2021 29th International Symposium on Modeling, Analysis, and Simulation of Computer and Telecommunication Systems (MASCOTS) 2021
DOI: 10.1109/mascots53633.2021.9614289
|View full text |Cite
|
Sign up to set email alerts
|

Diffusion Analysis Improves Scalability of IoT Networks to Mitigate the Massive Access Problem

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
19
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
2
2
1

Relationship

1
4

Authors

Journals

citations
Cited by 13 publications
(19 citation statements)
references
References 47 publications
0
19
0
Order By: Relevance
“…Most recently the Randomization of Generation Times (RGT) preprocessing algorithm [36] is shown to significantly improve the performance of scheduling heuristics with very low computational cost for large numbers of IoT devices. Also, the Quasi-Deterministic Transmission Policy (QDTP) traffic shaping approach [19,25] has been shown, using queueing theory, diffusion approximations [16] and trace driven simulations, to mitigate the MAP by drastically reducing the waiting time at gateways. This research has shown that RGT and QDTP can mitigate MAP with very low computational requirements for up to 6400 IoT devices.…”
Section: Proactive Solutionsmentioning
confidence: 99%
See 3 more Smart Citations
“…Most recently the Randomization of Generation Times (RGT) preprocessing algorithm [36] is shown to significantly improve the performance of scheduling heuristics with very low computational cost for large numbers of IoT devices. Also, the Quasi-Deterministic Transmission Policy (QDTP) traffic shaping approach [19,25] has been shown, using queueing theory, diffusion approximations [16] and trace driven simulations, to mitigate the MAP by drastically reducing the waiting time at gateways. This research has shown that RGT and QDTP can mitigate MAP with very low computational requirements for up to 6400 IoT devices.…”
Section: Proactive Solutionsmentioning
confidence: 99%
“…We will summarize together the results of two recent articles [19,36], which offer solutions to reduce MAP. To this end, we first present the analysis in [19] of the probability that the deadline of an IoT packet is met, providing a basis for access policies in IoT networks. Then we review the RGT [36] and QDTP [19] algorithms and their performance.…”
Section: Mitigating Map Using Queueing Theory and Diffusion Approxima...mentioning
confidence: 99%
See 2 more Smart Citations
“…-KONFIDO [17,18,96,97] on the security of communications and data transfers for interconnected European national or regional health services, -GHOST [8,11] regarding the security of IoT systems for the home, and the design of secure IoT home gateways, -SerIoT on the Cybersecurity of IoT systems [7,31] with a range of applications in supply chains, smart cities, smart manufacturing, and other areas. -IoTAC, which aims at securing IoT networks by strengthening the protection of gateways using novel techniques such as Botnet detection, system wide vulnerability assessment [93,94], disruptive checkpoints, and assuring the optimization of the massive access to IoT gateways [67,75].…”
Section: Introductionmentioning
confidence: 99%