4.7 Article

DTN Trustworthiness for Permafrost Telemetry IoT Network

Journal

REMOTE SENSING
Volume 13, Issue 22, Pages -

Publisher

MDPI
DOI: 10.3390/rs13224493

Keywords

transport protocols; trustworthiness; Antarctica; IoT; NVIS; remote WSN; LFN

Funding

  1. Secretaria d'Universitats i Recerca del Departament d'Empresa i Coneixement de la Generalitat de Catalunya
  2. European Union (EU)
  3. European Social Fund (ESF) [2021 FI_B1 00175]
  4. Agencia de Gestio d'Ajuts Universitaris i de Recerca (AGAUR) of Generalitat de Catalunya [2017 SGR 977]
  5. Spanish Ministry on Science, Innovation and University
  6. European Regional Development Fund (ERDF) [RTI2018-097066-B-I00]
  7. Investigation State Agency

Ask authors/readers for more resources

The SHETLAND-NET research project aims to automate data collection in Antarctica using challenging networks and delay tolerant networking technology. Through simulations, different transport protocols are evaluated to improve the reliability of the service.
The SHETLAND-NET research project aims to build an Internet of Things (IoT) telemetry service in Antarctica to automatize the data collection of permafrost research studies on interconnecting remote wireless sensor networks (WSNs) through near vertical incidence skywave (NVIS) long fat networks (LFN). The proposed architecture presents some properties from challenging networks that require the use of delay tolerant networking (DTN) opportunistic techniques that send the collected data during the night as a bulk data transfer whenever a link comes available. This process might result in network congestion and packet loss. This is a complex architecture that demands a thorough assessment of the solution's viability and an analysis of the transport protocols in order to find the option which best suits the use case to achieve superior trustworthiness in network congestion situations. A heterogeneous layer-based model is used to measure and improve the trustworthiness of the service. The scenario and different transport protocols are modeled to be compared, and the system's trustworthiness is assessed through simulations.

Authors

I am an author on this paper
Click your name to claim this paper and add it to your profile.

Reviews

Primary Rating

4.7
Not enough ratings

Secondary Ratings

Novelty
-
Significance
-
Scientific rigor
-
Rate this paper

Recommended

No Data Available
No Data Available