2021 IEEE 7th World Forum on Internet of Things (WF-IoT) 2021
DOI: 10.1109/wf-iot51360.2021.9595819
|View full text |Cite
|
Sign up to set email alerts
|

Randomization of Data Generation Times Improves Performance of Predictive IoT Networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
11
0

Year Published

2022
2022
2023
2023

Publication Types

Select...
3
2

Relationship

1
4

Authors

Journals

citations
Cited by 10 publications
(11 citation statements)
references
References 36 publications
0
11
0
Order By: Relevance
“…Most recently the Randomization of Generation Times (RGT) preprocessing algorithm [36] is shown to significantly improve the performance of scheduling heuristics with very low computational cost for large numbers of IoT devices. Also, the Quasi-Deterministic Transmission Policy (QDTP) traffic shaping approach [19,25] has been shown, using queueing theory, diffusion approximations [16] and trace driven simulations, to mitigate the MAP by drastically reducing the waiting time at gateways.…”
Section: Proactive Solutionsmentioning
confidence: 99%
See 3 more Smart Citations
“…Most recently the Randomization of Generation Times (RGT) preprocessing algorithm [36] is shown to significantly improve the performance of scheduling heuristics with very low computational cost for large numbers of IoT devices. Also, the Quasi-Deterministic Transmission Policy (QDTP) traffic shaping approach [19,25] has been shown, using queueing theory, diffusion approximations [16] and trace driven simulations, to mitigate the MAP by drastically reducing the waiting time at gateways.…”
Section: Proactive Solutionsmentioning
confidence: 99%
“…We will summarize together the results of two recent articles [19,36], which offer solutions to reduce MAP. To this end, we first present the analysis in [19] of the probability that the deadline of an IoT packet is met, providing a basis for access policies in IoT networks.…”
Section: Mitigating Map Using Queueing Theory and Diffusion Approxima...mentioning
confidence: 99%
See 2 more Smart Citations
“…-KONFIDO [17,18,96,97] on the security of communications and data transfers for interconnected European national or regional health services, -GHOST [8,11] regarding the security of IoT systems for the home, and the design of secure IoT home gateways, -SerIoT on the Cybersecurity of IoT systems [7,31] with a range of applications in supply chains, smart cities, smart manufacturing, and other areas. -IoTAC, which aims at securing IoT networks by strengthening the protection of gateways using novel techniques such as Botnet detection, system wide vulnerability assessment [93,94], disruptive checkpoints, and assuring the optimization of the massive access to IoT gateways [67,75].…”
Section: Introductionmentioning
confidence: 99%