[go: up one dir, main page]
More Web Proxy on the site http://driver.im/
Next Issue
Volume 4, December
Previous Issue
Volume 4, June
You seem to have javascript disabled. Please note that many of the page functionalities won't work as expected without javascript enabled.
 
 

Network, Volume 4, Issue 3 (September 2024) – 8 articles

Cover Story (view full-size image): Our paper considers the use of polar codes as network codes in a multi-way selective detect-and-forward cooperative relaying system. We demonstrate that systematic polar codes are suitable for such applications. The encoding and decoding complexity of such systems for linear block codes is analyzed with maximum likelihood decoding, for LDPC codes with log-BP decoding, and polar codes with successive cancellation, as well as successive cancellation list decoding. Simulation results show that the error performance of such a system employing polar codes is comparable to LDPC codes with log-BP decoding, while the decoding complexity is much lower. Furthermore, we consider a hard threshold technique at user terminals for determining whether a relay transmits or not, making the system practical without increasing complexity. View this paper
  • Issues are regarded as officially published after their release is announced to the table of contents alert mailing list.
  • You may sign up for e-mail alerts to receive table of contents of newly released issues.
  • PDF is the official format for papers published in both, html and pdf forms. To view the papers in pdf format, click on the "PDF Full-text" link, and use the free Adobe Reader to open them.
Order results
Result details
Select all
Export citation of selected articles as:
1 pages, 138 KiB  
Correction
Correction: Zhu et al. Energy Efficient Access Point Placement for Distributed Massive MIMO. Network 2022, 2, 288–310
by Yi-Hang Zhu, Gilles Callebaut, Hatice Çalık, Liesbet Van der Perre and François Rottenberg
Network 2024, 4(3), 404; https://doi.org/10.3390/network4030019 - 11 Sep 2024
Viewed by 415
Abstract
Following publication, concerns were raised regarding the peer-review process related to the publication of this article [...] Full article
14 pages, 1355 KiB  
Article
Efficient Collaborative Edge Computing for Vehicular Network Using Clustering Service
by Ali Al-Allawee, Pascal Lorenz and Alhamza Munther
Network 2024, 4(3), 390-403; https://doi.org/10.3390/network4030018 - 6 Sep 2024
Viewed by 1177
Abstract
Internet of Vehicles applications are known to be critical and time-sensitive. The value proposition of edge computing comprises its lower latency, advantageous bandwidth consumption, privacy, management, efficiency of treatments, and mobility, which aim to improve vehicular and traffic services. Successful stories have been [...] Read more.
Internet of Vehicles applications are known to be critical and time-sensitive. The value proposition of edge computing comprises its lower latency, advantageous bandwidth consumption, privacy, management, efficiency of treatments, and mobility, which aim to improve vehicular and traffic services. Successful stories have been observed between IoV and edge computing to support smooth mobility and the use of local resources. However, vehicle travel, especially due to high-speed movement and intersections, can result in IoV devices losing connection and/or processing with high latency. This paper proposes a Cluster Collaboration Vehicular Edge Computing (CCVEC) framework that aims to guarantee and enhance the connectivity between vehicle sensors and the cloud by utilizing the edge computing paradigm in the middle. The objectives are achieved by utilizing the cluster management strategies deployed between cloud and edge computing servers. The framework is implemented in OpenStack cloud servers and evaluated by measuring the throughput, latency, and memory parameters in two different scenarios. The results obtained show promising indications in terms of latency (approximately 390 ms of the ideal status) and throughput (30 kB/s) values, and thus appears acceptable in terms of performance as well as memory. Full article
(This article belongs to the Special Issue Convergence of Edge Computing and Next Generation Networking)
Show Figures

Figure 1

Figure 1
<p>Edge vs. cloud server.</p>
Full article ">Figure 2
<p>Architecture of vehicular edge computing.</p>
Full article ">Figure 3
<p>CCVEC framework components.</p>
Full article ">Figure 4
<p>Passing messages.</p>
Full article ">Figure 5
<p>Testing scenario: (<b>a</b>) VM to VM with the same network; (<b>b</b>) VM to VM with a different network.</p>
Full article ">Figure 6
<p>Round trip time in ms (latency) for scenario 1.</p>
Full article ">Figure 7
<p>Throughput (kB/s) in scenario 1.</p>
Full article ">Figure 8
<p>Memory usage (%) in scenario 1.</p>
Full article ">Figure 9
<p>Round trip time in ms (latency) for scenario 2.</p>
Full article ">Figure 10
<p>Throughput (kB/s) in scenario 2.</p>
Full article ">Figure 11
<p>Memory usage (%) in scenario 2.</p>
Full article ">
23 pages, 1762 KiB  
Article
Dynamic Framing and Power Allocation for Real-Time Wireless Networks with Variable-Length Coding: A Tandem Queue Approach
by Yuanrui Liu, Xiaoyu Zhao, Wei Chen and Ying-Jun Angela Zhang
Network 2024, 4(3), 367-389; https://doi.org/10.3390/network4030017 - 27 Aug 2024
Viewed by 695
Abstract
Ensuring high reliability and low latency poses challenges for numerous applications that require rigid performance guarantees, such as industrial automation and autonomous vehicles. Our research primarily concentrates on addressing the real-time requirements of ultra-reliable low-latency communication (URLLC). Specifically, we tackle the challenge of [...] Read more.
Ensuring high reliability and low latency poses challenges for numerous applications that require rigid performance guarantees, such as industrial automation and autonomous vehicles. Our research primarily concentrates on addressing the real-time requirements of ultra-reliable low-latency communication (URLLC). Specifically, we tackle the challenge of hard delay constraints in real-time transmission systems, overcoming this obstacle through a finite blocklength coding scheme. In the physical layer, we encode randomly arriving packets using a variable-length coding scheme and transmit the encoded symbols by truncated channel inversion over parallel channels. In the network layer, we model the encoding and transmission processes as tandem queues. These queues backlog the data bits waiting to be encoded and the encoded symbols to be transmitted, respectively. This way, we represent the system as a two-dimensional Markov chain. By focusing on instances when the symbol queue is empty, we simplify the Markov chain into a one-dimensional Markov chain, with the packet queue being the system state. This approach allows us to analytically express power consumption and formulate a power minimization problem under hard delay constraints. Finally, we propose a heuristic algorithm to solve the problem and provide an extensive evaluation of the trade-offs between the hard delay constraint and power consumption. Full article
Show Figures

Figure 1

Figure 1
<p>Research flow chart.</p>
Full article ">Figure 2
<p>System model.</p>
Full article ">Figure 3
<p>Transition diagram of <math display="inline"><semantics> <mrow> <mo>(</mo> <msub> <mi>q</mi> <mn>1</mn> </msub> <mrow> <mo>[</mo> <mi>t</mi> <mo>]</mo> </mrow> <mo>,</mo> <msub> <mi>q</mi> <mn>2</mn> </msub> <mrow> <mo>[</mo> <mi>t</mi> <mo>]</mo> </mrow> <mo>)</mo> <mo>=</mo> <mrow> <mo>(</mo> <mi>K</mi> <mo>,</mo> <mn>0</mn> <mo>)</mo> </mrow> </mrow> </semantics></math>. The other queue states are similar to the transition diagram. The diagram also depicts the evolution of the system state over time slots. In the embedded Markov chain, we focus exclusively on the time slots indicated by the red arrows.</p>
Full article ">Figure 4
<p>The average power of the hard-delay-constrained policy, which changes with the hard delay constraint.</p>
Full article ">Figure 5
<p>The transmission power changes with the threshold of truncated inversion.</p>
Full article ">Figure 6
<p>A comparison between the first heuristic algorithm and the second heuristic algorithm.</p>
Full article ">Figure 7
<p>The numerical result of the gradient descent policy, which changes with the iteration number.</p>
Full article ">Figure 8
<p>A comparison of the CSIT and CSIR schemes.</p>
Full article ">
29 pages, 4717 KiB  
Article
Securing IPv6 Neighbor Discovery Address Resolution with Voucher-Based Addressing
by Zachary T. Puhl and Jinhua Guo
Network 2024, 4(3), 338-366; https://doi.org/10.3390/network4030016 - 14 Aug 2024
Viewed by 1162
Abstract
The majority of local IPv6 networks continue to remain insecure and vulnerable to neighbor spoofing attacks. The Secure Neighbor Discovery (SEND) standard and its concomitant Cryptographically Generated Addressing (CGA) scheme were accepted by large standard bodies to codify practical mitigations. SEND and CGA [...] Read more.
The majority of local IPv6 networks continue to remain insecure and vulnerable to neighbor spoofing attacks. The Secure Neighbor Discovery (SEND) standard and its concomitant Cryptographically Generated Addressing (CGA) scheme were accepted by large standard bodies to codify practical mitigations. SEND and CGA have never seen widespread adoption due to their complexities, obscurity, costs, compatibility issues, and continued lack of mature implementations. In light of their poor adoption, research since their standardization has continued to find new perspectives and proffer new ideas. The orthodox solutions for securing Neighbor Discovery have historically struggled to successfully harmonize three core ideals: simplicity, flexibility, and privacy preservation. This research introduces Voucher-Based Addressing, a low-configuration, low-cost, and high-impact alternative to IPv6 address generation methods. It secures the Neighbor Discovery address resolution process while remaining simple, highly adaptable, indistinguishable, and privacy-focused. Applying a unique concoction of cryptographic key derivation functions, link-layer address binding, and neighbor consensus on the parameters of address generation, the resolved address bindings are verifiable without the need for complex techniques that have hindered the adoption of canonical specifications. Full article
Show Figures

Figure 1

Figure 1
<p>A classic Neighbor Discovery neighbor spoofing (traffic redirection; on-path) attack. Each arrow is colored to indicate its associated step in the process; an upward arrow indicates transmission of a message, and a downward arrow indicates receipt of a message. After the normative address resolution process is completed in steps 1 and 2, the listening malicious Node C sends a spoofed Neighbor Advertisement in step 3 to override the link-layer address value in Node A’s Neighbor Cache. Node A now unknowingly harbors a “poisoned” cache entry.</p>
Full article ">Figure 2
<p>A more subversive, “eager” approach to preemptively poisoning a target’s Neighbor Cache without requiring any prior interaction. Each arrow is colored to indicate its associated step in the process; an upward arrow indicates transmission of a message, and a downward arrow indicates receipt of a message. Nodes receiving SLLAO stubs on certain NDP messages are dictated by the protocol specification to accept them as-is for the sake of protocol optimization. This optimization is performed so that NS receivers can respond with unicast messages to the sending link-layer address without needing reverse address resolution and without a multicast response.</p>
Full article ">Figure 3
<p>The overall structure of a Voucher-Based Address.</p>
Full article ">Figure 4
<p>The Voucher-Based Address generation procedure is used via SLAAC to generate all the initial interface addresses from the interface on Host A. Router X is a Voucher Bearer authorized by local administrative policy to delegate Link Voucher information to its neighbors.</p>
Full article ">Figure 5
<p>The VBA verification procedure. The generation process is repeated at the verifier using various values known about the neighbor and the current voucher parameters. In step 1, the verifier (Node A) requests binding details from the advertiser (Node B), to which the advertiser responds with its reported VBA in step 2. In step 3, the verifier begins independently reconstructing the VBA to ensure the same IP address is created from all known inputs. In step 4, a simple equivalency check occurs, whose truthfulness determines whether the verifier should cache and accept traffic from the advertiser.</p>
Full article ">Figure 6
<p>Another comprehensive depiction of VBA verification is given. The steps are equal to <a href="#network-04-00016-f005" class="html-fig">Figure 5</a>, except step 5 considers the equivalence check its own process. As shown, VBA processes do not modify the typical Neighbor Discovery process or exchange. Instead, software local to each interface, if equipped, will act to verify the received IP addresses during NDAR transactions based on the interface’s selected Enforcement Mode.</p>
Full article ">Figure 7
<p>The binary structure and fields of the Link Voucher NDP option. This is only considered valid by receivers when attached to Router Advertisement and Redirect messages.</p>
Full article ">Figure 8
<p>The adjacent DER structure definitions for encoding the ECDSA PublicKey and Signature values in a Link Voucher option. This is not representative of program code; it is a familiar similitude of the declarative data structure notation used by the ITU for DER objects.</p>
Full article ">Figure 9
<p>The basic binary structure of a TLV field that is used in the Algorithm Type field of a Link Voucher option. The type and length fields are a maximum width of 16 bits. The angle brackets to the sides of the Value field indicate a variable length field.</p>
Full article ">Figure 10
<p>The three default key derivation functions are employed and benchmarked in VBA generation procedures with their minimum possible baseline difficulty settings. Each increase in the iteration count for each KDF expectedly shows mostly linear increases in the address generation times. All the outliers and deviations from the observable linear pattern are due to the spurious slowness of the local processor on which these tests were run.</p>
Full article ">Figure 11
<p>A high-difficulty setting with the PBKDF2_SHA256 algorithm (an ITERATIONS_FACTOR of 256) shows a mostly linear relationship between the baseline time required to generate a VBA and the input iteration count. The data gathered is not an averaged composite of multiple runs. As the iteration count increases, variations in the baseline computation time increase.</p>
Full article ">Figure 12
<p>A high-difficulty setting with the Argon2 KDF (more specifically, Argon2d; with a Parallelism of 32 and a MemorySize of 2,048) shows a mostly linear relationship between the baseline time required to generate a VBA and the input iteration count. The data gathered is not an averaged composite of multiple runs. As the iteration count increases, variations in the baseline computation time increase. The scale of the Time axis is much smaller than the other KDFs used in this experiment.</p>
Full article ">Figure 13
<p>A high-difficulty setting with the Scrypt KDF (a SCALING_FACTOR at its maximum of 5) shows a mostly linear relationship between the baseline time required to generate a VBA and the input iteration count. The data gathered is not an averaged composite of multiple runs. As the iteration count increases, variations in the baseline computation time increase, and the linearity of the graph gently curves downwards.</p>
Full article ">Figure 14
<p>A mixed local network is shown where a single valid Link Voucher is delegated to VBA-capable neighbors. Neighbors without VBA capabilities are shown in blue, and VBA-aware neighbors are shown in red, orange, yellow, and green for the IEMs AAD, AGO, AGVL, and AGV, respectively. Different links are shown between some hosts to indicate their connectivity and security within this transitioning network. Inbound traffic to verifying nodes is generally considered secure.</p>
Full article ">
25 pages, 433 KiB  
Article
Polar Codes with Differential Phase Shift Keying for Selective Detect-and-Forward Multi-Way Relaying Systems
by Ruilin Ji and Harry Leib
Network 2024, 4(3), 313-337; https://doi.org/10.3390/network4030015 - 8 Aug 2024
Viewed by 820
Abstract
Relaying with network coding forms a basis for a variety of collaborative communication systems. A linear block coding framework for multi-way relaying using network codes introduced in the literature shows great promise for understanding, analyzing, and designing such systems. So far, this technique [...] Read more.
Relaying with network coding forms a basis for a variety of collaborative communication systems. A linear block coding framework for multi-way relaying using network codes introduced in the literature shows great promise for understanding, analyzing, and designing such systems. So far, this technique has been used with low-density parity check (LDPC) codes and belief propagation (BP) decoding. Polar codes have drawn significant interest in recent years because of their low decoding complexity and good performance. Our paper considers the use of polar codes also as network codes with differential binary phase shift keying (DBPSK), bypassing the need for channel state estimation in multi-way selective detect-and-forward (DetF) cooperative relaying. We demonstrate that polar codes are suitable for such applications. The encoding and decoding complexity of such systems for linear block codes is analyzed using maximum likelihood (ML) decoding for LDPC codes with log-BP decoding and polar codes with successive cancellation (SC) as well as successive cancellation list (SCL) decoding. We present Monte-Carlo simulation results for the performance of such a multi-way relaying system, employing polar codes with different lengths and code rates. The results demonstrate a significant performance gain compared to an uncoded scheme. The simulation results show that the error performance of such a system employing polar codes is comparable to LDPC codes with log-BP decoding, while the decoding complexity is much lower. Furthermore, we consider a hard threshold technique at user terminals for determining whether a relay transmits or not. This technique makes the system practical without increasing the complexity and can significantly reduce the degradation from intermittent relay transmissions that is associated with such a multi-way relaying protocol. Full article
Show Figures

Graphical abstract

Graphical abstract
Full article ">Figure 1
<p>Relation between transmission time slots and phases.</p>
Full article ">Figure 2
<p>Encoder of a <math display="inline"><semantics> <mrow> <mo>(</mo> <mn>8</mn> <mo>,</mo> <mn>5</mn> <mo>)</mo> </mrow> </semantics></math> polar code.</p>
Full article ">Figure 3
<p>BEC channel model.</p>
Full article ">Figure 4
<p>Receiver model of the terminals with the hard threshold.</p>
Full article ">Figure 5
<p>Frame error rate (FER) performance of a <math display="inline"><semantics> <mrow> <mo>(</mo> <mn>1024</mn> <mo>,</mo> <mn>512</mn> <mo>)</mo> </mrow> </semantics></math> polar code with successive cancellation (SC) and successive cancellation list (SCL) decoders over an additive white Gaussian noise (AWGN) channel and comparison with the results from ref. [<a href="#B60-network-04-00015" class="html-bibr">60</a>] (marked as [ref]).</p>
Full article ">Figure 6
<p>Bit error rate (BER) performance of a <math display="inline"><semantics> <mrow> <mo>(</mo> <mn>8</mn> <mo>,</mo> <mn>5</mn> <mo>)</mo> </mrow> </semantics></math> polar code with the successive cancellation (SC) and maximum likelihood (ML) decoders.</p>
Full article ">Figure 7
<p>Bit error rate (BER) performance of three long polar codes when all relays transmit.</p>
Full article ">Figure 8
<p>Bit error rate (BER) performance of a <math display="inline"><semantics> <mrow> <mo>(</mo> <mn>512</mn> <mo>,</mo> <mn>416</mn> <mo>)</mo> </mrow> </semantics></math> polar code with successive cancellation (SC) decoding.</p>
Full article ">Figure 9
<p>Bit error rate (BER) performance of a <math display="inline"><semantics> <mrow> <mo>(</mo> <mn>512</mn> <mo>,</mo> <mn>416</mn> <mo>)</mo> </mrow> </semantics></math> polar code with successive cancellation list (SCL) decoding.</p>
Full article ">Figure 10
<p>Bit error rate (BER) comparison of <math display="inline"><semantics> <msub> <mover accent="true"> <mi mathvariant="bold">m</mi> <mo>^</mo> </mover> <mi>T</mi> </msub> </semantics></math> and <math display="inline"><semantics> <msub> <mover accent="true"> <mi mathvariant="bold">m</mi> <mo>^</mo> </mover> <mi>A</mi> </msub> </semantics></math> of a <math display="inline"><semantics> <mrow> <mo>(</mo> <mn>512</mn> <mo>,</mo> <mn>416</mn> <mo>)</mo> </mrow> </semantics></math> polar code with successive cancellation (SC) decoding.</p>
Full article ">Figure 11
<p>Bit error rate (BER) comparison of <math display="inline"><semantics> <msub> <mover accent="true"> <mi mathvariant="bold">m</mi> <mo>^</mo> </mover> <mi>T</mi> </msub> </semantics></math> and <math display="inline"><semantics> <msub> <mover accent="true"> <mi mathvariant="bold">m</mi> <mo>^</mo> </mover> <mi>A</mi> </msub> </semantics></math> of a <math display="inline"><semantics> <mrow> <mo>(</mo> <mn>512</mn> <mo>,</mo> <mn>416</mn> <mo>)</mo> </mrow> </semantics></math> polar code with successive cancellation list (SCL) decoding.</p>
Full article ">
18 pages, 7344 KiB  
Article
A User Location Reset Method through Object Recognition in Indoor Navigation System Using Unity and a Smartphone (INSUS)
by Evianita Dewi Fajrianti, Yohanes Yohanie Fridelin Panduman, Nobuo Funabiki, Amma Liesvarastranta Haz, Komang Candra Brata and Sritrusta Sukaridhoto
Network 2024, 4(3), 295-312; https://doi.org/10.3390/network4030014 - 22 Jul 2024
Viewed by 901
Abstract
To enhance user experiences of reaching destinations in large, complex buildings, we have developed a indoor navigation system using Unity and a smartphone called INSUS. It can reset the user location using a quick response (QR) code to reduce the loss of [...] Read more.
To enhance user experiences of reaching destinations in large, complex buildings, we have developed a indoor navigation system using Unity and a smartphone called INSUS. It can reset the user location using a quick response (QR) code to reduce the loss of direction of the user during navigation. However, this approach needs a number of QR code sheets to be prepared in the field, causing extra loads at implementation. In this paper, we propose another reset method to reduce loads by recognizing information of naturally installed signs in the field using object detection and Optical Character Recognition (OCR) technologies. A lot of signs exist in a building, containing texts such as room numbers, room names, and floor numbers. In the proposal, the Sign Image is taken with a smartphone, the sign is detected by YOLOv8, the text inside the sign is recognized by PaddleOCR, and it is compared with each record in the Room Database using Levenshtein distance. For evaluations, we applied the proposal in two buildings in Okayama University, Japan. The results show that YOLOv8 achieved [email protected] 0.995 and [email protected]:0.95 0.978, and PaddleOCR could extract text in the sign image accurately with an averaged CER% lower than 10%. The combination of both YOLOv8 and PaddleOCR decreases the execution time by 6.71s compared to the previous method. The results confirmed the effectiveness of the proposal. Full article
Show Figures

Figure 1

Figure 1
<p>Overview of INSUS.</p>
Full article ">Figure 2
<p>Overview of <span class="html-italic">INSUS</span> with object-detection-based <span class="html-italic">user location reset</span> method.</p>
Full article ">Figure 3
<p>Connection between Unity (<span class="html-italic">INSUS</span>) and Python (<span class="html-italic">SEMAR</span> server) with HTTP communication using REST API service.</p>
Full article ">Figure 4
<p>Example input image with sign.</p>
Full article ">Figure 5
<p>(<b>a</b>) Example in original dataset; (<b>b</b>) example in the augmented dataset.</p>
Full article ">Figure 6
<p>(<b>a</b>) Validation training from box loss.; (<b>b</b>) validation training from class loss.</p>
Full article ">Figure 7
<p>(<b>a</b>) <span class="html-italic">Precision</span> and <span class="html-italic">recall</span> during the training process; (<b>b</b>) mAP@0.5 and mAP@0.5-0.95 results during the training process.</p>
Full article ">
35 pages, 1240 KiB  
Article
Enhancing Resilience in Digital Twins: ASCON-Based Security Solutions for Industry 4.0
by Mohammed El-Hajj and Teklit Haftu Gebremariam
Network 2024, 4(3), 260-294; https://doi.org/10.3390/network4030013 - 19 Jul 2024
Cited by 1 | Viewed by 1112
Abstract
Persistent security challenges in Industry 4.0 due to the limited resources of IoT devices necessitate innovative solutions. Addressing this, this study introduces the ASCON algorithm for lightweight authenticated encryption with associated data, enhancing confidentiality, integrity, and authenticity within IoT limitations. By integrating Digital [...] Read more.
Persistent security challenges in Industry 4.0 due to the limited resources of IoT devices necessitate innovative solutions. Addressing this, this study introduces the ASCON algorithm for lightweight authenticated encryption with associated data, enhancing confidentiality, integrity, and authenticity within IoT limitations. By integrating Digital Twins, the framework emphasizes the need for robust security in Industry 4.0, with ASCON ensuring secure data transmission and bolstering system resilience against cyber threats. Practical validation using the MQTT protocol confirms ASCON’s efficacy over AES-GCM, highlighting its potential for enhanced security in Industry 4.0. Future research should focus on optimizing ASCON for microprocessors and developing secure remote access tailored to resource-constrained devices, ensuring adaptability in the digital era. Full article
Show Figures

Figure 1

Figure 1
<p>Research experiment set-up.</p>
Full article ">Figure 2
<p>Scheme of Payload Encryption With Authentication Over MQTT Protocol.</p>
Full article ">Figure 3
<p>Flow diagram for custom data encryption and decryption in Ditto.</p>
Full article ">Figure 4
<p>Serial monitor of ESP32 board and Wireshark capturing communication between the device and Ditto (DT).</p>
Full article ">Figure 5
<p>Ditto and web app for simulating Digital Twin.</p>
Full article ">Figure 6
<p>Performance of three case scenarios from algorithm execution speed and application running time.</p>
Full article ">Figure 7
<p>Throughput and cycle per byte ratio of each algorithm.</p>
Full article ">Figure 8
<p>Memory map of embedded programming [<a href="#B25-network-04-00013" class="html-bibr">25</a>].</p>
Full article ">Figure 9
<p>Static code size of the scheme for three scenarios (No-Encryption, ASCON, AES-GCM).</p>
Full article ">Figure 10
<p>Dynamic memory usage comparison of our scheme implementation and algorithms.</p>
Full article ">Figure 11
<p>Power measurement set−up using Otii−arch.</p>
Full article ">Figure 12
<p>Power analysis read of LOLIN32 Lite ESP32 using the Otii-arch device.</p>
Full article ">
23 pages, 1344 KiB  
Review
Delay and Disruption Tolerant Networking for Terrestrial and TCP/IP Applications: A Systematic Literature Review
by Aris Castillo, Carlos Juiz and Belen Bermejo
Network 2024, 4(3), 237-259; https://doi.org/10.3390/network4030012 - 1 Jul 2024
Viewed by 1714
Abstract
Delay and Disruption Tolerant Networking (DTN) is a network architecture created basically to overcome non-continuing connectivity. There has been a great deal of research on this topic, from space communication to terrestrial applications. Since there are still many places on earth where there [...] Read more.
Delay and Disruption Tolerant Networking (DTN) is a network architecture created basically to overcome non-continuing connectivity. There has been a great deal of research on this topic, from space communication to terrestrial applications. Since there are still many places on earth where there is no means of communication, the focus of this work is on the latest. A systematic literature review (SLR) was performed to know the main issues and advances related to the implementation of DTN for terrestrial and TCP/IP applications, especially in places where telecommunication infrastructure is lacking. The result is a classification of papers based on key aspects, such as architecture, performance, routing, and applications. A matrix of all the papers about these aspects is included to help researchers find the missing piece and concrete terrestrial solutions. The matrix uses three colors, green, yellow, and red according to the focus, either high, medium, or low, so that it is easy to identify specific papers. Full article
Show Figures

Figure 1

Figure 1
<p>SLR process.</p>
Full article ">Figure 2
<p>Publications per year.</p>
Full article ">Figure 3
<p>Paper categories.</p>
Full article ">
Previous Issue
Next Issue
Back to TopTop