89
Views
3
CrossRef citations to date
0
Altmetric
Research Article

Quality of service assessment routing protocols for performance in a smart building: A case study

& ORCID Icon
Pages 7217-7236 | Received 02 Mar 2022, Accepted 21 Jul 2022, Published online: 31 Jul 2022

References

  • Ansari, H. R., and Z. Kordrostami. 2020. Development of a low stress RF MEMS double-cantilever shunt capacitive switch. Microsystem Technologies 26 (8):2739–48. doi:10.1007/s00542-020-04838-1.
  • Ansari, H. R., and Z. Kordrostami. 2021. Design and simulation of a MEMS MIM capacitive pressure sensor with high sensitivity in low pressure range. Energy Harvesting and Systems 8 (2):81–85. doi:10.1515/ehs-2021-0017.
  • Araujo, F., A. Gomes, and R. P. Rocha. 2020. Towards optimal convergecast in wireless ad hoc networks. Ad Hoc Networks 107:102214. doi:10.1016/j.adhoc.2020.102214.
  • Bhushan, B., and G. Sahoo. 2019. Routing protocols in wireless sensor networks. In Computational intelligence in sensor networks, 215–48. Berlin, Heidelberg:Springer.
  • Chanak, P., and I. Banerjee. 2020. Congestion free routing mechanism for IoT-enabled wireless sensor networks for smart healthcare applications. IEEE Transactions on Consumer Electronics 66 (3):223–32. doi:10.1109/TCE.2020.2987433.
  • Chen, S., L. Zhang, Y. Tang, C. Shen, R. Kumar, K. Yu, U. Tariq, and A. K. Bashir, et al. 2020. Indoor temperature monitoring using wireless sensor networks: a SMAC application in smart cities. Sustainable Cities and Society 61:102333. doi:10.1016/j.scs.2020.102333.
  • Cui, Z., X. Fei, S. Zhang, X. Cai, Y. Cao, and W. Zhang, et al. 2020. A hybrid blockchain-based identity authentication scheme for multi-WSN. IEEE Transactions on Services Computing 13(2):241–51.
  • Cvitić, I., D. Peraković, M. Periša, and B. Gupta. 2021. Ensemble machine learning approach for classification of IoT devices in smart home. International Journal of Machine Learning and Cybernetics 12(11):3179–3202.
  • Dattatraya, K. N., and K. R. Rao. 2019. Hybrid based cluster head selection for maximizing network lifetime and energy efficiency in WSN. Journal of King Saud University-Computer and Information Sciences 34(3):716-726.
  • Davis, B. D., J. C. Mason, and M. Anwar. 2020. Vulnerability studies and security postures of IoT devices: A smart home case study. IEEE Internet of Things Journal 7 (10):10102–10. doi:10.1109/JIOT.2020.2983983.
  • Dehghani, M., M. Ghiasi, T. Niknam, A. Kavousi-Fard, and S. Padmanaban. 2020. False data injection attack detection based on hilbert-huang transform in AC smart islands. IEEE Access 8:179002–17. doi:10.1109/ACCESS.2020.3027782.
  • Dehghani, M., M. Ghiasi, T. Niknam, A. Kavousi-Fard, E. Tajik, S. Padmanaban, H. Aliev, et al. 2021. Cyber attack detection based on wavelet singular entropy in AC smart islands: false data injection attack. IEEE Access 9:1–1. doi:10.1109/ACCESS.2021.3051300.
  • Ghiasi, M. 2019. Detailed study, multi-objective optimization, and design of an AC-DC smart microgrid with hybrid renewable energy resources. Energy 169:496–507. doi:10.1016/j.energy.2018.12.083.
  • Ghiasi, M., M. Dehghani, T. Niknam, H. R. Baghaee, S. Padmanaban, G. B. Gharehpetian, H. Aliev, et al. 2021a. Resiliency/cost-based optimal design of distribution network to maintain power system stability against physical attacks: A practical study case. IEEE Access 9:43862–75. doi:10.1109/ACCESS.2021.3066419.
  • Ghiasi, M., M. Dehghani, T. Niknam, A. Kavousi-Fard, P. Siano, and H. H. Alhelou. 2021b. Cyber-attack detection and cyber-security enhancement in smart DC-microgrid based on blockchain technology and hilbert huang transform. IEEE Access 9:29429–40. doi:10.1109/ACCESS.2021.3059042.
  • Gope, P., J. Lee, and T. Q. Quek. 2016. Resilience of DoS attacks in designing anonymous user authentication protocol for wireless sensor networks. IEEE Sensors Journal 17 (2):498–503. doi:10.1109/JSEN.2016.2628413.
  • Hu, X., S. Zhou, T. Chen, and M. Ghiasi. 2021. Optimal energy management of a DC power traction system in an urban electric railway network with dogleg method. Energy Sources, Part A: Recovery, Utilization, and Environmental Effects 1–23. doi:10.1080/15567036.2021.1877373.
  • Isyanto, H., A. S. Arifin, and M. Suryanegara, “Design and implementation of IoT-based smart home voice commands for disabled people using Google Assistant,” in 2020 International Conference on Smart Technology and Applications (ICoSTA), Surabaya, Indonesia, 2020, pp. 1–6.
  • Johnson, D. B., and D. A. Maltz. 1996. Dynamic source routing in ad hoc wireless networks. In Mobile computing, 153–81. Boston, MA: Springer.
  • Karl, H., and A. Willig. 2007. Protocols and architectures for wireless sensor networks. John Wiley & Sons. pp. 528.
  • Kavousi-Fard, A., W. Su, and T. Jin. 2021. A machine-learning-based cyber attack detection model for wireless sensor networks in microgrids. IEEE Transactions on Industrial Informatics 17 (1):650–58. doi:10.1109/TII.2020.2964704.
  • Khalifeh, A., K. A. Darabkh, A. M. Khasawneh, I. Alqaisieh, M. Salameh, A. AlAbdala, S. Alrubaye, A. Alassaf, S. Al-HajAli, R. Al-Wardat, et al. 2021. Wireless sensor networks for smart cities: Network design, implementation and performance evaluation. Electronics. 10(2):218. doi:10.3390/electronics10020218.
  • Khlaifi, H., A. Zrelli, and T. Ezzedine, “Routing protocols for A border monitoring application,” in 2019 International Conference on Internet of Things, Embedded Systems and Communications (IINTEC), Tunis, Tunisia, 2019, pp. 1–6.
  • Khudayer, B. H., M. Anbar, S. M. Hanshi, and T.-C. Wan. 2020. Efficient route discovery and link failure detection mechanisms for source routing protocol in mobile ad-hoc networks. IEEE Access 8:24019–32. doi:10.1109/ACCESS.2020.2970279.
  • Kurniawan, A., P. Kristalina, and M. Z. S. Hadi, “Performance analysis of routing protocols AODV, OLSR and DSDV on MANET using NS3,” in 2020 International Electronics Symposium (IES), Surabaya, Indonesia, 2020, pp. 199–206.
  • Li, B., and M. Ghiasi. 2021. A new strategy for economic virtual power plant utilization in electricity market considering energy storage effects and ancillary services. Journal of Electrical Engineering & Technology 16 (6):2863–74. doi:10.1007/s42835-021-00811-8.
  • Mahela, O. P., B. Khan, H. H. Alhelou, and P. Siano. 2020. Power quality assessment and event detection in distribution network with wind energy penetration using stockwell transform and fuzzy clustering. IEEE Transactions on Industrial Informatics 16 (11):6922–32. doi:10.1109/TII.2020.2971709.
  • Manoharan, H., Y. Teekaraman, I. Kirpichnikova, R. Kuppusamy, S. Nikolovski, and H. R. Baghaee. 2020. Smart grid monitoring by wireless sensors using binary logistic regression. Energies 13 (15):3974. doi:10.3390/en13153974.
  • Minoli, D. 2020. Positioning of blockchain mechanisms in IOT-powered smart home systems: A gateway-based approach. Internet of Things 10:100147. doi:10.1016/j.iot.2019.100147.
  • Mlakić, D., H. R. Baghaee, S. Nikolovski, M. Vukobratović, and Z. Balkić. 2019. Conceptual design of IoT-based AMR systems based on IEC 61850 microgrid communication configuration using open-source hardware/software IED. Energies 12 (22):4281. doi:10.3390/en12224281.
  • Mu, J. 2017. An improved AODV routing for the zigbee heterogeneous networks in 5G environment. Ad Hoc Networks 58:13–24. doi:10.1016/j.adhoc.2016.12.002.
  • Perkins, C. E., and P. Bhagwat. 1994. Highly dynamic destination-sequenced distance-vector routing (DSDV) for mobile computers. ACM SIGCOMM Computer Communication Review 24 (4):234–44. doi:10.1145/190809.190336.
  • Perkins, C. E., and E. M. Royer, “Ad-hoc on-demand distance vector routing,” in Proceedings WMCSA’99. Second IEEE Workshop on Mobile Computing Systems and Applications, New Orleans, LA, USA, 1999, pp. 90–100.
  • Qiu, T., J. Liu, W. Si, and D. O. Wu. 2019. Robustness optimization scheme with multi-population co-evolution for scale-free wireless sensor networks. IEEE/ACM Transactions on Networking 27 (3):1028–42. doi:10.1109/TNET.2019.2907243.
  • Saini, T. K., and S. C. Sharma. 2020. Recent advancements, review analysis, and extensions of the AODV with the illustration of the applied concept. Ad Hoc Networks 103:102148. doi:10.1016/j.adhoc.2020.102148.
  • Singh, M., and J. Sharma, “Performance analysis of secure & efficient AODV (SE-AODV) with AODV routing protocol using NS2,” in Proceedings of 3rd International Conference on Reliability, Infocom Technologies and Optimization, Noida, India, 2014, pp. 1–6.
  • Sinwar, D., N. Sharma, S. K. Maakar, and S. Kumar. 2020. Analysis and comparison of ant colony optimization algorithm with DSDV, AODV, and AOMDV based on shortest path in MANET. Journal of Information & Optimization Sciences 41 (2):621–32. doi:10.1080/02522667.2020.1733193.
  • Sokullu, R., M. A. Akkaş, and E. Demir. 2020. IoT supported smart home for the elderly. Internet of Things 11:100239. doi:10.1016/j.iot.2020.100239.
  • Vo, D. T., X. P. Nguyen, T. D. Nguyen, R. Hidayat, T. T. Huynh, and D. T. Nguyen. 2021. A review on the internet of thing (IoT) technologies in controlling ocean environment. Energy Sources, Part A: Recovery, Utilization, and Environmental Effects 1–19. doi:10.1080/15567036.2021.1960932.
  • Wang, K., Y. Wang, X. Hu, Y. Sun, D.-J. Deng, A. Vinel, Y. Zhang, et al. 2017. Wireless big data computing in smart grid. IEEE Wireless Communications. 24(2):58–64. doi:10.1109/MWC.2017.1600256WC.
  • Zrelli, A., H. Khlaifi, and T. Ezzedine, “Performance evaluation of AODV and OAODV for several WSN/IoT applications,” in 2019 International Conference on Software, Telecommunications and Computer Networks (SoftCOM), Split, Croatia, 2019, pp. 1–6.

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.