Ubiquitous Robotic Networks Research Papers (original) (raw)

This work evaluates the performance of Consumed-Energy-Type-Aware Routing (CETAR) which incorporates the amount of energy consumed per type of operation for routing decision to extend the lifetime of the Wireless Sensor Networks (WSNs).... more

This work evaluates the performance of Consumed-Energy-Type-Aware Routing (CETAR) which incorporates the amount of energy consumed per type of operation for routing decision to extend the lifetime of the Wireless Sensor Networks (WSNs). CETAR makes routing decision using statistics of the energy consumed for each type of node activities including sensing, data processing, data transmission as a source node, and routing operations. In particular, CETAR encourages a node which seldom plays a role of source node as a routing node to preserve the energy of active source nodes to prolong the functionality of the WSNs. Extensive simulation study demonstrates that the lifetime of the Geographic and Energy Aware Routing (GEAR) can be significantly extended with CETAR. With its adaptability to deployed sensor node behaviors, the significance
of CETAR to extend the lifetime of WSNs is clear.

Internet of Things (IoT) and services is an interesting topic with a wide range of potential applications like smart home systems, health care, telemedicine, and intelligent transportation. Traditionally, key agreement schemes have been... more

Internet of Things (IoT) and services is an interesting topic with a wide range of potential applications like smart home systems, health care, telemedicine, and intelligent transportation. Traditionally, key agreement schemes have been evaluated to access IoT services which are highly susceptible to security. Recently, Biometric-based authentication is also used to access IoT services and devices. They are involving a larger amount of memory with increased running time and found to be computationally infeasible. To provide robust authentication for IoT services, Histogram of Neighborhood Tripartite Authentication with Fingerprint Biometrics (HNTA-FB) for IoT services is proposed in this paper. This proposed HNTA-FB method uses binary patterns and a histogram of features to extract the region of interest. To reduce the memory requirements while providing access to IoT services, Histogram of Neighborhood Binary Pattern Pre-processing (HNBPP) model is proposed. The discriminative power of Neighbourhood Binary Pattern Registration (NBPR) is integrated with the normalized sparse representation based on the histogram. Additionally, this work presents a new Tripartite User Authentication model for fingerprint biometric template matching process. When compared with different state-of-the-art methods, the proposed method depicts significantly improved performance in terms of matching accuracy, computational overhead and execution speed and is highly effective in delivering smart home services.

The International Journal of Computer Networks & Communications (IJCNC) is a bi monthly open access peer-reviewed journal that publishes articles which contribute new results in all areas of Computer Networks & Communications .The journal... more

The International Journal of Computer Networks & Communications (IJCNC) is a bi monthly open access peer-reviewed journal that publishes articles which contribute new results in all areas of Computer Networks & Communications .The journal focuses on all technical and practical aspects of Computer Networks & data Communications. The goal of this journal is to bring together researchers and practitioners from academia and industry to focus on advanced networking concepts and establishing new collaborations in these areas. Authors are solicited to contribute to this journal by submitting articles that illustrate research results, projects, surveying works and industrial experiences that describe significant advances in the Computer Networks & Communications.

Much thought has been given to the question of who bears moral and legal responsibility for actions performed by robots. Some argue that responsibility could be attributed to a robot if it possessed human-like autonomy and... more

Much thought has been given to the question of who bears moral and legal responsibility for actions performed by robots. Some argue that responsibility could be attributed to a robot if it possessed human-like autonomy and metavolitionality, and that while such capacities can potentially be possessed by a robot with a single spatially compact body, they cannot be possessed by a spatially disjunct, decentralized collective such as a robotic swarm or network. However, advances in ubiquitous robotics and distributed computing open the door to a new form of robotic entity that possesses a unitary intelligence, despite the fact that its cognitive processes are not confined within a single spatially compact, persistent, identifiable body. Such a “nonlocalizable” robot may possess a body whose myriad components interact with one another at a distance and which is continuously transforming as components join and leave the body. Here we develop an ontology for classifying such robots on the basis of their autonomy, volitionality, and localizability. Using this ontology, we explore the extent to which nonlocalizable robots—including those possessing cognitive abilities that match or exceed those of human beings—can be considered moral and legal actors that are responsible for their own actions.

Modbus is the de facto standard communication protocol for the industrial world. It was initially designed to be used in serial communications (Modbus RTU/ASCII). However, not long ago, it was adapted to TCP due to the increasing... more

Modbus is the de facto standard communication protocol for the industrial world. It was initially designed to be used in serial communications (Modbus RTU/ASCII). However, not long ago, it was adapted to TCP due to the increasing popularity of the TCP/IP stack. Since it was originally designed for controlled serial lines, Modbus does not have any security features. In this paper, we wrote several benchmarks to evaluate the performance of networking devices that run Modbus TCP. Parameters reported by our benchmarks include: (1) response time for Modbus requests, (2) maximum number of requests successfully handled by Modbus devices in a specific amount of time, and (3) monitoring of Modbus devices when suffering a Distributed Denial of Service attack. Due to the growing adoption of IoT technologies, we also selected two widely known and inexpensive development boards (ESP8266 and Raspberry Pi 3 B+/OpenPLC) to realize a performance evaluation of Modbus TCP.

The International Journal of Computer Networks & Communications (IJCNC) is a bi monthly open access peer-reviewed journal that publishes articles which contribute new results in all areas of Computer Networks & Communications .The journal... more

The International Journal of Computer Networks & Communications (IJCNC) is a bi monthly open access peer-reviewed journal that publishes articles which contribute new results in all areas of Computer Networks & Communications .The journal focuses on all technical and practical aspects of Computer Networks & data Communications. The goal of this journal is to bring together researchers and practitioners from academia and industry to focus on advanced networking concepts and establishing new collaborations in these areas.

8th International Conference on Networks & Communications (NWCOM 2022) will provide an excellent international forum for sharing knowledge and results in theory, methodology and applications of Computer Science, Engineering and... more

8th International Conference on Networks & Communications (NWCOM 2022) will
provide an excellent international forum for sharing knowledge and results in theory,
methodology and applications of Computer Science, Engineering and Information Technology.
The Conference looks for significant contributions to all major fields of the Computer Science,
Engineering and Information Technology in theoretical and practical aspects.
Authors are solicited to contribute to the conference by submitting articles that illustrate
research results, projects, surveying works and industrial experiences that describe significant
advances in the following areas, but are not limited to

Deployment Video on Demand (VoD) over the next generation (WiMAX) has become one of the intense interest subjects in the research these days, and is expected to be the main revenue generators in the near future and the efficiency of video... more

Deployment Video on Demand (VoD) over the next generation (WiMAX) has become one of the intense interest subjects in the research these days, and is expected to be the main revenue generators in the near future and the efficiency of video streaming over next generation 4G is the key to enabling this. We are considering video streaming for real time video was coded by different H.264.x codes (H.264/AVC, and SVC), and we consider an IP-Unicast to deliver this streaming video over WiMAX. Our approach investigates the performance evaluation of IPTV (VoD) over WiMAX networks. OPNET is used to investigate the performance of VoD over WiMAX. Results obtained from simulation indicate that SVC video codec is an appropriate video codec for video streaming over WiMAX.

Human-Robot Interaction poses significant research challenges. Recent research suggests that personalisation and individualisation are key factors for establishing lifelong human-robot relationships. This raises difficulties as... more

Human-Robot Interaction poses significant research challenges. Recent research suggests that personalisation and individualisation are key factors for establishing lifelong human-robot relationships.
This raises difficulties as roboticists seek to incorporate robots into the digital society where an increasing amount of human activities relies on digital technologies and ubiquitous infrastructures. In essence, a robot may be perceived as either an embedded or mobile artefact in an arbitrary environment that must be interacted with in a seamless and intuitive fashion.
This chapter explores some of the alternative ways and the design issues to achieve these objectives. Specifically, it describes a new system, which we call Mixed Reality Agent (MiRA) Chameleon, that combines the latest advancements on agent-based ubiquitous architectures with mixed reality technology to deliver personalised and ubiquitous robot agents.

Traditionally, social interaction research has concentrated on either fully virtually embodied agents (e.g. embodied conversational agents) or fully physically embodied agents (e.g. robots). For some time, however, both areas have started... more

Traditionally, social interaction research has concentrated on either fully virtually embodied agents (e.g. embodied conversational agents) or fully physically embodied agents (e.g. robots). For some time, however, both areas have started augmenting their agents’ capabilities for social interaction using ubiquitous and intelligent environments.
We are placing different agent systems for social interaction along Milgram’s Reality-Virtuality Continuum—according to the degree they are embodied in a physical, virtual or mixed reality environment—and show systems that follow the next logical step in this progression, namely social interaction in the middle of Milgram’s continuum, that is, agents richly embodied in the physical and virtual world.
This paper surveys the field of social interaction research with embodied agents with a particular view towards their embodiment forms and highlights some of the advantages and issues associated with the very recent field of social interaction with mixed reality agents.

The use of robotic devices is increasing in our day to day life and consequently giving rise to the privacy and security issues which are very unique compared to other domains. In spite of the swift development of robotics technology,... more

The use of robotic devices is increasing in our day to day life and consequently giving rise to the privacy and security issues which are very unique compared to other domains. In spite of the swift development of robotics technology, privacy problems for robots remain unchanged and without functional research. It is not that difficult to find out why robots are raising privacy distress. Robots have the ability to move and sense the world surrounding them. This increase in power to observe may cause privacy issues in the upcoming years. In this paper, we present some statistics related to robotics industries. Then different aspects of robot privacy are examined from the point of views of other works and some prevention techniques are also discussed to alleviate this concerning issue. However, this is a problem that might be hard to distinguish and avoid. In some cases, the problem is inevitable. As consumers and creators, our best way should be to move forward very cautiously.

Wireless sensor networks (WSNs) consists of small nodes with constrain capabilities. It enables numerous applications with distributed network infrastructure. With its nature and application scenario, security of WSN had drawn a great... more

Wireless sensor networks (WSNs) consists of small nodes with constrain capabilities. It enables numerous applications with distributed network infrastructure. With its nature and application scenario, security of WSN had drawn a great attention. In malicious environments for a functional WSN, security mechanisms are essential. Malicious or internal attacker has gained attention as the most challenging attacks to WSNs. Many works have been done to secure WSN from internal attacks but most of them relay on either training data set or predefined thresholds. It is a great challenge to find or gain knowledge about the Malicious. In this paper, we develop the algorithm in two stages. Initially, Abnormal Behaviour Identification Mechanism (ABIM) which uses cosine similarity. Finally, Dempster-Shafer theory (DST)is used. Which combine multiple evidences to identify the malicious or internal attacks in a WSN. In this method we do not need any predefined threshold or tanning data set of the nodes.

The International Journal of Computer Networks & Communications (IJCNC) is a bi monthly open access peer-reviewed journal that publishes articles which contribute new results in all areas of Computer Networks & Communications. The journal... more

The International Journal of Computer Networks & Communications (IJCNC) is a bi monthly open access peer-reviewed journal that publishes articles which contribute new results in all areas of Computer Networks & Communications. The journal focuses on all technical and practical aspects of Computer Networks & data Communications. The goal of this journal is to bring together researchers and practitioners from academia and industry to focus on advanced networking concepts and establishing new collaborations in these areas.

Two mechanisms have been proposed independently by IEEE and 3GPP; namely, Media Independent Handover (MIH) and Access Network Discovery and Selection Function (ANDSF), respectively. These mechanisms enable a seamless Vertical Handover... more

Two mechanisms have been proposed independently by IEEE and 3GPP; namely, Media Independent Handover (MIH) and Access Network Discovery and Selection Function (ANDSF), respectively. These mechanisms enable a seamless Vertical Handover (VHO) between the different types of technologies (3GPP and non-3GPP), such as GSM (Global System for Mobile Communication), Wireless Fidelity (Wi-Fi), Worldwide Interoperability for Microwave Access (WiMAX), Universal Mobile Telecommunications System (UMTS) and Long Term Evolution (LTE). In this paper, we overview these mechanisms and show their components, benefits and drawbacks. Then we present our Imperative Alternative MIH for Vertical Handover (I AM 4 VHO) approach based on the approaches that have been studied in the literature with better performance (packet loss and latency), less connection failure (probability of reject sessions), less complexity and more exhaustive for enhancing VHO heterogeneous wireless networks environment.

In networks, many application protocols such as CoAP, REST, XMPP ,AMQP have been proposed for IoT communication which includes p2p or S2S. In MANET Network convergence does the way for improvements in Internet of Things (IoT)... more

In networks, many application protocols such as CoAP, REST, XMPP ,AMQP have been proposed for IoT communication which includes p2p or S2S. In MANET Network convergence does the way for improvements in Internet of Things (IoT) communication with high potential for a wide range of applications. Each protocol focuses on some aspects of communication in the IoT. Hence, these application protocols have indicated of how IoT has integrated to enhanced and developed of a new service that require to guarantees the wide range offered by the quality of services. In this paper, we will introduce a smart pathway that can be bridge the gap between IoT services with its real data traffic. Therefore, we enhanced the MANET routing protocol for computing two or more paths to pass the more that one high priority real traffic data via these paths to improve the gloomy picture of this protocol in the context of IoT. In particular, the good services with high timely delivery of urgent data such as real time data environmental monitoring. After surveying the published and available protocol interoperability given for urban sensing. In this research, we have proposed a novel solution to integrate MANET overlays, and collaboratively formed over MANET, to boost urban data in IoT. Overlays are used to dynamic differentiate and fasten the delivery of high priority real application time data over low-latency MANET paths by integrating with the original specifications. Our experimental results showed the effectiveness on the network such as the overhead and network congestion. In addition, the initial results of the lightweight improved the routing protocol over the baseline protocols in terms of the delay of reciveing the packets between nodes which lead to increase the throughput by reducing loss packets.

7th International Conference on Networks, Mobile Communication (NMCO 2021) is a forum for presenting new advances and research results in the fields of Network, Mobile communications, and Telematics. The aim of the conference is to... more

7th International Conference on Networks, Mobile Communication (NMCO 2021) is a
forum for presenting new advances and research results in the fields of Network, Mobile
communications, and Telematics. The aim of the conference is to provide a platform to the researchers and practitioners from both academia as well as industry to meet and share cuttingedge development in the field. Authors are solicited to contribute to the conference by submitting articles that illustrate research results, projects, surveying works and industrial experiences that describe significant advances in the following areas but are not limited to:

The International Journal of Computer Networks & Communications (IJCNC) is a bi monthly open access peer-reviewed journal that publishes articles which contribute new results in all areas of Computer Networks & Communications .The journal... more

The International Journal of Computer Networks & Communications (IJCNC) is a bi monthly open access peer-reviewed journal that publishes articles which contribute new results in all areas of Computer Networks & Communications .The journal focuses on all technical and practical aspects of Computer Networks & data Communications. The goal of this journal is to bring together researchers and practitioners from academia and industry to focus on advanced networking concepts and establishing new collaborations in these areas.

Secured and opportune transmission of data alwaysis a significant feature for any organization. Robust encryption techniques and algorithms always facilitate in augmenting secrecy, authentication and reliability of data. At present,... more

Secured and opportune transmission of data alwaysis a significant feature for any organization. Robust encryption techniques and algorithms always facilitate in augmenting secrecy, authentication and reliability of data. At present, Advanced Encryption Standard (AES) patronized by NIST is the most secure algorithm for escalating the confidentiality of data. This paper mainly focuses on an inclusive analysis related to the security of existing AES algorithm and aim to enhance the level security of this algorithm. Through some modification of existing AES algorithm by XORing an additional byte with s-box value, we have successfully increased the Time Security and Strict Avalanche Criterion. We have used random additional key for increasing security. Since this key is random, result of security measurement sometimes fluctuates.

The Wireless Sensor Networks (WSN) particularly for real time applications raise fundamental problems for the scientific community. These problems are related to the limit of energy resource and the real time constraints on the... more

The Wireless Sensor Networks (WSN) particularly for real time applications raise fundamental problems for the scientific community. These problems are related to the limit of energy resource and the real time constraints on the communication delay. The well functioning of such networks depends mainly on the network lifetime result of nodes energies and the communication delay which should meet the required deadlines. Thus, the well design of Real-Time Wireless Sensor Networks must be with the prediction of the energy consumption and the communication delay. Therefore, this paper propose an analytical model to predict the lifetime and the delay in IEEE 802.15.4/ZigBee WSN. Our proposed model is based on realistic assumptions. It considers the most important network features such as idle times from the Backoff, overhearing and interferences by collisions and transmission errors. Compared to simulation results and other analytical approaches, our model gives a reliable lifetime and delay prediction.

The International Journal of Computer Networks & Communications (IJCNC) is a bi monthly open access peer-reviewed journal that publishes articles which contribute new results in all areas of Computer Networks & Communications. The journal... more

The International Journal of Computer Networks & Communications (IJCNC) is a bi monthly open access peer-reviewed journal that publishes articles which contribute new results in all areas of Computer Networks & Communications. The journal focuses on all technical and practical aspects of Computer Networks & data Communications. The goal of this journal is to bring together researchers and practitioners from academia and industry to focus on advanced networking concepts and establishing new collaborations in these areas.

7th International Conference on Computer Networks & Data Communications (CNDC 2020) will provide an excellent international forum for sharing knowledge and results in theory and applications of Computer Networks and Data Communications.... more

7th International Conference on Computer Networks & Data Communications (CNDC 2020) will provide an excellent international forum for sharing knowledge and results in theory and applications of Computer Networks and Data Communications. The Conference looks for significant contributions to the Computer Networks and Communications for wired and wireless networks in theoretical and practical aspects. Original papers are invited on Networks, wireless and Mobile, Protocols and wireless networks and security. The aim of the conference is to provide a platform to the researchers and practitioners from both academia as well as industry to meet and share cutting-edge development in the field.

Cognitive radio is an emerging technology, which aims to upgrade the spectrum utilization by allowing the secondary users to operate at the spectrum bands vacated by the primary users. A cognitive radio system model was simulated and the... more

Cognitive radio is an emerging technology, which aims to upgrade the spectrum utilization by allowing the secondary users to operate at the spectrum bands vacated by the primary users. A cognitive radio system model was simulated and the performance of the energy detector was evaluated by using different wireless channel models. These models include Additive White Gaussian Noise (AWGN) model, Rayleigh fading model, and Rician fading model. The simulation results show that by increasing the signal to noise ratio, the detection capability of the energy detector can be improved and the false alarm probability and the missed detection probability can be reduced. Moreover, the line of sight path strength of the Rician fading has a great effect on the energy detector performance. It was observed that, the line of sight path strength (k) of 20 can save the signal power by 40 dB over a single path transmission and 25 dB over a multipath transmission.

The International Journal of Computer Networks & Communications (IJCNC) is a bi monthly open access peer-reviewed journal that publishes articles which contribute new results in all areas of Computer Networks & Communications. The journal... more

The International Journal of Computer Networks & Communications (IJCNC) is a bi monthly open access peer-reviewed journal that publishes articles which contribute new results in all areas of Computer Networks & Communications. The journal focuses on all technical and practical aspects of Computer Networks & data Communications. The goal of this journal is to bring together researchers and practitioners from academia and industry to focus on advanced networking concepts and establishing new collaborations in these areas.

While many robotic initiatives now share the thesis that robots are a compelling instance of those artefacts which comprise and deliver smart and ubiquitous environments, reconciling the social interface aspect with pervasiveness and... more

While many robotic initiatives now share the thesis that robots are a compelling instance of those artefacts which comprise and deliver smart and ubiquitous environments, reconciling the social interface aspect with pervasiveness and ubiquity still remains a largely unexplored area of research. We argue that specific studies must be carried out to explore possible inconsistencies between the keystones of social human-robot interaction and the new features exhibited by ubiquitous robots. To this end, we conducted a pilot study to explore how the ubiquity of a robot’s sensing capabilities affects the unconscious human perception of the robot as a social partner. Specifically, the experiment investigates whether people prefer a robot exhibiting ubiquitous sensor access or a more traditional robot whose capabilities are confined to its on-board sensors. We report qualitative results from the experiment and how results from the pilot study affect the design of the full-scale experiment.