Special Issue " Intelligent Communication Systems: Smart Wireless Digital Devices and IoT"

Submission Deadline: 20 December 2020 (closed)
Guest Editors
Dr. Karan Signh, Jawaharlal Nehru University, India.
Dr. DJamshid Sultanov, Tashkent University of Information Technologies named after Muhammad al-Khwarizmi, Uzbekistan.
Dr. Khujamatov Khalim, Tashkent University of Information Technologies named after Muhammad al-Khwarizmi, Uzbekistan.
Dr. ALI AHMADIAN, Institute of Industry Revolution 4.0, The National University of Malaysia, Malaysia.
Dr. BRUNO A. PANSERA, DiGiES & Decisions Lab, Mediterranea University of Reggio Calabria, Italy.
Dr. Anura P. Jayasumana, Colorado State University, USA.

Summary

Nowadays, IoT devices play a vital role in intelligent communication in physical areas. However, IoT with an opportunistic network can create a very dynamic and smart communicating environment. Recently, several intelligent devices are equipped with the feature of intermittent connectivity. Whenever another smart device equipped with the same features comes in proximity, it forms an opportunistic communication environment. Opportunistic networking is a promising paradigm since frivolous networking systems are unable to exchange information in certain environments. The opportunistic network is created using the concept of ICN, NDN, and CCN to resolve the limitations of trivial networks. An opportunistic network is a challenged network with highly variable or extreme link performance and an unstable routing path from source to destination. Thus, for efficient communication in an opportunistic network, the intermediate nodes may take supervision of data during the blackout and forward it when the connectivity resumes. As an opportunistic network is totally based on opportunity, whenever any information needs to be exchanged, it searches for the nearby devices for data sharing. The key problem is the availability of resource constraint devices during data exchanging/transferring. Here, we come across a challenge of the data rate due to short connection time. Many routing protocols have been introduced to overcome these challenges like 6LOWPAN, RPL, and COAP. Another significant issue is trustworthiness assessment and data integrity since the wireless devices have lots of intermediate nodes for the exchange of information. These intermediate nodes work as relay nodes during data transfer. However, these intermediate nodes may be compromised by malicious nodes to destroy the network's credibility. The malicious nodes perform various attacks on data to reduce the network's lifespan and have a significant impact on streaming applications. The trust assessment scheme and zero-watermarking schemes were introduced to deal with these attacks and ensure data's trustworthiness. Despite all these challenges, the trend is emerging, and investments are made to profit even at higher risk. This emerging networking using wireless digital devices and IoT can be deployed in disaster-hit areas to depict the situation and alleviate grievances. Similar utilization can be found in traffic sensors, cross-border regions, and smart city informatics. Post-Office operations and many more are also making use of opportunistic networking using wireless digital devices and IoT.


Keywords
• Internet of Things (IoT)
• Disruption\Delay Tolerant Networks (DTN)
• Opportunistic Network
• Future Networks Inspired by Opportunistic Network
• Routing Protocols
• Mobility Models
• Mobile Ubiquitous LAN Extension (MULEs)
• SWIM (Shared Wireless Info-station Model)
• Pocket Switched Network
• Network Emulation Testbed for Opportunistic Networks
• QoS of Opportunistic Networks
• Mobile Social Networking
• MANET
• VANET
• FANET
• Sensor Network
• Mobile Agent
• Mobile Data Offloading
• Security, Privacy and Trust
• Anonymity
• IoT Security using Blockchain Technology

Published Papers
  • Analytical Comparison of Resource Search Algorithms in Non-DHT Mobile Peer-to-Peer Networks
  • Abstract One of the key challenges in ad-hoc networks is the resource discovery problem. How efficiently & quickly the queried resource/object can be resolved in such a highly dynamic self-evolving network is the underlying question? Broadcasting is a basic technique in the Mobile Ad-hoc Networks (MANETs), and it refers to sending a packet from one node to every other node within the transmission range. Flooding is a type of broadcast where the received packet is retransmitted once by every node. The naive flooding technique floods the network with query messages, while the random walk scheme operates by contacting subsets of each… More
  •   Views:213       Downloads:157        Download PDF

  • Energy Efficient Ambience Awake Routing with OpenFlow Approach
  • Abstract A major problem in networking has always been energy consumption. Battery life is one parameter which could help improve Energy Efficiency. Existing research on wireless networking stresses on reducing signaling messages or time required for data transfer for addressing energy consumption issues. Routing or Forwarding packets in a network between the network elements like routers, switches, wireless access points, etc., is complex in conventional networks. With the advent of Software Defined Networking (SDN) for 5G network architectures, the distributed networking has embarked onto centralized networking, wherein the SDN Controller is responsible for decision making. The controller pushes its decision onto… More
  •   Views:274       Downloads:209        Download PDF

  • Performance Analysis of DEBT Routing Protocols for Pocket Switch Networks
  • Abstract Pocket Switched Networks (PSN) represent a particular remittent network for direct communication between the handheld mobile devices. Compared to traditional networks, there is no stable topology structure for PSN where the nodes observe the mobility model of human society. It is a kind of Delay Tolerant Networks (DTNs) that gives a description to circulate information among the network nodes by the way of taking the benefit of transferring nodes from one area to another. Considering its inception, there are several schemes for message routing in the infrastructure-less environment in which human mobility is only the best manner to exchange information.… More
  •   Views:441       Downloads:266        Download PDF