About the Editors |
|
xiii | |
|
1 Wireless mesh network emulation |
|
|
1 | (20) |
|
|
Augusto Jose Vendncio Neto |
|
|
Christian Esteve Rothenberg |
|
|
|
1 | (1) |
|
1.2 Mininet-WiFi: a primer |
|
|
2 | (3) |
|
1.3 Overview of wireless mesh technologies |
|
|
5 | (5) |
|
|
5 | (1) |
|
1.3.2 Wireless distribution system |
|
|
6 | (1) |
|
|
7 | (1) |
|
1.3.4 IEEE 802.15.4 (6L0WPAN) |
|
|
8 | (1) |
|
|
9 | (1) |
|
1.4 Routing protocols for WMN |
|
|
10 | (5) |
|
|
10 | (1) |
|
|
11 | (1) |
|
|
12 | (1) |
|
|
12 | (1) |
|
|
13 | (2) |
|
1.5 Experimental use cases |
|
|
15 | (2) |
|
1.5.1 A realistic vehicular experimentation |
|
|
15 | (1) |
|
1.5.2 Unmanned aerial vehicles |
|
|
16 | (1) |
|
|
17 | (4) |
|
|
17 | (4) |
|
2 A sink-oriented routing protocol for blue light link-based mesh network |
|
|
21 | (12) |
|
|
|
|
|
21 | (1) |
|
|
22 | (2) |
|
2.3 Sink-oriented routing protocol |
|
|
24 | (1) |
|
2.3.1 Receive message (RMS) packet |
|
|
24 | (1) |
|
2.4 Topology construction (downlink) |
|
|
25 | (1) |
|
2.5 Data collection -- request (downlink) |
|
|
26 | (1) |
|
2.6 Data collection -- response (uplink) |
|
|
27 | (1) |
|
|
27 | (1) |
|
2.7.1 Network topology reconstruction |
|
|
27 | (1) |
|
2.7.2 Sensing of BLE devices in the neighborhood |
|
|
28 | (1) |
|
|
28 | (5) |
|
|
28 | (1) |
|
|
28 | (5) |
|
3 Body sensor networks---recent advances and challenges |
|
|
33 | (34) |
|
|
|
|
|
33 | (2) |
|
|
35 | (4) |
|
3.2.1 Medical applications |
|
|
35 | (3) |
|
3.2.2 Nonmedical applications |
|
|
38 | (1) |
|
3.3 Body sensor networks---overview and components |
|
|
39 | (4) |
|
|
39 | (1) |
|
|
40 | (3) |
|
|
43 | (9) |
|
3.4.1 Intra-BSN communication |
|
|
43 | (5) |
|
3.4.2 Inter-BSN communication |
|
|
48 | (1) |
|
3.4.3 Beyond-BSN communication |
|
|
49 | (2) |
|
3.4.4 BSN network topologies |
|
|
51 | (1) |
|
|
52 | (7) |
|
|
53 | (1) |
|
3.5.2 Medium access control layer |
|
|
54 | (2) |
|
|
56 | (1) |
|
|
57 | (2) |
|
3.6 Security threats and solutions for BSN |
|
|
59 | (2) |
|
3.6.1 Active security threats for BSN |
|
|
59 | (1) |
|
3.6.2 Passive security threats for BSN |
|
|
60 | (1) |
|
|
60 | (1) |
|
3.7 Opportunities and open research directions |
|
|
61 | (3) |
|
|
64 | (3) |
|
|
64 | (3) |
|
4 Seamless IoT mobile sensing through Wi-Fi mesh networking |
|
|
67 | (14) |
|
|
|
|
|
|
67 | (1) |
|
|
68 | (3) |
|
4.2.1 IEEE 802.1 Is basics |
|
|
68 | (1) |
|
4.2.2 IEEE 802.11s routing algorithm |
|
|
69 | (1) |
|
|
69 | (2) |
|
4.3 Mesh network implementation |
|
|
71 | (5) |
|
4.3.1 Proposed mesh backbone network |
|
|
72 | (4) |
|
4.4 Conclusions and application scenarios |
|
|
76 | (5) |
|
|
78 | (1) |
|
|
78 | (3) |
|
5 Software-defined radio for wireless mesh networks |
|
|
81 | (24) |
|
|
|
|
|
81 | (2) |
|
5.2 Challenges for the wireless mesh networks |
|
|
83 | (2) |
|
|
83 | (1) |
|
5.2.2 Experiment of WMN communications |
|
|
84 | (1) |
|
5.2.3 Rigid implementation of standards |
|
|
84 | (1) |
|
5.2.4 Scarcity of spectrum |
|
|
84 | (1) |
|
5.3 Software-defined radio (SDR) |
|
|
85 | (4) |
|
|
85 | (4) |
|
5.4 Performances analysis of SDR platform |
|
|
89 | (5) |
|
5.4.1 Analysis of USRP boards driven by GNU Radio |
|
|
91 | (3) |
|
5.5 SDR for IEEE 802.15.4e |
|
|
94 | (2) |
|
5.5.1 Dynamic spectrum access |
|
|
95 | (1) |
|
|
96 | (3) |
|
5.6.1 Non-orthogonal multiple access |
|
|
97 | (2) |
|
|
99 | (6) |
|
|
100 | (5) |
|
6 Backpressure and FlashLinQ-based algorithms for multi-hop flying ad-hoc networks |
|
|
105 | (16) |
|
|
|
|
|
105 | (2) |
|
|
107 | (2) |
|
|
107 | (2) |
|
|
109 | (1) |
|
6.3 The proposed algorithms |
|
|
109 | (5) |
|
6.3.1 Trajectory-based joint backpressure and FlashLinQ |
|
|
110 | (3) |
|
6.3.2 Predictive trajectory-based joint backpressure and FlashLinQ |
|
|
113 | (1) |
|
6.4 The benchmark solution |
|
|
114 | (1) |
|
6.5 Numerical results and discussions |
|
|
115 | (3) |
|
|
115 | (1) |
|
6.5.2 Comparing protocols |
|
|
115 | (3) |
|
|
118 | (3) |
|
|
119 | (2) |
|
7 Unmanned aerial vehicle relay networks |
|
|
121 | (20) |
|
|
|
121 | (2) |
|
|
123 | (2) |
|
|
123 | (1) |
|
7.2.2 Pre-defined mission paths |
|
|
124 | (1) |
|
7.3 Path planning for UAV relay networks |
|
|
125 | (4) |
|
7.3.1 Relay positioning and assignment algorithm |
|
|
125 | (4) |
|
7.3.2 Illustration of different PMST methods |
|
|
129 | (1) |
|
7.4 Results and discussions |
|
|
129 | (8) |
|
7.4.1 Percentage connected time |
|
|
131 | (1) |
|
7.4.2 Required number of relays |
|
|
131 | (4) |
|
7.4.3 Average relay node velocity |
|
|
135 | (2) |
|
|
137 | (4) |
|
|
138 | (3) |
|
8 Multimedia content delivery in wireless mesh networking |
|
|
141 | (32) |
|
|
|
|
141 | (1) |
|
8.2 Multimedia content delivery and quality evaluation |
|
|
142 | (2) |
|
|
142 | (1) |
|
8.2.2 Quality of service requirements |
|
|
142 | (2) |
|
8.3 Video content delivery quality measurement |
|
|
144 | (3) |
|
8.3.1 Subjective and objective quality assessment |
|
|
144 | (3) |
|
8.4 Energy consumption issues during content delivery |
|
|
147 | (2) |
|
8.5 Protocols, schemes, and algorithms |
|
|
149 | (1) |
|
8.5.1 Transport layer protocols |
|
|
149 | (1) |
|
|
150 | (4) |
|
8.6.1 QoS-related wireless mesh MAC-layer schemes |
|
|
150 | (3) |
|
8.6.2 Energy-related wireless mesh MAC-layer schemes |
|
|
153 | (1) |
|
8.7 Routing protocols and algorithms |
|
|
154 | (5) |
|
|
154 | (3) |
|
|
157 | (1) |
|
8.7.3 Routing mechanisms in wireless mesh networks |
|
|
158 | (1) |
|
8.8 Multimedia content delivery services |
|
|
159 | (3) |
|
|
159 | (1) |
|
|
160 | (2) |
|
8.9 Research-related works |
|
|
162 | (2) |
|
8.10 Industrial solutions and products |
|
|
164 | (2) |
|
8.11 Challenging multimedia content |
|
|
166 | (7) |
|
|
166 | (1) |
|
8.11.2 VR, AR, 360-degree videos, and mulsemedia content |
|
|
166 | (2) |
|
|
168 | (5) |
|
9 Toward intelligent extraction of relevant information by adaptive fuzzy agents in big data and multi-sensor environments |
|
|
173 | (16) |
|
|
|
|
|
|
173 | (4) |
|
|
177 | (5) |
|
9.2.1 The fuzzy agent approach |
|
|
177 | (3) |
|
9.2.2 The limits of the previous work |
|
|
180 | (2) |
|
9.3 Toward a learning fuzzy agent approach for relevant data extraction in big data and multi-sensor environments |
|
|
182 | (2) |
|
9.3.1 An overview of the novel approach |
|
|
182 | (2) |
|
|
184 | (5) |
|
|
186 | (3) |
|
10 Artificial intelligence-aided resource sharing for wireless mesh networks |
|
|
189 | (36) |
|
|
|
|
|
189 | (1) |
|
10.2 ML-assisted resource sharing |
|
|
190 | (18) |
|
10.2.1 ML for resource sharing in WMN |
|
|
192 | (1) |
|
10.2.2 Supervised learning |
|
|
193 | (6) |
|
10.2.3 Unsupervised learning |
|
|
199 | (4) |
|
10.2.4 Reinforcement learning |
|
|
203 | (5) |
|
10.3 DL-assisted resource sharing |
|
|
208 | (4) |
|
|
208 | (2) |
|
|
210 | (1) |
|
10.3.3 Graph neural network |
|
|
211 | (1) |
|
10.4 Distributed intelligence-assisted resource sharing |
|
|
212 | (10) |
|
10.4.1 Federated learning |
|
|
213 | (3) |
|
10.4.2 Collective awareness |
|
|
216 | (1) |
|
10.4.3 Game-theoretic approach |
|
|
217 | (5) |
|
|
222 | (3) |
|
|
223 | (2) |
|
11 Boosting machine learning mechanisms in wireless mesh networks through quantum computing |
|
|
225 | (22) |
|
|
|
|
|
|
|
225 | (2) |
|
11.2 The role of ML in WMNs |
|
|
227 | (4) |
|
11.2.1 Supervised learning |
|
|
227 | (1) |
|
11.2.2 Unsupervised learning |
|
|
228 | (1) |
|
11.2.3 Reinforcement learning |
|
|
229 | (1) |
|
|
229 | (1) |
|
|
230 | (1) |
|
11.2.6 Open issues in the application of ML for WMNs |
|
|
230 | (1) |
|
11.3 Quantum computing: background and QML |
|
|
231 | (4) |
|
11.3.1 Superposition principle |
|
|
231 | (1) |
|
11.3.2 Quantum measurement |
|
|
231 | (1) |
|
11.3.3 No-cloning theorem |
|
|
232 | (1) |
|
|
232 | (1) |
|
|
233 | (1) |
|
|
234 | (1) |
|
11.4 Introduction of QML in WMNs: design principles and research challenges |
|
|
235 | (8) |
|
11.4.1 Centralized architecture |
|
|
235 | (4) |
|
11.4.2 Distributed architecture |
|
|
239 | (4) |
|
|
243 | (4) |
|
|
243 | (4) |
|
12 Game theoretical-based task allocation in malicious cognitive Internet of Things |
|
|
247 | (18) |
|
|
|
|
|
|
247 | (2) |
|
|
249 | (1) |
|
|
250 | (1) |
|
12.4 The task allocation strategy |
|
|
251 | (7) |
|
12.4.1 Spectrum sensing in malicious cognitive IoT |
|
|
251 | (5) |
|
12.4.2 Cluster node bidding |
|
|
256 | (2) |
|
|
258 | (4) |
|
|
262 | (3) |
|
|
262 | (3) |
|
13 Conclusions and future perspectives |
|
|
265 | (2) |
|
|
Index |
|
267 | |