spending their time indoors, the research on environment monitoring is realized on priority. In this research, the correlation between the indoor environment and health is determined to predict the health severity of pregnant females in real‐time. The proposed solution employs IoT‐enabled smart sensors for data acquisition. The accumulated data is processed over the fog‐cloud platform for data quantification. To classify the irregular events from the processed data, the machine learning‐assisted Weighted‐Naïve Bayes (W‐NB) classification technique is deployed on the fog layer. Furthermore, a deep learning‐inspired multilayered convolutional neural network‐long short‐term memory (M‐CNN‐LSTM) model is proposed to determine the scale of health severity. Moreover, a two‐phased alert generation mechanism is proposed to deal with the case of a medical emergency by generating notifications to the concerned medical specialists. The performance of the system is validated by performing several experimental simulations over the environmental and health datasets comprised of nearly 38 356 instances. The performance of the proposed solution is evaluated in terms of event classification, severity prediction, temporal delay efficiency, and overall performance stability. The calculated outcomes registered considerable performance over the several state‐of‐the‐art decision‐making approaches.

    image/svg+xml Jakob Voss, based on art designer at PLoS, modified by Wikipedia users Nina and Beao Closed Access logo, derived from PLoS Open Access logo. This version with transparent background. http://commons.wikimedia.org/wiki/File:Closed_Access_logo_transparent.svg Jakob Voss, based on art designer at PLoS, modified by Wikipedia users Nina and Beao Transactions on Emer...arrow_drop_down
    image/svg+xml Jakob Voss, based on art designer at PLoS, modified by Wikipedia users Nina and Beao Closed Access logo, derived from PLoS Open Access logo. This version with transparent background. http://commons.wikimedia.org/wiki/File:Closed_Access_logo_transparent.svg Jakob Voss, based on art designer at PLoS, modified by Wikipedia users Nina and Beao
    Transactions on Emerging Telecommunications Technologies
    Article . 2021 . Peer-reviewed
    License: Wiley Online Library User Agreement
    Data sources: Crossref
    addClaim

    This Research product is the result of merged Research products in OpenAIRE.

    You have already added works in your ORCID record related to the merged Research product.
    3
    citations3
    popularityTop 10%
    influenceAverage
    impulseAverage
    BIP!Powered by BIP!
    more_vert
      image/svg+xml Jakob Voss, based on art designer at PLoS, modified by Wikipedia users Nina and Beao Closed Access logo, derived from PLoS Open Access logo. This version with transparent background. http://commons.wikimedia.org/wiki/File:Closed_Access_logo_transparent.svg Jakob Voss, based on art designer at PLoS, modified by Wikipedia users Nina and Beao Transactions on Emer...arrow_drop_down
      image/svg+xml Jakob Voss, based on art designer at PLoS, modified by Wikipedia users Nina and Beao Closed Access logo, derived from PLoS Open Access logo. This version with transparent background. http://commons.wikimedia.org/wiki/File:Closed_Access_logo_transparent.svg Jakob Voss, based on art designer at PLoS, modified by Wikipedia users Nina and Beao
      Transactions on Emerging Telecommunications Technologies
      Article . 2021 . Peer-reviewed
      License: Wiley Online Library User Agreement
      Data sources: Crossref
      addClaim

      This Research product is the result of merged Research products in OpenAIRE.

      You have already added works in your ORCID record related to the merged Research product.
  • image/svg+xml Jakob Voss, based on art designer at PLoS, modified by Wikipedia users Nina and Beao Closed Access logo, derived from PLoS Open Access logo. This version with transparent background. http://commons.wikimedia.org/wiki/File:Closed_Access_logo_transparent.svg Jakob Voss, based on art designer at PLoS, modified by Wikipedia users Nina and Beao
    Authors: Meeniga Sri Raghavendra; Priyanka Chawla; Sukhpal Singh Gill;

    AbstractFog computing has become adaptable and also as a promising infrastructure for providing elastic resources at the edge of the network. Fog computing reduces the transmission latency and consumption of bandwidth while processing the incoming requests from various Internet of Things (IoT) devices. Moreover, fog computing can support and facilitate geographically distributed applications with low and predictable latency. However, this technology also has significant research issues in its current stage such as successful implementation of service location models. In this article, we propose a deadline‐aware and energy‐efficient dynamic service placement (DEEDSP) technique for fog computing that supports the placement of IoT based services. Further, hyper‐heuristic algorithm based energy‐efficient service placement technique is proposed to balance the energy‐delay trade‐off based on different service placement decision criteria (eg, minimum response time or energy consumption). The proposed algorithm is able to dynamically minimize the energy consumption of the system while ensuring that the response time satisfies a given time constraint. Finally, the proposed technique is evaluated in simulated fog computing environment and experimental results show that this technique performs better than state‐of‐the‐art placement techniques in terms of energy and latency.

    image/svg+xml Jakob Voss, based on art designer at PLoS, modified by Wikipedia users Nina and Beao Closed Access logo, derived from PLoS Open Access logo. This version with transparent background. http://commons.wikimedia.org/wiki/File:Closed_Access_logo_transparent.svg Jakob Voss, based on art designer at PLoS, modified by Wikipedia users Nina and Beao Transactions on Emer...arrow_drop_down
    image/svg+xml Jakob Voss, based on art designer at PLoS, modified by Wikipedia users Nina and Beao Closed Access logo, derived from PLoS Open Access logo. This version with transparent background. http://commons.wikimedia.org/wiki/File:Closed_Access_logo_transparent.svg Jakob Voss, based on art designer at PLoS, modified by Wikipedia users Nina and Beao
    Transactions on Emerging Telecommunications Technologies
    Article . 2021 . Peer-reviewed
    License: Wiley Online Library User Agreement
    Data sources: Crossref
    addClaim

    This Research product is the result of merged Research products in OpenAIRE.

    You have already added works in your ORCID record related to the merged Research product.
    5
    citations5
    popularityTop 10%
    influenceAverage
    impulseAverage
    BIP!Powered by BIP!
    more_vert
      image/svg+xml Jakob Voss, based on art designer at PLoS, modified by Wikipedia users Nina and Beao Closed Access logo, derived from PLoS Open Access logo. This version with transparent background. http://commons.wikimedia.org/wiki/File:Closed_Access_logo_transparent.svg Jakob Voss, based on art designer at PLoS, modified by Wikipedia users Nina and Beao Transactions on Emer...arrow_drop_down
      image/svg+xml Jakob Voss, based on art designer at PLoS, modified by Wikipedia users Nina and Beao Closed Access logo, derived from PLoS Open Access logo. This version with transparent background. http://commons.wikimedia.org/wiki/File:Closed_Access_logo_transparent.svg Jakob Voss, based on art designer at PLoS, modified by Wikipedia users Nina and Beao
      Transactions on Emerging Telecommunications Technologies
      Article . 2021 . Peer-reviewed
      License: Wiley Online Library User Agreement
      Data sources: Crossref
      addClaim

      This Research product is the result of merged Research products in OpenAIRE.

      You have already added works in your ORCID record related to the merged Research product.
  • image/svg+xml Jakob Voss, based on art designer at PLoS, modified by Wikipedia users Nina and Beao Closed Access logo, derived from PLoS Open Access logo. This version with transparent background. http://commons.wikimedia.org/wiki/File:Closed_Access_logo_transparent.svg Jakob Voss, based on art designer at PLoS, modified by Wikipedia users Nina and Beao
    Authors: Omar A. Alzubi; Jafar A. Alzubi; K. Shankar; Deepak Gupta;

    AbstractAdvancements in information technology have benefited the healthcare industry by providing it with distinct methods of managing medical data which improve the quality of medical services. The Internet of Things (IoT) and artificial intelligence are the foundations for innovative sustainable computing technologies in e‐healthcare applications. In the IoT‐enabled sustainable healthcare system, the IoT devices normally record the patient data and transfer it to the cloud for further processing. Security is considered an important issue in the design of IoT networks in the healthcare environment. To resolve this issue, this article presents a novel blockchain and artificial intelligence‐enabled secure medical data transmission (BAISMDT) for IoT networks. The goal of the BAISMDT model is to achieve security and privacy in reliable data transmission of the IoT networks. The proposed model involves a signcryption technique for secure and reliable IoT data transmission. The blockchain‐enabled secure medical data transmission process takes place among the IoT gadgets and service providers. The blockchain technique is applied to generate a viable environment to securely and reliably transmit data among different data providers. Next to the decryption process, the modified discrete particle swarm optimization algorithm with wavelet kernel extreme learning machine model is applied to determine the presence of disease. An extensive set of simulations were carried out on a benchmark medical dataset. The experimental results analysis pointed out the superior performance of the proposed BAISMDT model with the accuracy of 97.54% and 98.13% on the applied Heart Statlog and WBC dataset, respectively.

    image/svg+xml Jakob Voss, based on art designer at PLoS, modified by Wikipedia users Nina and Beao Closed Access logo, derived from PLoS Open Access logo. This version with transparent background. http://commons.wikimedia.org/wiki/File:Closed_Access_logo_transparent.svg Jakob Voss, based on art designer at PLoS, modified by Wikipedia users Nina and Beao Transactions on Emer...arrow_drop_down
    image/svg+xml Jakob Voss, based on art designer at PLoS, modified by Wikipedia users Nina and Beao Closed Access logo, derived from PLoS Open Access logo. This version with transparent background. http://commons.wikimedia.org/wiki/File:Closed_Access_logo_transparent.svg Jakob Voss, based on art designer at PLoS, modified by Wikipedia users Nina and Beao
    Transactions on Emerging Telecommunications Technologies
    Article . 2021 . Peer-reviewed
    License: Wiley Online Library User Agreement
    Data sources: Crossref
    addClaim

    This Research product is the result of merged Research products in OpenAIRE.

    You have already added works in your ORCID record related to the merged Research product.
    34
    citations34
    popularityTop 1%
    influenceTop 10%
    impulseTop 10%
    BIP!Powered by BIP!
    more_vert
      image/svg+xml Jakob Voss, based on art designer at PLoS, modified by Wikipedia users Nina and Beao Closed Access logo, derived from PLoS Open Access logo. This version with transparent background. http://commons.wikimedia.org/wiki/File:Closed_Access_logo_transparent.svg Jakob Voss, based on art designer at PLoS, modified by Wikipedia users Nina and Beao Transactions on Emer...arrow_drop_down
      image/svg+xml Jakob Voss, based on art designer at PLoS, modified by Wikipedia users Nina and Beao Closed Access logo, derived from PLoS Open Access logo. This version with transparent background. http://commons.wikimedia.org/wiki/File:Closed_Access_logo_transparent.svg Jakob Voss, based on art designer at PLoS, modified by Wikipedia users Nina and Beao
      Transactions on Emerging Telecommunications Technologies
      Article . 2021 . Peer-reviewed
      License: Wiley Online Library User Agreement
      Data sources: Crossref
      addClaim

      This Research product is the result of merged Research products in OpenAIRE.

      You have already added works in your ORCID record related to the merged Research product.
  • image/svg+xml Jakob Voss, based on art designer at PLoS, modified by Wikipedia users Nina and Beao Closed Access logo, derived from PLoS Open Access logo. This version with transparent background. http://commons.wikimedia.org/wiki/File:Closed_Access_logo_transparent.svg Jakob Voss, based on art designer at PLoS, modified by Wikipedia users Nina and Beao
    Authors: Ponsy R. K. Sathia Bhama; Chandra Priya Jayabal;

    AbstractInternet of Things (IoT) and cloud metadata have highly sensitive details and facts about data and objects; it usually holds confidential information about the data for which there are access restrictions. Hence, it forms the most abundant source of information about any digital object from which the actual data can be rebuilt or duplicated with the same level of originality. However, it appears to be an emerging threat vector in IoT and cloud environments. If a misfeasor acquires access to the metadata information, then there arises a security threat. This article proposes a novel method on a bifold layered blockchain network, referred to as MetaInfoChain, to enhance the integrity and access controllability of safe storage. By default, blockchain protects the data while a permissioned blockchain forms an access control layer over the core blockchain. The acquired instance, compute, and the unique credentials sign device metadata to enforce controllability and validated by minters and add it to the base layer of the MetaInfoChain. Subsequently, we propose a consensus attainment algorithm to build an unrefined block on a candidate block comprising metadata packages. Consequently, all the nodes receive an unrefined block replica, which can afford absolute integrity. The top layer of MetaInfoChain is sensible to generate tamper‐resistant metadata by executing hybrid PoS‐PoW tasks on the unrefined block, causing robust integrity. After accomplishing all the checks, it endorses the MetaInfoChain to append the block with 35% block time efficiency in the base layer with a 56% throughput hike.

    image/svg+xml Jakob Voss, based on art designer at PLoS, modified by Wikipedia users Nina and Beao Closed Access logo, derived from PLoS Open Access logo. This version with transparent background. http://commons.wikimedia.org/wiki/File:Closed_Access_logo_transparent.svg Jakob Voss, based on art designer at PLoS, modified by Wikipedia users Nina and Beao Transactions on Emer...arrow_drop_down
    image/svg+xml Jakob Voss, based on art designer at PLoS, modified by Wikipedia users Nina and Beao Closed Access logo, derived from PLoS Open Access logo. This version with transparent background. http://commons.wikimedia.org/wiki/File:Closed_Access_logo_transparent.svg Jakob Voss, based on art designer at PLoS, modified by Wikipedia users Nina and Beao
    Transactions on Emerging Telecommunications Technologies
    Article . 2021 . Peer-reviewed
    License: Wiley Online Library User Agreement
    Data sources: Crossref
    addClaim

    This Research product is the result of merged Research products in OpenAIRE.

    You have already added works in your ORCID record related to the merged Research product.
    6
    citations6
    popularityTop 10%
    influenceAverage
    impulseTop 10%
    BIP!Powered by BIP!
    more_vert
      image/svg+xml Jakob Voss, based on art designer at PLoS, modified by Wikipedia users Nina and Beao Closed Access logo, derived from PLoS Open Access logo. This version with transparent background. http://commons.wikimedia.org/wiki/File:Closed_Access_logo_transparent.svg Jakob Voss, based on art designer at PLoS, modified by Wikipedia users Nina and Beao Transactions on Emer...arrow_drop_down
      image/svg+xml Jakob Voss, based on art designer at PLoS, modified by Wikipedia users Nina and Beao Closed Access logo, derived from PLoS Open Access logo. This version with transparent background. http://commons.wikimedia.org/wiki/File:Closed_Access_logo_transparent.svg Jakob Voss, based on art designer at PLoS, modified by Wikipedia users Nina and Beao
      Transactions on Emerging Telecommunications Technologies
      Article . 2021 . Peer-reviewed
      License: Wiley Online Library User Agreement
      Data sources: Crossref
      addClaim

      This Research product is the result of merged Research products in OpenAIRE.

      You have already added works in your ORCID record related to the merged Research product.
  • image/svg+xml Jakob Voss, based on art designer at PLoS, modified by Wikipedia users Nina and Beao Closed Access logo, derived from PLoS Open Access logo. This version with transparent background. http://commons.wikimedia.org/wiki/File:Closed_Access_logo_transparent.svg Jakob Voss, based on art designer at PLoS, modified by Wikipedia users Nina and Beao
    Authors: Aashima Sharma; Sanmeet Kaur; Maninder Singh;

    AbstractBlockchain Technology, the fundamental technology behind Bitcoin, has drawn considerable recognition ever since its origin. Its potential has gained significant interest in various applications, varying from the music industry, financial services, Internet‐of‐Things (IoT), smart grid, edge computing, cybersecurity, and the healthcare industry. However, the information is divided amongst several intermediaries involved with adverse impacts on data quality in the healthcare domain. In the near future, blockchain technology can reshape the way the healthcare industry works by providing personalized and reliable patient data management, reforming the traditional healthcare practices, secure mechanisms for data sharing, efficient pharmaceutical supply chain management, and drug traceability and many more. In this study, an extensive literature review has been provided that includes the different prospects of using blockchain technology in healthcare. The review investigates the work done to enable the amalgamation of IoT and Blockchain in the health ecosystem. Significant blockchain‐based healthcare use cases such as data storage, data sharing, drug traceability, clinical trials, and remote patient monitoring are investigated. Further, the Internet of Things and blockchain technology‐based SWOT (Strength, Weakness, Opportunity, and Threat) analysis and the challenges linked in the healthcare domain because of the enactment of IoT and blockchain technology are discussed to support advanced studies in this domain.

    image/svg+xml Jakob Voss, based on art designer at PLoS, modified by Wikipedia users Nina and Beao Closed Access logo, derived from PLoS Open Access logo. This version with transparent background. http://commons.wikimedia.org/wiki/File:Closed_Access_logo_transparent.svg Jakob Voss, based on art designer at PLoS, modified by Wikipedia users Nina and Beao Transactions on Emer...arrow_drop_down
    image/svg+xml Jakob Voss, based on art designer at PLoS, modified by Wikipedia users Nina and Beao Closed Access logo, derived from PLoS Open Access logo. This version with transparent background. http://commons.wikimedia.org/wiki/File:Closed_Access_logo_transparent.svg Jakob Voss, based on art designer at PLoS, modified by Wikipedia users Nina and Beao
    Transactions on Emerging Telecommunications Technologies
    Article . 2021 . Peer-reviewed
    License: Wiley Online Library User Agreement
    Data sources: Crossref
    addClaim

    This Research product is the result of merged Research products in OpenAIRE.

    You have already added works in your ORCID record related to the merged Research product.
    36
    citations36
    popularityTop 1%
    influenceTop 10%
    impulseTop 1%
    BIP!Powered by BIP!
    more_vert
      image/svg+xml Jakob Voss, based on art designer at PLoS, modified by Wikipedia users Nina and Beao Closed Access logo, derived from PLoS Open Access logo. This version with transparent background. http://commons.wikimedia.org/wiki/File:Closed_Access_logo_transparent.svg Jakob Voss, based on art designer at PLoS, modified by Wikipedia users Nina and Beao Transactions on Emer...arrow_drop_down
      image/svg+xml Jakob Voss, based on art designer at PLoS, modified by Wikipedia users Nina and Beao Closed Access logo, derived from PLoS Open Access logo. This version with transparent background. http://commons.wikimedia.org/wiki/File:Closed_Access_logo_transparent.svg Jakob Voss, based on art designer at PLoS, modified by Wikipedia users Nina and Beao
      Transactions on Emerging Telecommunications Technologies
      Article . 2021 . Peer-reviewed
      License: Wiley Online Library User Agreement
      Data sources: Crossref
      addClaim

      This Research product is the result of merged Research products in OpenAIRE.

      You have already added works in your ORCID record related to the merged Research product.
  • image/svg+xml Jakob Voss, based on art designer at PLoS, modified by Wikipedia users Nina and Beao Closed Access logo, derived from PLoS Open Access logo. This version with transparent background. http://commons.wikimedia.org/wiki/File:Closed_Access_logo_transparent.svg Jakob Voss, based on art designer at PLoS, modified by Wikipedia users Nina and Beao
    Authors: Ritu Nigam; Deepak Kumar Sharma; Satbir Jain; Kartik Krishna Bhardwaj; +1 Authors

    AbstractThe emergence of the new applications in the realm of Opportunistic IoT networks brings exceptional levels of complexity with it; hence, Artificial Intelligence‐based approaches are envisioned for the design and optimization owing to the versatility and adaptability it assists in resolving complex real‐time problems. In these networks, messages are transmitted through node cooperation because of the nodes' random movement and a lack of network infrastructure. As it is an open network, message forwarding is susceptible to intervention from anomalous nodes that may attribute maliciousness or selfishness, which may cause network transmission disorder and makes routing complex in Social Opportunistic IoT networks. By leveraging AI's capability, these networks can be redesigned to enable a more secure and efficient routing for the nodes. In order to suppress various harmful impacts in the network from anomalous nodes, this paper proposes an AI‐Enabled Trust‐Based Routing Protocol using NSGA‐II for Social Opportunistic IoT Networks (TBRP), which uses the concept of multi‐objective optimization. TBRP employs a new Four Tier Protocol trust scheme based on contextual parameters. This AI‐enabled multi‐objective optimization scheme modifies the conventional NSGA‐II for amelioration through an intelligent chromosome representation, improved crossover, and mutation paradigm. TBRP is evaluated against several routing protocols and with trust‐based protocols TCAFE and MT‐SMRP on various performance metrics using the INFOCOMM dataset. TBRP outperforms Firefly PRoPHET, AntRouter, GAER, and PRoPHET by 1.66%, 10.66%, 25.44%, and 58.57%, respectively, in terms of the delivery success ratio while varying the time for which simulation is run.

    image/svg+xml Jakob Voss, based on art designer at PLoS, modified by Wikipedia users Nina and Beao Closed Access logo, derived from PLoS Open Access logo. This version with transparent background. http://commons.wikimedia.org/wiki/File:Closed_Access_logo_transparent.svg Jakob Voss, based on art designer at PLoS, modified by Wikipedia users Nina and Beao Transactions on Emer...arrow_drop_down
    image/svg+xml Jakob Voss, based on art designer at PLoS, modified by Wikipedia users Nina and Beao Closed Access logo, derived from PLoS Open Access logo. This version with transparent background. http://commons.wikimedia.org/wiki/File:Closed_Access_logo_transparent.svg Jakob Voss, based on art designer at PLoS, modified by Wikipedia users Nina and Beao
    Transactions on Emerging Telecommunications Technologies
    Article . 2021 . Peer-reviewed
    License: Wiley Online Library User Agreement
    Data sources: Crossref
    addClaim

    This Research product is the result of merged Research products in OpenAIRE.

    You have already added works in your ORCID record related to the merged Research product.
    3
    citations3
    popularityTop 10%
    influenceAverage
    impulseAverage
    BIP!Powered by BIP!
    more_vert
      image/svg+xml Jakob Voss, based on art designer at PLoS, modified by Wikipedia users Nina and Beao Closed Access logo, derived from PLoS Open Access logo. This version with transparent background. http://commons.wikimedia.org/wiki/File:Closed_Access_logo_transparent.svg Jakob Voss, based on art designer at PLoS, modified by Wikipedia users Nina and Beao Transactions on Emer...arrow_drop_down
      image/svg+xml Jakob Voss, based on art designer at PLoS, modified by Wikipedia users Nina and Beao Closed Access logo, derived from PLoS Open Access logo. This version with transparent background. http://commons.wikimedia.org/wiki/File:Closed_Access_logo_transparent.svg Jakob Voss, based on art designer at PLoS, modified by Wikipedia users Nina and Beao
      Transactions on Emerging Telecommunications Technologies
      Article . 2021 . Peer-reviewed
      License: Wiley Online Library User Agreement
      Data sources: Crossref
      addClaim

      This Research product is the result of merged Research products in OpenAIRE.

      You have already added works in your ORCID record related to the merged Research product.
  • image/svg+xml art designer at PLoS, modified by Wikipedia users Nina, Beao, JakobVoss, and AnonMoos Open Access logo, converted into svg, designed by PLoS. This version with transparent background. http://commons.wikimedia.org/wiki/File:Open_Access_logo_PLoS_white.svg art designer at PLoS, modified by Wikipedia users Nina, Beao, JakobVoss, and AnonMoos http://www.plos.org/
    Authors: Ashutosh Dhar Dwivedi; Rajani Singh; Keshav Kaushik; Raghava Rao Mukkamala; +1 Authors

    AbstractInternet of Things (IoT) has revolutionized the digital world by connecting billions of electronic devices over the internet. IoT devices play an essential role in the modern era when conventional devices become more autonomous and smart. On the one hand, high‐speed data transfer is a major issue where the 5G‐enabled environment plays an important role. On the other hand, these IoT devices transfer the data by using protocols based on centralized architecture and may cause several security issues for the data. Merging artificial intelligence to 5G wireless systems solves several issues such as autonomous robots, self‐driving vehicles, virtual reality, and engender security problems. Building trust among the network users without trusting third party authorities is the system's primary concern. Blockchain emerged as a key technology based on a distributed ledger to maintain the network's event logs. Blockchain provides a secure, decentralized, and trustless environment for IoT devices. However, integrating IoT and blockchain also has several challenges; for example, major challenge is low throughput. Currently, the ethereum blockchain network can process approximately 12 to 15 transactions per second, while IoT devices require relatively higher throughput. Therefore, blockchains are incapable of providing functionality for a 5G‐enabled IoT based network. The limiting factor of throughput in the blockchain is their network. The slow propagation of transactions and blocks in the P2P network does not allow miners and verifiers to fastly mine and verify new blocks, respectively. Therefore, network scalability is the major issue of IoT based blockchains. In this work, we solved the network scalability issue using blockchain distributed network while to increase the throughput of blockchain, this article uses the Raft consensus algorithm. Another most important issue with IoT networks is privacy. Unfortunately, the blockchain distributed ledgers are public and sensitive information is available on the network for everyone are private, but in such cases, third party editing is not possible without revealing the original contents. To solve privacy issues, we used zkLedger as a solution that is based on zero knowledge‐based cryptography.

    image/svg+xml art designer at PLoS, modified by Wikipedia users Nina, Beao, JakobVoss, and AnonMoos Open Access logo, converted into svg, designed by PLoS. This version with transparent background. http://commons.wikimedia.org/wiki/File:Open_Access_logo_PLoS_white.svg art designer at PLoS, modified by Wikipedia users Nina, Beao, JakobVoss, and AnonMoos http://www.plos.org/ European Transaction...arrow_drop_down
    image/svg+xml art designer at PLoS, modified by Wikipedia users Nina, Beao, JakobVoss, and AnonMoos Open Access logo, converted into svg, designed by PLoS. This version with transparent background. http://commons.wikimedia.org/wiki/File:Open_Access_logo_PLoS_white.svg art designer at PLoS, modified by Wikipedia users Nina, Beao, JakobVoss, and AnonMoos http://www.plos.org/
    image/svg+xml Jakob Voss, based on art designer at PLoS, modified by Wikipedia users Nina and Beao Closed Access logo, derived from PLoS Open Access logo. This version with transparent background. http://commons.wikimedia.org/wiki/File:Closed_Access_logo_transparent.svg Jakob Voss, based on art designer at PLoS, modified by Wikipedia users Nina and Beao
    Transactions on Emerging Telecommunications Technologies
    Article . 2021 . Peer-reviewed
    License: Wiley Online Library User Agreement
    Data sources: Crossref
    addClaim

    This Research product is the result of merged Research products in OpenAIRE.

    You have already added works in your ORCID record related to the merged Research product.
    46
    citations46
    popularityTop 1%
    influenceTop 10%
    impulseTop 1%
    BIP!Powered by BIP!
    more_vert
      image/svg+xml art designer at PLoS, modified by Wikipedia users Nina, Beao, JakobVoss, and AnonMoos Open Access logo, converted into svg, designed by PLoS. This version with transparent background. http://commons.wikimedia.org/wiki/File:Open_Access_logo_PLoS_white.svg art designer at PLoS, modified by Wikipedia users Nina, Beao, JakobVoss, and AnonMoos http://www.plos.org/ European Transaction...arrow_drop_down
      image/svg+xml art designer at PLoS, modified by Wikipedia users Nina, Beao, JakobVoss, and AnonMoos Open Access logo, converted into svg, designed by PLoS. This version with transparent background. http://commons.wikimedia.org/wiki/File:Open_Access_logo_PLoS_white.svg art designer at PLoS, modified by Wikipedia users Nina, Beao, JakobVoss, and AnonMoos http://www.plos.org/
      image/svg+xml Jakob Voss, based on art designer at PLoS, modified by Wikipedia users Nina and Beao Closed Access logo, derived from PLoS Open Access logo. This version with transparent background. http://commons.wikimedia.org/wiki/File:Closed_Access_logo_transparent.svg Jakob Voss, based on art designer at PLoS, modified by Wikipedia users Nina and Beao
      Transactions on Emerging Telecommunications Technologies
      Article . 2021 . Peer-reviewed
      License: Wiley Online Library User Agreement
      Data sources: Crossref
      addClaim

      This Research product is the result of merged Research products in OpenAIRE.

      You have already added works in your ORCID record related to the merged Research product.
  • image/svg+xml Jakob Voss, based on art designer at PLoS, modified by Wikipedia users Nina and Beao Closed Access logo, derived from PLoS Open Access logo. This version with transparent background. http://commons.wikimedia.org/wiki/File:Closed_Access_logo_transparent.svg Jakob Voss, based on art designer at PLoS, modified by Wikipedia users Nina and Beao
    Authors: Manjunath G. Asuti; Prabhugoud I. Basarkod;

    AbstractInternet of Things (IoT) enabled technology in the current applications such as smart grids, smart cities, and smart health sectors utilize wireless sensor networks (WSN) to establish stable and reliable communication between the nodes. Moreover, the primary requirement of WSN in IoT applications is to provide low‐rate data communication. The IEEE 802.15.4e standard‐based medium access control (MAC) protocol is found suitable for low‐rate data communication in WSN. The IEEE 802.15.4e standard adopts a deterministic and synchronous multichannel extension (DSME) MAC protocol which employs a multisuperframe structure with multichannel data transmission during the contention free period. However, the guaranteed time slot (GTS) allocation process in DSME employed by the standard may not be suitable for an adaptive traffic network scenario that has a direct impact on the throughput and bandwidth utilization. In this article, we develop a priority and range‐based DSME‐GTS allocation algorithm based on the priorities of end nodes and range estimation. Furthermore, the proposed algorithm is developed for the two types of network scenarios encountered in a star topology‐enabled WSN. In scenario‐1, the slots allocation process is carried out based on the priorities of end nodes. Next, in scenario‐2, the slots allocation process is carried out based on the range estimation of end nodes. Detailed mathematical modeling of the proposed methodology is provided for the various performance metrics. The model is validated using the MATLAB 2017a programming tool. Simulation results show that the proposed methodology outperforms the existing DSME‐GTS approaches in terms of performance metrics such as packet delivery ratio, end‐to‐end delay, packet loss ratio, throughput, delay, bandwidth utilization, and the energy consumption.

    image/svg+xml Jakob Voss, based on art designer at PLoS, modified by Wikipedia users Nina and Beao Closed Access logo, derived from PLoS Open Access logo. This version with transparent background. http://commons.wikimedia.org/wiki/File:Closed_Access_logo_transparent.svg Jakob Voss, based on art designer at PLoS, modified by Wikipedia users Nina and Beao Transactions on Emer...arrow_drop_down
    image/svg+xml Jakob Voss, based on art designer at PLoS, modified by Wikipedia users Nina and Beao Closed Access logo, derived from PLoS Open Access logo. This version with transparent background. http://commons.wikimedia.org/wiki/File:Closed_Access_logo_transparent.svg Jakob Voss, based on art designer at PLoS, modified by Wikipedia users Nina and Beao
    Transactions on Emerging Telecommunications Technologies
    Article . 2021 . Peer-reviewed
    License: Wiley Online Library User Agreement
    Data sources: Crossref
    addClaim

    This Research product is the result of merged Research products in OpenAIRE.

    You have already added works in your ORCID record related to the merged Research product.
    3
    citations3
    popularityTop 10%
    influenceAverage
    impulseAverage
    BIP!Powered by BIP!
    more_vert
      image/svg+xml Jakob Voss, based on art designer at PLoS, modified by Wikipedia users Nina and Beao Closed Access logo, derived from PLoS Open Access logo. This version with transparent background. http://commons.wikimedia.org/wiki/File:Closed_Access_logo_transparent.svg Jakob Voss, based on art designer at PLoS, modified by Wikipedia users Nina and Beao Transactions on Emer...arrow_drop_down
      image/svg+xml Jakob Voss, based on art designer at PLoS, modified by Wikipedia users Nina and Beao Closed Access logo, derived from PLoS Open Access logo. This version with transparent background. http://commons.wikimedia.org/wiki/File:Closed_Access_logo_transparent.svg Jakob Voss, based on art designer at PLoS, modified by Wikipedia users Nina and Beao
      Transactions on Emerging Telecommunications Technologies
      Article . 2021 . Peer-reviewed
      License: Wiley Online Library User Agreement
      Data sources: Crossref
      addClaim

      This Research product is the result of merged Research products in OpenAIRE.

      You have already added works in your ORCID record related to the merged Research product.
  • image/svg+xml Jakob Voss, based on art designer at PLoS, modified by Wikipedia users Nina and Beao Closed Access logo, derived from PLoS Open Access logo. This version with transparent background. http://commons.wikimedia.org/wiki/File:Closed_Access_logo_transparent.svg Jakob Voss, based on art designer at PLoS, modified by Wikipedia users Nina and Beao
    Authors: Arpita Bhargava; Shekhar Verma;

    AbstractThe potential benefits of edge‐centric Internet of Things (IoT) come with increased security threats and because the edge devices may be compromised into sending or forwarding wrong information. To negate the effect of wrong information on inference, such messages need to be identified. Identification and dropping of messages in the network as early as possible would minimize the communication overhead. Trust values of nodes help in the early identification of such messages. In this work, the Dempster Shafer Theory (DST)‐based edge‐centric IoT‐specific Trust Model (DEIT) is designed to compute trust to include the specific characteristics of IoT. Edge servers use DEIT to compute trust value of edge devices in the network. In DEIT, DST combines the available trust messages. DIET also uses the degradation variable, credibility variable, punishment variable, re‐compensating variable, and pardoning variable to compute final trust value. The computed trust value assists the edges in taking correct decisions. Simulation results demonstrate that it can immediately capture two major types of misbehavior, namely, information drop and modification under both sparse and dense traffic conditions. Through scenarios in the results section, the depiction of various possible misbehaviors has been discussed. Scenario 1 and 2 discuss a situation where a malicious edge device misbehaves in two ways, namely, dropping and modification of information, respectively. In scenario 3 and 4, situations are discussed when the trust opinion of the trusted and distrusted devices are neutralized with time using the degradation factor to illustrate and compare changes in trust values in two different situation.

    image/svg+xml Jakob Voss, based on art designer at PLoS, modified by Wikipedia users Nina and Beao Closed Access logo, derived from PLoS Open Access logo. This version with transparent background. http://commons.wikimedia.org/wiki/File:Closed_Access_logo_transparent.svg Jakob Voss, based on art designer at PLoS, modified by Wikipedia users Nina and Beao Transactions on Emer...arrow_drop_down
    image/svg+xml Jakob Voss, based on art designer at PLoS, modified by Wikipedia users Nina and Beao Closed Access logo, derived from PLoS Open Access logo. This version with transparent background. http://commons.wikimedia.org/wiki/File:Closed_Access_logo_transparent.svg Jakob Voss, based on art designer at PLoS, modified by Wikipedia users Nina and Beao
    Transactions on Emerging Telecommunications Technologies
    Article . 2021 . Peer-reviewed
    License: Wiley Online Library User Agreement
    Data sources: Crossref
    addClaim

    This Research product is the result of merged Research products in OpenAIRE.

    You have already added works in your ORCID record related to the merged Research product.
    6
    citations6
    popularityTop 10%
    influenceAverage
    impulseTop 10%
    BIP!Powered by BIP!
    more_vert
      image/svg+xml Jakob Voss, based on art designer at PLoS, modified by Wikipedia users Nina and Beao Closed Access logo, derived from PLoS Open Access logo. This version with transparent background. http://commons.wikimedia.org/wiki/File:Closed_Access_logo_transparent.svg Jakob Voss, based on art designer at PLoS, modified by Wikipedia users Nina and Beao Transactions on Emer...arrow_drop_down
      image/svg+xml Jakob Voss, based on art designer at PLoS, modified by Wikipedia users Nina and Beao Closed Access logo, derived from PLoS Open Access logo. This version with transparent background. http://commons.wikimedia.org/wiki/File:Closed_Access_logo_transparent.svg Jakob Voss, based on art designer at PLoS, modified by Wikipedia users Nina and Beao
      Transactions on Emerging Telecommunications Technologies
      Article . 2021 . Peer-reviewed
      License: Wiley Online Library User Agreement
      Data sources: Crossref
      addClaim

      This Research product is the result of merged Research products in OpenAIRE.

      You have already added works in your ORCID record related to the merged Research product.
Advanced search in
Searching FieldsTerms
Any field
arrow_drop_down
includes
arrow_drop_down
The following results are related to Rural Digital Europe. Are you interested to view more results? Visit OpenAIRE - Explore.
  • image/svg+xml Jakob Voss, based on art designer at PLoS, modified by Wikipedia users Nina and Beao Closed Access logo, derived from PLoS Open Access logo. This version with transparent background. http://commons.wikimedia.org/wiki/File:Closed_Access_logo_transparent.svg Jakob Voss, based on art designer at PLoS, modified by Wikipedia users Nina and Beao
    Authors: Nellore Kapileswar; P. Phani Kumar;

    AbstractThe underwater wireless sensor network (UWSN) faces many problems such as limited bandwidth, large path loss, high attenuation, and limited battery power. In recent times, different routing protocols have been proposed in the Internet of Things (IoT) enabled UWSN (IoT‐UWSNs) to explore the underwater environment for different purposes, that is, scientific and military purposes. However, high energy consumption (EC), end to end (E2E) delay, low packet delivery ratio (PDR) and minimum network lifetime make the energy efficient communication a challenging task in UWSN. The high E2E delay, EC, and reliable data delivery are the critical issues, which play an important role to enhance the network throughput. For effective achievement of EC, proposed a new routing algorithm called bald eagle search (BES). It is a nature‐inspired optimization algorithm that copied bald eagle hunting behavior. The proposed routing protocol includes three stages: initialization stage, construction stage, and the data transmission phase. The nodes identify the location and the sector during the initialization process. The construction phase includes two steps, neighbor node selection, and identification of energy efficient path. Then the last phase includes the transmission, in this the broadcasting node chooses the nodes with high residual energy (RE) in comparison to the average RE of the entire network. The proposed method is implemented in MATLAB. The outcomes of simulation confirm that the BES algorithm has better performance on EC, average RE, and network lifetime than the three existing algorithm in UWSN.

    image/svg+xml Jakob Voss, based on art designer at PLoS, modified by Wikipedia users Nina and Beao Closed Access logo, derived from PLoS Open Access logo. This version with transparent background. http://commons.wikimedia.org/wiki/File:Closed_Access_logo_transparent.svg Jakob Voss, based on art designer at PLoS, modified by Wikipedia users Nina and Beao Transactions on Emer...arrow_drop_down
    image/svg+xml Jakob Voss, based on art designer at PLoS, modified by Wikipedia users Nina and Beao Closed Access logo, derived from PLoS Open Access logo. This version with transparent background. http://commons.wikimedia.org/wiki/File:Closed_Access_logo_transparent.svg Jakob Voss, based on art designer at PLoS, modified by Wikipedia users Nina and Beao
    Transactions on Emerging Telecommunications Technologies
    Article . 2021 . Peer-reviewed
    License: Wiley Online Library User Agreement
    Data sources: Crossref
    addClaim

    This Research product is the result of merged Research products in OpenAIRE.

    You have already added works in your ORCID record related to the merged Research product.
    15
    citations15
    popularityTop 10%
    influenceAverage
    impulseTop 10%
    BIP!Powered by BIP!
    more_vert
      image/svg+xml Jakob Voss, based on art designer at PLoS, modified by Wikipedia users Nina and Beao Closed Access logo, derived from PLoS Open Access logo. This version with transparent background. http://commons.wikimedia.org/wiki/File:Closed_Access_logo_transparent.svg Jakob Voss, based on art designer at PLoS, modified by Wikipedia users Nina and Beao Transactions on Emer...arrow_drop_down
      image/svg+xml Jakob Voss, based on art designer at PLoS, modified by Wikipedia users Nina and Beao Closed Access logo, derived from PLoS Open Access logo. This version with transparent background. http://commons.wikimedia.org/wiki/File:Closed_Access_logo_transparent.svg Jakob Voss, based on art designer at PLoS, modified by Wikipedia users Nina and Beao
      Transactions on Emerging Telecommunications Technologies
      Article . 2021 . Peer-reviewed
      License: Wiley Online Library User Agreement
      Data sources: Crossref
      addClaim

      This Research product is the result of merged Research products in OpenAIRE.

      You have already added works in your ORCID record related to the merged Research product.
  • image/svg+xml Jakob Voss, based on art designer at PLoS, modified by Wikipedia users Nina and Beao Closed Access logo, derived from PLoS Open Access logo. This version with transparent background. http://commons.wikimedia.org/wiki/File:Closed_Access_logo_transparent.svg Jakob Voss, based on art designer at PLoS, modified by Wikipedia users Nina and Beao
    Authors: Ankush Manocha;

    AbstractIndoor environment pollution is one of the significant concerns related to the individual's health of every category. As a majority of the population is spending their time indoors, the research on environment monitoring is realized on priority. In this research, the correlation between the indoor environment and health is determined to predict the health severity of pregnant females in real‐time. The proposed solution employs IoT‐enabled smart sensors for data acquisition. The accumulated data is processed over the fog‐cloud platform for data quantification. To classify the irregular events from the processed data, the machine learning‐assisted Weighted‐Naïve Bayes (W‐NB) classification technique is deployed on the fog layer. Furthermore, a deep learning‐inspired multilayered convolutional neural network‐long short‐term memory (M‐CNN‐LSTM) model is proposed to determine the scale of health severity. Moreover, a two‐phased alert generation mechanism is proposed to deal with the case of a medical emergency by generating notifications to the concerned medical specialists. The performance of the system is validated by performing several experimental simulations over the environmental and health datasets comprised of nearly 38 356 instances. The performance of the proposed solution is evaluated in terms of event classification, severity prediction, temporal delay efficiency, and overall performance stability. The calculated outcomes registered considerable performance over the several state‐of‐the‐art decision‐making approaches.

    image/svg+xml Jakob Voss, based on art designer at PLoS, modified by Wikipedia users Nina and Beao Closed Access logo, derived from PLoS Open Access logo. This version with transparent background. http://commons.wikimedia.org/wiki/File:Closed_Access_logo_transparent.svg Jakob Voss, based on art designer at PLoS, modified by Wikipedia users Nina and Beao Transactions on Emer...arrow_drop_down
    image/svg+xml Jakob Voss, based on art designer at PLoS, modified by Wikipedia users Nina and Beao Closed Access logo, derived from PLoS Open Access logo. This version with transparent background. http://commons.wikimedia.org/wiki/File:Closed_Access_logo_transparent.svg Jakob Voss, based on art designer at PLoS, modified by Wikipedia users Nina and Beao
    Transactions on Emerging Telecommunications Technologies
    Article . 2021 . Peer-reviewed
    License: Wiley Online Library User Agreement
    Data sources: Crossref
    addClaim

    This Research product is the result of merged Research products in OpenAIRE.

    You have already added works in your ORCID record related to the merged Research product.
    3
    citations3
    popularityTop 10%
    influenceAverage
    impulseAverage
    BIP!Powered by BIP!
    more_vert
      image/svg+xml Jakob Voss, based on art designer at PLoS, modified by Wikipedia users Nina and Beao Closed Access logo, derived from PLoS Open Access logo. This version with transparent background. http://commons.wikimedia.org/wiki/File:Closed_Access_logo_transparent.svg Jakob Voss, based on art designer at PLoS, modified by Wikipedia users Nina and Beao Transactions on Emer...arrow_drop_down
      image/svg+xml Jakob Voss, based on art designer at PLoS, modified by Wikipedia users Nina and Beao Closed Access logo, derived from PLoS Open Access logo. This version with transparent background. http://commons.wikimedia.org/wiki/File:Closed_Access_logo_transparent.svg Jakob Voss, based on art designer at PLoS, modified by Wikipedia users Nina and Beao
      Transactions on Emerging Telecommunications Technologies
      Article . 2021 . Peer-reviewed
      License: Wiley Online Library User Agreement
      Data sources: Crossref
      addClaim

      This Research product is the result of merged Research products in OpenAIRE.

      You have already added works in your ORCID record related to the merged Research product.
  • image/svg+xml Jakob Voss, based on art designer at PLoS, modified by Wikipedia users Nina and Beao Closed Access logo, derived from PLoS Open Access logo. This version with transparent background. http://commons.wikimedia.org/wiki/File:Closed_Access_logo_transparent.svg Jakob Voss, based on art designer at PLoS, modified by Wikipedia users Nina and Beao
    Authors: Meeniga Sri Raghavendra; Priyanka Chawla; Sukhpal Singh Gill;

    AbstractFog computing has become adaptable and also as a promising infrastructure for providing elastic resources at the edge of the network. Fog computing reduces the transmission latency and consumption of bandwidth while processing the incoming requests from various Internet of Things (IoT) devices. Moreover, fog computing can support and facilitate geographically distributed applications with low and predictable latency. However, this technology also has significant research issues in its current stage such as successful implementation of service location models. In this article, we propose a deadline‐aware and energy‐efficient dynamic service placement (DEEDSP) technique for fog computing that supports the placement of IoT based services. Further, hyper‐heuristic algorithm based energy‐efficient service placement technique is proposed to balance the energy‐delay trade‐off based on different service placement decision criteria (eg, minimum response time or energy consumption). The proposed algorithm is able to dynamically minimize the energy consumption of the system while ensuring that the response time satisfies a given time constraint. Finally, the proposed technique is evaluated in simulated fog computing environment and experimental results show that this technique performs better than state‐of‐the‐art placement techniques in terms of energy and latency.

    image/svg+xml Jakob Voss, based on art designer at PLoS, modified by Wikipedia users Nina and Beao Closed Access logo, derived from PLoS Open Access logo. This version with transparent background. http://commons.wikimedia.org/wiki/File:Closed_Access_logo_transparent.svg Jakob Voss, based on art designer at PLoS, modified by Wikipedia users Nina and Beao Transactions on Emer...arrow_drop_down
    image/svg+xml Jakob Voss, based on art designer at PLoS, modified by Wikipedia users Nina and Beao Closed Access logo, derived from PLoS Open Access logo. This version with transparent background. http://commons.wikimedia.org/wiki/File:Closed_Access_logo_transparent.svg Jakob Voss, based on art designer at PLoS, modified by Wikipedia users Nina and Beao
    Transactions on Emerging Telecommunications Technologies
    Article . 2021 . Peer-reviewed
    License: Wiley Online Library User Agreement
    Data sources: Crossref
    addClaim

    This Research product is the result of merged Research products in OpenAIRE.

    You have already added works in your ORCID record related to the merged Research product.
    5
    citations5
    popularityTop 10%
    influenceAverage
    impulseAverage
    BIP!Powered by BIP!
    more_vert
      image/svg+xml Jakob Voss, based on art designer at PLoS, modified by Wikipedia users Nina and Beao Closed Access logo, derived from PLoS Open Access logo. This version with transparent background. http://commons.wikimedia.org/wiki/File:Closed_Access_logo_transparent.svg Jakob Voss, based on art designer at PLoS, modified by Wikipedia users Nina and Beao Transactions on Emer...arrow_drop_down
      image/svg+xml Jakob Voss, based on art designer at PLoS, modified by Wikipedia users Nina and Beao Closed Access logo, derived from PLoS Open Access logo. This version with transparent background. http://commons.wikimedia.org/wiki/File:Closed_Access_logo_transparent.svg Jakob Voss, based on art designer at PLoS, modified by Wikipedia users Nina and Beao
      Transactions on Emerging Telecommunications Technologies
      Article . 2021 . Peer-reviewed
      License: Wiley Online Library User Agreement
      Data sources: Crossref
      addClaim

      This Research product is the result of merged Research products in OpenAIRE.

      You have already added works in your ORCID record related to the merged Research product.
  • image/svg+xml Jakob Voss, based on art designer at PLoS, modified by Wikipedia users Nina and Beao Closed Access logo, derived from PLoS Open Access logo. This version with transparent background. http://commons.wikimedia.org/wiki/File:Closed_Access_logo_transparent.svg Jakob Voss, based on art designer at PLoS, modified by Wikipedia users Nina and Beao
    Authors: Omar A. Alzubi; Jafar A. Alzubi; K. Shankar; Deepak Gupta;

    AbstractAdvancements in information technology have benefited the healthcare industry by providing it with distinct methods of managing medical data which improve the quality of medical services. The Internet of Things (IoT) and artificial intelligence are the foundations for innovative sustainable computing technologies in e‐healthcare applications. In the IoT‐enabled sustainable healthcare system, the IoT devices normally record the patient data and transfer it to the cloud for further processing. Security is considered an important issue in the design of IoT networks in the healthcare environment. To resolve this issue, this article presents a novel blockchain and artificial intelligence‐enabled secure medical data transmission (BAISMDT) for IoT networks. The goal of the BAISMDT model is to achieve security and privacy in reliable data transmission of the IoT networks. The proposed model involves a signcryption technique for secure and reliable IoT data transmission. The blockchain‐enabled secure medical data transmission process takes place among the IoT gadgets and service providers. The blockchain technique is applied to generate a viable environment to securely and reliably transmit data among different data providers. Next to the decryption process, the modified discrete particle swarm optimization algorithm with wavelet kernel extreme learning machine model is applied to determine the presence of disease. An extensive set of simulations were carried out on a benchmark medical dataset. The experimental results analysis pointed out the superior performance of the proposed BAISMDT model with the accuracy of 97.54% and 98.13% on the applied Heart Statlog and WBC dataset, respectively.

    image/svg+xml Jakob Voss, based on art designer at PLoS, modified by Wikipedia users Nina and Beao Closed Access logo, derived from PLoS Open Access logo. This version with transparent background. http://commons.wikimedia.org/wiki/File:Closed_Access_logo_transparent.svg Jakob Voss, based on art designer at PLoS, modified by Wikipedia users Nina and Beao Transactions on Emer...arrow_drop_down
    image/svg+xml Jakob Voss, based on art designer at PLoS, modified by Wikipedia users Nina and Beao Closed Access logo, derived from PLoS Open Access logo. This version with transparent background. http://commons.wikimedia.org/wiki/File:Closed_Access_logo_transparent.svg Jakob Voss, based on art designer at PLoS, modified by Wikipedia users Nina and Beao
    Transactions on Emerging Telecommunications Technologies
    Article . 2021 . Peer-reviewed
    License: Wiley Online Library User Agreement
    Data sources: Crossref
    addClaim

    This Research product is the result of merged Research products in OpenAIRE.

    You have already added works in your ORCID record related to the merged Research product.
    34
    citations34
    popularityTop 1%
    influenceTop 10%
    impulseTop 10%
    BIP!Powered by BIP!
    more_vert
      image/svg+xml Jakob Voss, based on art designer at PLoS, modified by Wikipedia users Nina and Beao Closed Access logo, derived from PLoS Open Access logo. This version with transparent background. http://commons.wikimedia.org/wiki/File:Closed_Access_logo_transparent.svg Jakob Voss, based on art designer at PLoS, modified by Wikipedia users Nina and Beao Transactions on Emer...arrow_drop_down
      image/svg+xml Jakob Voss, based on art designer at PLoS, modified by Wikipedia users Nina and Beao Closed Access logo, derived from PLoS Open Access logo. This version with transparent background. http://commons.wikimedia.org/wiki/File:Closed_Access_logo_transparent.svg Jakob Voss, based on art designer at PLoS, modified by Wikipedia users Nina and Beao
      Transactions on Emerging Telecommunications Technologies
      Article . 2021 . Peer-reviewed
      License: Wiley Online Library User Agreement
      Data sources: Crossref
      addClaim

      This Research product is the result of merged Research products in OpenAIRE.

      You have already added works in your ORCID record related to the merged Research product.
  • image/svg+xml Jakob Voss, based on art designer at PLoS, modified by Wikipedia users Nina and Beao Closed Access logo, derived from PLoS Open Access logo. This version with transparent background. http://commons.wikimedia.org/wiki/File:Closed_Access_logo_transparent.svg Jakob Voss, based on art designer at PLoS, modified by Wikipedia users Nina and Beao
    Authors: Ponsy R. K. Sathia Bhama; Chandra Priya Jayabal;

    AbstractInternet of Things (IoT) and cloud metadata have highly sensitive details and facts about data and objects; it usually holds confidential information about the data for which there are access restrictions. Hence, it forms the most abundant source of information about any digital object from which the actual data can be rebuilt or duplicated with the same level of originality. However, it appears to be an emerging threat vector in IoT and cloud environments. If a misfeasor acquires access to the metadata information, then there arises a security threat. This article proposes a novel method on a bifold layered blockchain network, referred to as MetaInfoChain, to enhance the integrity and access controllability of safe storage. By default, blockchain protects the data while a permissioned blockchain forms an access control layer over the core blockchain. The acquired instance, compute, and the unique credentials sign device metadata to enforce controllability and validated by minters and add it to the base layer of the MetaInfoChain. Subsequently, we propose a consensus attainment algorithm to build an unrefined block on a candidate block comprising metadata packages. Consequently, all the nodes receive an unrefined block replica, which can afford absolute integrity. The top layer of MetaInfoChain is sensible to generate tamper‐resistant metadata by executing hybrid PoS‐PoW tasks on the unrefined block, causing robust integrity. After accomplishing all the checks, it endorses the MetaInfoChain to append the block with 35% block time efficiency in the base layer with a 56% throughput hike.

    image/svg+xml Jakob Voss, based on art designer at PLoS, modified by Wikipedia users Nina and Beao Closed Access logo, derived from PLoS Open Access logo. This version with transparent background. http://commons.wikimedia.org/wiki/File:Closed_Access_logo_transparent.svg Jakob Voss, based on art designer at PLoS, modified by Wikipedia users Nina and Beao Transactions on Emer...arrow_drop_down
    image/svg+xml Jakob Voss, based on art designer at PLoS, modified by Wikipedia users Nina and Beao Closed Access logo, derived from PLoS Open Access logo. This version with transparent background. http://commons.wikimedia.org/wiki/File:Closed_Access_logo_transparent.svg Jakob Voss, based on art designer at PLoS, modified by Wikipedia users Nina and Beao
    Transactions on Emerging Telecommunications Technologies
    Article . 2021 . Peer-reviewed
    License: Wiley Online Library User Agreement
    Data sources: Crossref
    addClaim

    This Research product is the result of merged Research products in OpenAIRE.

    You have already added works in your ORCID record related to the merged Research product.
    6
    citations6
    popularityTop 10%
    influenceAverage
    impulseTop 10%
    BIP!Powered by BIP!
    more_vert
      image/svg+xml Jakob Voss, based on art designer at PLoS, modified by Wikipedia users Nina and Beao Closed Access logo, derived from PLoS Open Access logo. This version with transparent background. http://commons.wikimedia.org/wiki/File:Closed_Access_logo_transparent.svg Jakob Voss, based on art designer at PLoS, modified by Wikipedia users Nina and Beao Transactions on Emer...arrow_drop_down
      image/svg+xml Jakob Voss, based on art designer at PLoS, modified by Wikipedia users Nina and Beao Closed Access logo, derived from PLoS Open Access logo. This version with transparent background. http://commons.wikimedia.org/wiki/File:Closed_Access_logo_transparent.svg Jakob Voss, based on art designer at PLoS, modified by Wikipedia users Nina and Beao
      Transactions on Emerging Telecommunications Technologies
      Article . 2021 . Peer-reviewed
      License: Wiley Online Library User Agreement
      Data sources: Crossref
      addClaim

      This Research product is the result of merged Research products in OpenAIRE.

      You have already added works in your ORCID record related to the merged Research product.
  • image/svg+xml Jakob Voss, based on art designer at PLoS, modified by Wikipedia users Nina and Beao Closed Access logo, derived from PLoS Open Access logo. This version with transparent background. http://commons.wikimedia.org/wiki/File:Closed_Access_logo_transparent.svg Jakob Voss, based on art designer at PLoS, modified by Wikipedia users Nina and Beao
    Authors: Aashima Sharma; Sanmeet Kaur; Maninder Singh;

    AbstractBlockchain Technology, the fundamental technology behind Bitcoin, has drawn considerable recognition ever since its origin. Its potential has gained significant interest in various applications, varying from the music industry, financial services, Internet‐of‐Things (IoT), smart grid, edge computing, cybersecurity, and the healthcare industry. However, the information is divided amongst several intermediaries involved with adverse impacts on data quality in the healthcare domain. In the near future, blockchain technology can reshape the way the healthcare industry works by providing personalized and reliable patient data management, reforming the traditional healthcare practices, secure mechanisms for data sharing, efficient pharmaceutical supply chain management, and drug traceability and many more. In this study, an extensive literature review has been provided that includes the different prospects of using blockchain technology in healthcare. The review investigates the work done to enable the amalgamation of IoT and Blockchain in the health ecosystem. Significant blockchain‐based healthcare use cases such as data storage, data sharing, drug traceability, clinical trials, and remote patient monitoring are investigated. Further, the Internet of Things and blockchain technology‐based SWOT (Strength, Weakness, Opportunity, and Threat) analysis and the challenges linked in the healthcare domain because of the enactment of IoT and blockchain technology are discussed to support advanced studies in this domain.

    image/svg+xml Jakob Voss, based on art designer at PLoS, modified by Wikipedia users Nina and Beao Closed Access logo, derived from PLoS Open Access logo. This version with transparent background. http://commons.wikimedia.org/wiki/File:Closed_Access_logo_transparent.svg Jakob Voss, based on art designer at PLoS, modified by Wikipedia users Nina and Beao Transactions on Emer...arrow_drop_down
    image/svg+xml Jakob Voss, based on art designer at PLoS, modified by Wikipedia users Nina and Beao Closed Access logo, derived from PLoS Open Access logo. This version with transparent background. http://commons.wikimedia.org/wiki/File:Closed_Access_logo_transparent.svg Jakob Voss, based on art designer at PLoS, modified by Wikipedia users Nina and Beao
    Transactions on Emerging Telecommunications Technologies
    Article . 2021 . Peer-reviewed
    License: Wiley Online Library User Agreement
    Data sources: Crossref
    addClaim

    This Research product is the result of merged Research products in OpenAIRE.

    You have already added works in your ORCID record related to the merged Research product.
    36
    citations36
    popularityTop 1%
    influenceTop 10%
    impulseTop 1%
    BIP!Powered by BIP!
    more_vert
      image/svg+xml Jakob Voss, based on art designer at PLoS, modified by Wikipedia users Nina and Beao Closed Access logo, derived from PLoS Open Access logo. This version with transparent background. http://commons.wikimedia.org/wiki/File:Closed_Access_logo_transparent.svg Jakob Voss, based on art designer at PLoS, modified by Wikipedia users Nina and Beao Transactions on Emer...arrow_drop_down
      image/svg+xml Jakob Voss, based on art designer at PLoS, modified by Wikipedia users Nina and Beao Closed Access logo, derived from PLoS Open Access logo. This version with transparent background. http://commons.wikimedia.org/wiki/File:Closed_Access_logo_transparent.svg Jakob Voss, based on art designer at PLoS, modified by Wikipedia users Nina and Beao
      Transactions on Emerging Telecommunications Technologies
      Article . 2021 . Peer-reviewed
      License: Wiley Online Library User Agreement
      Data sources: Crossref
      addClaim

      This Research product is the result of merged Research products in OpenAIRE.

      You have already added works in your ORCID record related to the merged Research product.
  • image/svg+xml Jakob Voss, based on art designer at PLoS, modified by Wikipedia users Nina and Beao Closed Access logo, derived from PLoS Open Access logo. This version with transparent background. http://commons.wikimedia.org/wiki/File:Closed_Access_logo_transparent.svg Jakob Voss, based on art designer at PLoS, modified by Wikipedia users Nina and Beao
    Authors: Ritu Nigam; Deepak Kumar Sharma; Satbir Jain; Kartik Krishna Bhardwaj; +1 Authors

    AbstractThe emergence of the new applications in the realm of Opportunistic IoT networks brings exceptional levels of complexity with it; hence, Artificial Intelligence‐based approaches are envisioned for the design and optimization owing to the versatility and adaptability it assists in resolving complex real‐time problems. In these networks, messages are transmitted through node cooperation because of the nodes' random movement and a lack of network infrastructure. As it is an open network, message forwarding is susceptible to intervention from anomalous nodes that may attribute maliciousness or selfishness, which may cause network transmission disorder and makes routing complex in Social Opportunistic IoT networks. By leveraging AI's capability, these networks can be redesigned to enable a more secure and efficient routing for the nodes. In order to suppress various harmful impacts in the network from anomalous nodes, this paper proposes an AI‐Enabled Trust‐Based Routing Protocol using NSGA‐II for Social Opportunistic IoT Networks (TBRP), which uses the concept of multi‐objective optimization. TBRP employs a new Four Tier Protocol trust scheme based on contextual parameters. This AI‐enabled multi‐objective optimization scheme modifies the conventional NSGA‐II for amelioration through an intelligent chromosome representation, improved crossover, and mutation paradigm. TBRP is evaluated against several routing protocols and with trust‐based protocols TCAFE and MT‐SMRP on various performance metrics using the INFOCOMM dataset. TBRP outperforms Firefly PRoPHET, AntRouter, GAER, and PRoPHET by 1.66%, 10.66%, 25.44%, and 58.57%, respectively, in terms of the delivery success ratio while varying the time for which simulation is run.

    image/svg+xml Jakob Voss, based on art designer at PLoS, modified by Wikipedia users Nina and Beao Closed Access logo, derived from PLoS Open Access logo. This version with transparent background. http://commons.wikimedia.org/wiki/File:Closed_Access_logo_transparent.svg Jakob Voss, based on art designer at PLoS, modified by Wikipedia users Nina and Beao Transactions on Emer...arrow_drop_down
    image/svg+xml Jakob Voss, based on art designer at PLoS, modified by Wikipedia users Nina and Beao Closed Access logo, derived from PLoS Open Access logo. This version with transparent background. http://commons.wikimedia.org/wiki/File:Closed_Access_logo_transparent.svg Jakob Voss, based on art designer at PLoS, modified by Wikipedia users Nina and Beao
    Transactions on Emerging Telecommunications Technologies
    Article . 2021 . Peer-reviewed
    License: Wiley Online Library User Agreement
    Data sources: Crossref
    addClaim

    This Research product is the result of merged Research products in OpenAIRE.

    You have already added works in your ORCID record related to the merged Research product.
    3
    citations3
    popularityTop 10%
    influenceAverage
    impulseAverage
    BIP!Powered by BIP!
    more_vert
      image/svg+xml Jakob Voss, based on art designer at PLoS, modified by Wikipedia users Nina and Beao Closed Access logo, derived from PLoS Open Access logo. This version with transparent background. http://commons.wikimedia.org/wiki/File:Closed_Access_logo_transparent.svg Jakob Voss, based on art designer at PLoS, modified by Wikipedia users Nina and Beao Transactions on Emer...arrow_drop_down
      image/svg+xml Jakob Voss, based on art designer at PLoS, modified by Wikipedia users Nina and Beao Closed Access logo, derived from PLoS Open Access logo. This version with transparent background. http://commons.wikimedia.org/wiki/File:Closed_Access_logo_transparent.svg Jakob Voss, based on art designer at PLoS, modified by Wikipedia users Nina and Beao
      Transactions on Emerging Telecommunications Technologies
      Article . 2021 . Peer-reviewed
      License: Wiley Online Library User Agreement
      Data sources: Crossref
      addClaim

      This Research product is the result of merged Research products in OpenAIRE.

      You have already added works in your ORCID record related to the merged Research product.
  • image/svg+xml art designer at PLoS, modified by Wikipedia users Nina, Beao, JakobVoss, and AnonMoos Open Access logo, converted into svg, designed by PLoS. This version with transparent background. http://commons.wikimedia.org/wiki/File:Open_Access_logo_PLoS_white.svg art designer at PLoS, modified by Wikipedia users Nina, Beao, JakobVoss, and AnonMoos http://www.plos.org/
    Authors: Ashutosh Dhar Dwivedi; Rajani Singh; Keshav Kaushik; Raghava Rao Mukkamala; +1 Authors

    AbstractInternet of Things (IoT) has revolutionized the digital world by connecting billions of electronic devices over the internet. IoT devices play an essential role in the modern era when conventional devices become more autonomous and smart. On the one hand, high‐speed data transfer is a major issue where the 5G‐enabled environment plays an important role. On the other hand, these IoT devices transfer the data by using protocols based on centralized architecture and may cause several security issues for the data. Merging artificial intelligence to 5G wireless systems solves several issues such as autonomous robots, self‐driving vehicles, virtual reality, and engender security problems. Building trust among the network users without trusting third party authorities is the system's primary concern. Blockchain emerged as a key technology based on a distributed ledger to maintain the network's event logs. Blockchain provides a secure, decentralized, and trustless environment for IoT devices. However, integrating IoT and blockchain also has several challenges; for example, major challenge is low throughput. Currently, the ethereum blockchain network can process approximately 12 to 15 transactions per second, while IoT devices require relatively higher throughput. Therefore, blockchains are incapable of providing functionality for a 5G‐enabled IoT based network. The limiting factor of throughput in the blockchain is their network. The slow propagation of transactions and blocks in the P2P network does not allow miners and verifiers to fastly mine and verify new blocks, respectively. Therefore, network scalability is the major issue of IoT based blockchains. In this work, we solved the network scalability issue using blockchain distributed network while to increase the throughput of blockchain, this article uses the Raft consensus algorithm. Another most important issue with IoT networks is privacy. Unfortunately, the blockchain distributed ledgers are public and sensitive information is available on the network for everyone are private, but in such cases, third party editing is not possible without revealing the original contents. To solve privacy issues, we used zkLedger as a solution that is based on zero knowledge‐based cryptography.

    image/svg+xml art designer at PLoS, modified by Wikipedia users Nina, Beao, JakobVoss, and AnonMoos Open Access logo, converted into svg, designed by PLoS. This version with transparent background. http://commons.wikimedia.org/wiki/File:Open_Access_logo_PLoS_white.svg art designer at PLoS, modified by Wikipedia users Nina, Beao, JakobVoss, and AnonMoos http://www.plos.org/ European Transaction...arrow_drop_down
    image/svg+xml art designer at PLoS, modified by Wikipedia users Nina, Beao, JakobVoss, and AnonMoos Open Access logo, converted into svg, designed by PLoS. This version with transparent background. http://commons.wikimedia.org/wiki/File:Open_Access_logo_PLoS_white.svg art designer at PLoS, modified by Wikipedia users Nina, Beao, JakobVoss, and AnonMoos http://www.plos.org/
    image/svg+xml Jakob Voss, based on art designer at PLoS, modified by Wikipedia users Nina and Beao Closed Access logo, derived from PLoS Open Access logo. This version with transparent background. http://commons.wikimedia.org/wiki/File:Closed_Access_logo_transparent.svg Jakob Voss, based on art designer at PLoS, modified by Wikipedia users Nina and Beao
    Transactions on Emerging Telecommunications Technologies
    Article . 2021 . Peer-reviewed
    License: Wiley Online Library User Agreement
    Data sources: Crossref
    addClaim

    This Research product is the result of merged Research products in OpenAIRE.

    You have already added works in your ORCID record related to the merged Research product.
    46
    citations46
    popularityTop 1%
    influenceTop 10%
    impulseTop 1%
    BIP!Powered by BIP!
    more_vert
      image/svg+xml art designer at PLoS, modified by Wikipedia users Nina, Beao, JakobVoss, and AnonMoos Open Access logo, converted into svg, designed by PLoS. This version with transparent background. http://commons.wikimedia.org/wiki/File:Open_Access_logo_PLoS_white.svg art designer at PLoS, modified by Wikipedia users Nina, Beao, JakobVoss, and AnonMoos http://www.plos.org/ European Transaction...arrow_drop_down
      image/svg+xml art designer at PLoS, modified by Wikipedia users Nina, Beao, JakobVoss, and AnonMoos Open Access logo, converted into svg, designed by PLoS. This version with transparent background. http://commons.wikimedia.org/wiki/File:Open_Access_logo_PLoS_white.svg art designer at PLoS, modified by Wikipedia users Nina, Beao, JakobVoss, and AnonMoos http://www.plos.org/
      image/svg+xml Jakob Voss, based on art designer at PLoS, modified by Wikipedia users Nina and Beao Closed Access logo, derived from PLoS Open Access logo. This version with transparent background. http://commons.wikimedia.org/wiki/File:Closed_Access_logo_transparent.svg Jakob Voss, based on art designer at PLoS, modified by Wikipedia users Nina and Beao
      Transactions on Emerging Telecommunications Technologies
      Article . 2021 . Peer-reviewed
      License: Wiley Online Library User Agreement
      Data sources: Crossref
      addClaim

      This Research product is the result of merged Research products in OpenAIRE.

      You have already added works in your ORCID record related to the merged Research product.
  • image/svg+xml Jakob Voss, based on art designer at PLoS, modified by Wikipedia users Nina and Beao Closed Access logo, derived from PLoS Open Access logo. This version with transparent background. http://commons.wikimedia.org/wiki/File:Closed_Access_logo_transparent.svg Jakob Voss, based on art designer at PLoS, modified by Wikipedia users Nina and Beao
    Authors: Manjunath G. Asuti; Prabhugoud I. Basarkod;

    AbstractInternet of Things (IoT) enabled technology in the current applications such as smart grids, smart cities, and smart health sectors utilize wireless sensor networks (WSN) to establish stable and reliable communication between the nodes. Moreover, the primary requirement of WSN in IoT applications is to provide low‐rate data communication. The IEEE 802.15.4e standard‐based medium access control (MAC) protocol is found suitable for low‐rate data communication in WSN. The IEEE 802.15.4e standard adopts a deterministic and synchronous multichannel extension (DSME) MAC protocol which employs a multisuperframe structure with multichannel data transmission during the contention free period. However, the guaranteed time slot (GTS) allocation process in DSME employed by the standard may not be suitable for an adaptive traffic network scenario that has a direct impact on the throughput and bandwidth utilization. In this article, we develop a priority and range‐based DSME‐GTS allocation algorithm based on the priorities of end nodes and range estimation. Furthermore, the proposed algorithm is developed for the two types of network scenarios encountered in a star topology‐enabled WSN. In scenario‐1, the slots allocation process is carried out based on the priorities of end nodes. Next, in scenario‐2, the slots allocation process is carried out based on the range estimation of end nodes. Detailed mathematical modeling of the proposed methodology is provided for the various performance metrics. The model is validated using the MATLAB 2017a programming tool. Simulation results show that the proposed methodology outperforms the existing DSME‐GTS approaches in terms of performance metrics such as packet delivery ratio, end‐to‐end delay, packet loss ratio, throughput, delay, bandwidth utilization, and the energy consumption.

    image/svg+xml Jakob Voss, based on art designer at PLoS, modified by Wikipedia users Nina and Beao Closed Access logo, derived from PLoS Open Access logo. This version with transparent background. http://commons.wikimedia.org/wiki/File:Closed_Access_logo_transparent.svg Jakob Voss, based on art designer at PLoS, modified by Wikipedia users Nina and Beao Transactions on Emer...arrow_drop_down
    image/svg+xml Jakob Voss, based on art designer at PLoS, modified by Wikipedia users Nina and Beao Closed Access logo, derived from PLoS Open Access logo. This version with transparent background. http://commons.wikimedia.org/wiki/File:Closed_Access_logo_transparent.svg Jakob Voss, based on art designer at PLoS, modified by Wikipedia users Nina and Beao
    Transactions on Emerging Telecommunications Technologies
    Article . 2021 . Peer-reviewed
    License: Wiley Online Library User Agreement
    Data sources: Crossref
    addClaim

    This Research product is the result of merged Research products in OpenAIRE.

    You have already added works in your ORCID record related to the merged Research product.
    3
    citations3
    popularityTop 10%
    influenceAverage
    impulseAverage
    BIP!Powered by BIP!
    more_vert
      image/svg+xml Jakob Voss, based on art designer at PLoS, modified by Wikipedia users Nina and Beao Closed Access logo, derived from PLoS Open Access logo. This version with transparent background. http://commons.wikimedia.org/wiki/File:Closed_Access_logo_transparent.svg Jakob Voss, based on art designer at PLoS, modified by Wikipedia users Nina and Beao Transactions on Emer...arrow_drop_down
      image/svg+xml Jakob Voss, based on art designer at PLoS, modified by Wikipedia users Nina and Beao Closed Access logo, derived from PLoS Open Access logo. This version with transparent background. http://commons.wikimedia.org/wiki/File:Closed_Access_logo_transparent.svg Jakob Voss, based on art designer at PLoS, modified by Wikipedia users Nina and Beao
      Transactions on Emerging Telecommunications Technologies
      Article . 2021 . Peer-reviewed
      License: Wiley Online Library User Agreement
      Data sources: Crossref
      addClaim

      This Research product is the result of merged Research products in OpenAIRE.

      You have already added works in your ORCID record related to the merged Research product.
  • image/svg+xml Jakob Voss, based on art designer at PLoS, modified by Wikipedia users Nina and Beao Closed Access logo, derived from PLoS Open Access logo. This version with transparent background. http://commons.wikimedia.org/wiki/File:Closed_Access_logo_transparent.svg Jakob Voss, based on art designer at PLoS, modified by Wikipedia users Nina and Beao
    Authors: Arpita Bhargava; Shekhar Verma;

    AbstractThe potential benefits of edge‐centric Internet of Things (IoT) come with increased security threats and because the edge devices may be compromised into sending or forwarding wrong information. To negate the effect of wrong information on inference, such messages need to be identified. Identification and dropping of messages in the network as early as possible would minimize the communication overhead. Trust values of nodes help in the early identification of such messages. In this work, the Dempster Shafer Theory (DST)‐based edge‐centric IoT‐specific Trust Model (DEIT) is designed to compute trust to include the specific characteristics of IoT. Edge servers use DEIT to compute trust value of edge devices in the network. In DEIT, DST combines the available trust messages. DIET also uses the degradation variable, credibility variable, punishment variable, re‐compensating variable, and pardoning variable to compute final trust value. The computed trust value assists the edges in taking correct decisions. Simulation results demonstrate that it can immediately capture two major types of misbehavior, namely, information drop and modification under both sparse and dense traffic conditions. Through scenarios in the results section, the depiction of various possible misbehaviors has been discussed. Scenario 1 and 2 discuss a situation where a malicious edge device misbehaves in two ways, namely, dropping and modification of information, respectively. In scenario 3 and 4, situations are discussed when the trust opinion of the trusted and distrusted devices are neutralized with time using the degradation factor to illustrate and compare changes in trust values in two different situation.

    image/svg+xml Jakob Voss, based on art designer at PLoS, modified by Wikipedia users Nina and Beao Closed Access logo, derived from PLoS Open Access logo. This version with transparent background. http://commons.wikimedia.org/wiki/File:Closed_Access_logo_transparent.svg Jakob Voss, based on art designer at PLoS, modified by Wikipedia users Nina and Beao Transactions on Emer...arrow_drop_down
    image/svg+xml Jakob Voss, based on art designer at PLoS, modified by Wikipedia users Nina and Beao Closed Access logo, derived from PLoS Open Access logo. This version with transparent background. http://commons.wikimedia.org/wiki/File:Closed_Access_logo_transparent.svg Jakob Voss, based on art designer at PLoS, modified by Wikipedia users Nina and Beao
    Transactions on Emerging Telecommunications Technologies
    Article . 2021 . Peer-reviewed
    License: Wiley Online Library User Agreement
    Data sources: Crossref
    addClaim

    This Research product is the result of merged Research products in OpenAIRE.

    You have already added works in your ORCID record related to the merged Research product.
    6
    citations6
    popularityTop 10%
    influenceAverage
    impulseTop 10%
    BIP!Powered by BIP!
    more_vert
      image/svg+xml Jakob Voss, based on art designer at PLoS, modified by Wikipedia users Nina and Beao Closed Access logo, derived from PLoS Open Access logo. This version with transparent background. http://commons.wikimedia.org/wiki/File:Closed_Access_logo_transparent.svg Jakob Voss, based on art designer at PLoS, modified by Wikipedia users Nina and Beao Transactions on Emer...arrow_drop_down
      image/svg+xml Jakob Voss, based on art designer at PLoS, modified by Wikipedia users Nina and Beao Closed Access logo, derived from PLoS Open Access logo. This version with transparent background. http://commons.wikimedia.org/wiki/File:Closed_Access_logo_transparent.svg Jakob Voss, based on art designer at PLoS, modified by Wikipedia users Nina and Beao
      Transactions on Emerging Telecommunications Technologies
      Article . 2021 . Peer-reviewed
      License: Wiley Online Library User Agreement
      Data sources: Crossref
      addClaim

      This Research product is the result of merged Research products in OpenAIRE.

      You have already added works in your ORCID record related to the merged Research product.