2022
DOI: 10.1109/access.2022.3181304
|View full text |Cite
|
Sign up to set email alerts
|

A Novel Energy-Conscious Access Point (eAP) System With Cross-Layer Design in Wi-Fi Networks for Reliable IoT Services

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
13
0
1

Year Published

2023
2023
2024
2024

Publication Types

Select...
4
2
1

Relationship

2
5

Authors

Journals

citations
Cited by 8 publications
(14 citation statements)
references
References 31 publications
0
13
0
1
Order By: Relevance
“…As a result, the energy efficiency of transmitting devices can deteriorate rapidly in grant-free transmission. In this experiment, we calculated the energy consumption for UL IoT devices in the simulated environment, considering three operational modes for IoT devices: transmission (Tx), receiving (Rx), and sleep, with energy usage rates of 0.45, 0.15, and 0.00012 W , respectively [75]. The energy computation also included transmission (ReTx) and receiving (ReRx) energy resulting from retransmissions.…”
Section: F Performance Comparison For Energy Consumptionmentioning
confidence: 99%
“…As a result, the energy efficiency of transmitting devices can deteriorate rapidly in grant-free transmission. In this experiment, we calculated the energy consumption for UL IoT devices in the simulated environment, considering three operational modes for IoT devices: transmission (Tx), receiving (Rx), and sleep, with energy usage rates of 0.45, 0.15, and 0.00012 W , respectively [75]. The energy computation also included transmission (ReTx) and receiving (ReRx) energy resulting from retransmissions.…”
Section: F Performance Comparison For Energy Consumptionmentioning
confidence: 99%
“…IoT mewajibkan sebuah perangkat terhubung ke jaringan internet supaya dapat melakukan pertuakaran data dengan perangkat lainnya [12]. Supaya dapat melakukan komunikasi dua arah antar perangkat, dibutuhkan komputer yang berperan sebagai pihak perantara bernama web service yang memiliki wujud berupa Application Programming Interface (API) [13].…”
Section: Tinjauan Pustakaunclassified
“…Both problems will lead to software access problems, thereby affecting the security of user privacy data. 25…”
Section: • Iotivitymentioning
confidence: 99%
“…36 To solve the access control problem, Lee et al proposed a functionality-centric scheme involving nothing about cryptographic knowledge, namely FACT. 25 However, as the number of devices increased, the ACL gradually showed its drawbacks, because the time complexity of the query accessing the ACL is at least (logn). [37][38][39] Then, Giffin et al put forward a new access control solution which restricts the app's permissions through MAC.…”
Section: Security In Iotmentioning
confidence: 99%