State of the art and research challenges for USN traffic flow models

The traffic flow model was one of the most important investigation topic for any networks during them evolution. The traffic flow model understanding was changes from network to network, from service to service. The USN traffic flow models are in the focus of this paper. The telemetry, image and medical USN applications traffic flow models are investigated. The self-similarity features are determined. The practical benefits of obtained results are considered. The traffic flow type impact to the USN life-time in the different intrusion conditions is proved.

[1]  N.E. Baughman,et al.  Cheat-Proof Playout for Centralized and Peer-to-Peer Gaming , 2007, IEEE/ACM Transactions on Networking.

[2]  Ashok Jhunjhunwala,et al.  User scenarios 2020: a worldwide wireless future , 2009 .

[3]  Walid Osamy,et al.  Adaptive and Efficient Compressive Sensing based Technique for Routing in Wireless Sensor Networks , 2013 .

[4]  Walter Willinger,et al.  Self-similarity through high-variability: statistical analysis of Ethernet LAN traffic at the source level , 1997, TNET.

[5]  Andrey Koucheryavy,et al.  Ubiquitous Sensor Networks Traffic Models for Medical and Tracking Applications , 2012, NEW2AN.

[6]  Marco Mellia,et al.  Communication Networks Measurement of IPTV traffic from an operative network , 2010, Eur. Trans. Telecommun..

[7]  Antonio Iera,et al.  The Internet of things , 2010 .

[8]  Andrey Koucheryavy,et al.  The Video Streaming Monitoring in the Next Generation Networks , 2009, NEW2AN.

[9]  Udo R. Krieger,et al.  Statistical Analysis and Modeling of Peer-to-Peer Multimedia Traffic , 2011, Network Performance Engineering.

[10]  Andrey Koucheryavy,et al.  The mixed telemetry/image USN in the overload conditions , 2014, 16th International Conference on Advanced Communication Technology.

[11]  Shensheng Tang,et al.  An analytical traffic flow model for cluster-based wireless sensor networks , 2006, 2006 1st International Symposium on Wireless Pervasive Computing.

[12]  Walid Osamy,et al.  Efficient Compressive Sensing based Technique for Routing in Wireless Sensor Networks , 2015 .

[13]  Azer Bestavros,et al.  Self-similarity in World Wide Web traffic: evidence and possible causes , 1996, SIGMETRICS '96.

[14]  Olga Galinina,et al.  Energy-Efficient Client Relay Scheme for Machine-to-Machine Communication , 2011, 2011 IEEE Global Telecommunications Conference - GLOBECOM 2011.

[15]  Andrey Koucheryavy,et al.  Prediction-based clustering algorithm for mobile wireless sensor networks , 2010, 2010 The 12th International Conference on Advanced Communication Technology (ICACT).

[16]  Oleg I. Sheluhin,et al.  Self-Similar Processes in Telecommunications , 2007 .

[17]  Tingting Zhang,et al.  Source traffic modeling in wireless sensor networks for target tracking , 2008, PE-WASUN '08.

[18]  Ian F. Akyildiz,et al.  Spatial Correlation and Mobility Aware Traffic Modeling for Wireless Sensor Networks , 2009, GLOBECOM 2009.

[19]  Rituparna Chaki,et al.  A Survey of Recent Intrusion Detection Systems for Wireless Sensor Network , 2011, ArXiv.

[20]  Sugata Sanyal,et al.  Sleep Deprivation Attack Detection in Wireless Sensor Network , 2012, ArXiv.

[21]  Sugata Sanyal,et al.  Sleep Deprivation Attack Detection in Wireless Sensor Network , 2012 .

[22]  Toni Janevski,et al.  Statistical Analysis of Multicast versus Instant Channel Changing Unicast IPTV Provisioning , 2008 .

[23]  Ossama Younis,et al.  Distributed clustering in ad-hoc sensor networks: a hybrid, energy-efficient approach , 2004, IEEE INFOCOM 2004.

[24]  I. Norros,et al.  The management of large flows of connectionless traffic on the basis of self-similar modeling , 1995, Proceedings IEEE International Conference on Communications ICC '95.

[25]  Villy Bæk Iversen,et al.  Teletraffic engineering and network planning , 2015 .

[26]  Parag Pruthi,et al.  Modeling and Evaluation of Network Applications and Services , 1999 .

[27]  Felix Wortmann,et al.  Internet of Things , 2015, Business & Information Systems Engineering.

[28]  Jean-Baptiste Waldner,et al.  Nanocomputers and swarm intelligence , 2008 .

[29]  Andrey Koucheryavy,et al.  Ubiquitous Sensor Networks Traffic Models for Image Applications , 2013 .

[30]  Dario Rossi,et al.  Experiences of VoIP traffic monitoring in a commercial ISP , 2010, Int. J. Netw. Manag..

[31]  Azer Bestavros,et al.  Self-similarity in World Wide Web traffic: evidence and possible causes , 1997, TNET.

[32]  Andrey Koucheryavy,et al.  The Mobile Sensor Network Life-Time under Different Spurious Flows Intrusion , 2013, NEW2AN.

[33]  Yixin Zhu,et al.  Throughput and buffer analysis for GSM General Packet Radio Service (GPRS) , 1999, WCNC. 1999 IEEE Wireless Communications and Networking Conference (Cat. No.99TH8466).

[34]  Andrey Koucheryavy,et al.  Ubiquitous Sensor Networks Traffic Models for Telemetry Applications , 2011, NEW2AN.