jsan-10-00030
jsan-10-00030
jsan-10-00030
net/publication/351076819
A Highly Effective Route for Real-Time Traffic Using an IoT Smart Algorithm
for Tele-Surgery Using 5G Networks
CITATIONS READS
19 130
3 authors, including:
All content following this page was uploaded by Ahmad Samed Al-Adwan on 30 April 2021.
Article
A Highly Effective Route for Real-Time Traffic Using an IoT
Smart Algorithm for Tele-Surgery Using 5G Networks
Radwan S. Abujassar 1, *,† , Husam Yaseen 2,† and Ahmad Samed Al-Adwan 2,†
Abstract: Nowadays, networks use many different paths to exchange data. However, our research
will construct a reliable path in the networks among a huge number of nodes for use in tele-surgery
using medical applications such as healthcare tracking applications, including tele-surgery which
lead to optimizing medical quality of service (m-QoS) during the COVID-19 situation. Many people
could not travel due to the current issues, for fear of spreading the covid-19 virus. Therefore, our
paper will provide a very trusted and reliable method of communication between a doctor and
his patient so that the latter can do his operation even from a far distance. The communication
between the doctor and his/her patient will be monitored by our proposed algorithm to make sure
that the data will be received without delay. We test how we can invest buffer space that can be
used efficiently to reduce delays between source and destination, avoiding loss of high-priority data
packets. The results are presented in three stages. First, we show how to obtain the greatest possible
Citation: Abujassar, R.S.; Yaseen, H.;
reduction in rate variability when the surgeon begins an operation using live streaming. Second, the
Al-Adwa, A.S. A Highly Effective
proposed algorithm reduces congestion on the determined path used for the online surgery. Third,
Route for Real-Time Traffic Using an
IoT Smart Algorithm for Tele-Surgery
we have evaluated the affection of optimal smoothing algorithm on the network parameters such as
Using 5G Networks. J. Sens. Actuator peak-to-mean ratio and delay to optimize m-QoS. We propose a new Smart-Rout Control algorithm
Netw. 2021, 10, 30. https://doi.org/ (s-RCA) for creating a virtual smart path between source and destination to transfer the required
10.3390/jsan10020030 data traffic between them, considering the number of hops and link delay. This provides a reliable
connection that can be used in healthcare surgery to guarantee that all instructions are received
Academic Editors: Antonio Coronato without any delay, to be executed instantly. This idea can improve m-QoS in distance surgery, with
and Thomas Newe trusted paths. The new s-RCA can be adapted with an existing routing protocol to track the primary
path and monitor emergency packets received in node buffers, for direct forwarding via the demand
Received: 20 January 2021
path, with extended features.
Accepted: 14 April 2021
Published: 22 April 2021
Keywords: component; quality of service (QoS); buffer optimization; internet of things (IoT); medical
surgery; smart-route control algorithm (s-RCA)
Publisher’s Note: MDPI stays neutral
with regard to jurisdictional claims in
published maps and institutional affil-
iations.
1. Introduction
Recently, the ICT-based healthcare gave rise to improved concepts of applying medicine
and clinical surgery services remotely using telecommunications, named tele-medicine.
Copyright: © 2021 by the authors.
Tele-medicine is letting healthcare professionals remotely inspect patients and access health
Licensee MDPI, Basel, Switzerland.
information through telecommunication links or applications. Tele-medicine offers more
This article is an open access article
flexibility for remote service users in rural and isolated areas with limited medical facilities
distributed under the terms and and resources. Specialist healthcare professionals (HPs) can diagnose and consult patients
conditions of the Creative Commons remotely, with the help and monitoring of the local medical personnel who administer to
Attribution (CC BY) license (https:// the patients directly. The main enabler of tele-medicine is the telecommunication link and
creativecommons.org/licenses/by/ associated technological platform, in terms of mobile communication and video confer-
4.0/). encing. The near-ubiquitous availability of the Internet in recent years had broadened the
New devices, such as smartphones, improved routers and PCs, have created a paradigm
shift in the potentialities of healthcare services delivery, commensurate with the develop-
ment of the IoT, and associated smart urban technology. IoT can be explained as a set of
interconnected things (humans, tags, sensors, security, policies, etc.) over the IP, with the
capability to compute and communicate between users. The main idea behind the IoT is to
J. Sens. Actuator Netw. 2021, 10, 30 3 of 17
gain information about our lifestyle so as to understand, control and act on it. The IoT can
aid us in our daily lives [1,3]; Furthermore, IoT is suitable for smart units for ambient-assisted
living. IoT technologies facilitate convenient, on-demand, and scale-network access to a
pool of configurable computing resources [3–5]. Healthcare services always face challenges,
including sporadic epidemics and natural disasters, and IoT can play an important role in
emergency response. During the 2020 Covid-19 virus, the global communications and health
data transmission have been central in government and healthcare policy responses, coordi-
nating available medical resources and providing reliable, effective, and smart health-care
services to patients.
This proposed technique introduces an analytic to enable HPs to compute their per-
formance versus hospital interaction quality with their standard measures. IoT healthcare
services face some challenges, including that many different diseases can appeared at any
time, such as COVID-19. The proposed approach does not focus on scenarios involving
the suitability or limitations of the IoT and MANET or interior gateway protocol (IGP);
rather, our aim is to offer a practical vision through which to integrate current components
of IoT with some routing protocols and the IoT Smart-Rout Control algorithm (s-RCA) [6].
Thus, we have surveyed different network technologies, seeking improvements.
Software for embedded devices are a key challenge in the pursuit of the desired
integration. For the deployment, management, and monitoring of different platforms,
we have surveyed network infrastructures. Lastly, we have several IoT middleware’s to
extract IoT devices with underlying heterogeneity. IoT integration provides new storage,
processing, scaleability, and networking capabilities which are currently limited on the IoT
due to fundamental characteristics [1]. Given the trend towards ubiquitous computing,
everything is moving towards being connected to the Internet, with its data to be used for
different progressive and emerging functions [3,4].
There are five key elements of the future of the Internet-processing paradigm: future
Internet, cloud-housing, IoT services, data processing, and applications. These elements
will affect different applications, such as healthcare services in general, and tele-surgery
applications in particular. The elements differ in terms of required technologies, data repre-
sentation, and standards. A new paradigm, called Health-IoT, has proposed the integration
of tele-surgery and IoT to provide the interaction among network elements [7]. There is
currently a push to integrate IoT with all new technology because of the huge amount of
data that the IoT generates, and the demand to balance permissions for virtual links and
resources with utilization and storage capacity, as well as to derive more usefulness from
the data generated by the IoT and develop smart applications for end users [4,5].
The integration in healthcare systems and the routing protocol used in the network
layer is the core area of concern of this paper, pertaining to the integration of healthcare
services with the IoT-Healthcare system. With the purpose of integration, we provide
some relations and analysis on IoT by highlighting their benefits and uses in combination.
There is a lack of literature exploring the emergent and novel area of IoT-Health, but urgent
need for associated practical applications, with the ever-expanding number of elderly and
disabled people worldwide. There is pressing demand for a real-time health-monitoring
infrastructure to analyze patient healthcare data and avoid preventable deaths. Healthcare
Industrial IoT (Health-IoT) has significant potential for the realization of such monitoring
goals, and facilitating surgery with less effort and more resource efficiency for emergency
cases, to improve m-QoS and healthcare system efficiency. Exploiting advances in IoT tech-
nologies in developing healthcare applications is an important field of research. Specifically,
the main objectives and contributions of this paper are as follows:
• Novel promising solutions to improve surgery and the role of healthcare systems
from abroad.
• A new vision and motivation for the integration of cloud computing network services
with the existing routing protocol and IoT in healthcare systems.
• Recent research topics and challenges in the integrated scenario of IoT for health-
care applications.
J. Sens. Actuator Netw. 2021, 10, 30 4 of 17
healthcare, remote health monitoring, fitness competence programs, chronic disease treat-
ment, and care for senior citizens. IoT depends on various sensors, medical devices,
imaging devices, and diagnostic smart objects or devices (i.e., tools). All of these can be
facilitated using robotics, receiving instructions directly from the supervisor (e.g., HP).
These instructions should be directly received without any delay to avoid any problems for
patients. All users can use the features of the IoT as they can expect to have a high-quality
treatment with a low budget and better quality of life. Health records are constructed using
vital methods like gateways, medicine-aided servers, and databases that include health
content. Stringent legal protections apply to stakeholder delivery of on-demand health
services, with data stored in the cloud being considered as provision of infrastructure as a
service (IaaS) [6]. Health-related measurements are temporally mined and are transferred
to the medical diagnosis system, where the patient health index is calculated, and a diag-
nosis mechanism is applied to determine disease severity. CC can be integrated with an
IoT-based healthcare monitoring framework, including medical publication data, practical
experience, and advisory inputs [8].
Figure 2 discusses and shows how grid computing gathers an expansive quantity
of sensor data such as blood pressure (BP), body temperature, electrocardiogram (ECG),
oxygen saturation, and vital signs information to form an IoT-Net topology. Sensors and
movable medical devices are affixed to the patient’s body, which aids monitoring of vital
signs and other indicators, contributing to the data cache, which HPs can use to monitor
patient condition and give medical advice. This network can keep streaming UDP videos
via an interconnected network using Internet protocol (IP) network or global system for a
mobile (GSM) network [2,9].
logical innovation and the continuous growth in the market for smartphones. In a study
conducted in China, the authors showed that the Internet doubles its size every 5.32 years [12].
As such, it is obvious that the number of devices that are online and communicating with each
other (M2M) will be exponentially increasing over the coming years, which underlines the
need to have secure communication in this context [13]. Currently, IoT is a prominent topic
in research applied to create smart cities. Given the thriving nature of research in this field,
both in academia and industry, this technology is set to revolutionize the way we do many
things. Figure 2 shows how the IoT is starting to be used in smart cities and also around the
world. The IoT model involves a three-layered structure defined by its functions, consisting
of a perception layer, a network layer, and an application layer [14], as explained below:
* Perception layer: The sense organ of the IoT, aiming to recognize objects and gather
information. This layer includes RFID tags, 2D bar code labels and readers, terminals,
GPS, cameras, sensors, and sensor networks.
* Network layer: This layer represents the nucleus of the IoT. It processes and governs
the transmission of the data packets until it received from the perception layer to the
application layer.
* Application layer: this layer is a fusion of the IoT’s socio-business requirements in
order to realize the in-depth capabilities of the technology. Many researchers have
worked to enhance a proper vision of the IoT by making it easy for the end-users to
interact with the available software [15].
5. Related Works
IoT was initially proposed by Kevin Ashton in 1998, and it was quickly recognized as
the future of the Internet and ubiquitous computing [3]. This technological revolution rep-
resents the future of connectivity and reach from anywhere in the world. The eponymous
‘things’ in the IoT comprise any object on the face of the planet, whether it is a communi-
cating device or not, which is integrated with the Internet, from a smart device to a leaf
node of a tree, or a beverage bottle; anything can potentially be part of the Internet [16],
and connected objects can communicate via nodes over the platform.
The author in [17] discusses the IoT, which is a game changer by providing connectivity
among smart devices equipped with sensors and actuators to make connected intelligence
a reality. He indicated the modern technology and how the human will interact with the
modern interfaces for various IoT applications. He proposed a new framework and system
that can be able to control all HW objects in the home as he used a cloud computing server
to control from abroad. However, in [18] the author has proposed the Fuzzy weighted
sum model as it can be used to model the problem of parent selection into multi-attribute
decision-making-based problem. The author was showing that the Routing metrics used the
buffer occupancy, expected transmission count and routing metric (RtMetric). The objective
function selects, the parent based on the combination of these routing metrics. The proposed
algorithm’s dynamic nature can identify the congestion and then selects the non-congested
path by selecting the best parent and thus creates the best routing path for the packets.
In [19], the author proposes an efficient and survivable software-based TE model over SDN
called EFSUTE to increase reliability in real-time IEs. EFSUTE leverages the capabilities
of SDN to compute and install two disjoint paths between any source–destination pair in
the network. EFSUTE model routing is a Shared Risk Link Group problem that provides
topological diversity. Smart communication and IoT sensors produce data that needs to be
analyzed in real-time, using deep studying and learning approaches, or we can use them to
train deep learning for smart models. Edge computing is a viable way to facilitate good and
better computation, given the low-latency requirements of edge devices, as well as offering
additional advantages in terms of privacy, bandwidth efficiency, and scalability.
The author in [20] has shown an important aim, which is to provide a comprehensive
review of the current state of edge computing with the use of smart end devices. In addi-
tion, the author has presented an overview of applications where deep learning technology
is used at the network edge, discussing different methodologies for quickly executing deep
J. Sens. Actuator Netw. 2021, 10, 30 7 of 17
learning inference across a combination of end devices, edge servers, and the cloud, and de-
scribing methods for training deep learning models across multiple edge devices [21].
In [22], the author mentioned the risk methodology for the medical information system.
However, there are many regulations that should be implemented to minimize the risk in
the medical healthcare system. The proposed approaches were implemented by manufac-
turers, typically aims at obtaining qualitative risk assessment results. The author proposed
a methodology for the Dynamic Probabilistic Risk Assessment of Medical Information
Systems, by specifically checking at medical devices that are intended as one of the most
relevant and trusted components in such systems. The methodology complies with ISO
14971 and improves current practices because it allows the analyst to conduct a quantitative
analysis, also taking into account the temporal dimension. It relies on a Probabilistic Risk
Model, defined as a set of Markov Models, which is model-checked to obtain quantitative
information about the risks. The proposed methodology is also working for adopted
and improve definitively the Medical Device post-market surveillance, which is currently
implemented as a “wait for an incident” activity. In other words, currently a manufacturer
sets up a service that has to “react” to an incident by starting an investigation activity.
Hence, our proposed idea was focused on how to guarantee that the path will be available
for only the labeled packets to avoid delay. In addition, for the node who is going to be
selected by our mechanism the proposed algorithm tries to check the node failure history
to decide whether will be on the path or not.
Healthcare applications using the IoT have rapidly increased in number and started
to be widely used by a diverse range of end-users, commensurate with the scale of rapid
development in smart devices. IoT devices are employed in remote health monitoring and
emergency notification systems. In healthcare, monitoring devices are vital, and range
from blood pressure and heart rate monitors to advanced devices capable of monitor-
ing specialized implants such as pacemakers, Fit-Bit electronics, risk bands, or advanced
hearing aids. The IoT uses the Internet to enable the transmission of real-time data con-
cerning critical patient parameters. In the case of a substantial change in these critical
parameters, an emergency alert is sent. This phenomenon has been the focus of initial
IoT-based healthcare research efforts. Integrity makes sure that received video data are not
disconnected or distorted while in transit. The IoT is based on data exchanges between
various kinds of devices such as IGP or MANET networks. It is important to ensure data
accuracy by using a virtual path with a high-priority label when the data are received from
the right sender, as well as to determine whether the data have been tampered during the
process of transmission. Experimental investigations have found that the reliability and
performance of investigated clouds can be beneath expectations, and some authors [23]
concluded that CC is inadequate and inefficient for comprehensive scientific computation,
although it can be utilized in cases of dire need and adaptation, based on temporary and
immediate resources. In any case, further improvements are needed across the board to
facilitate the emergence of highly functional e-health services. Therefore, the enhancement
of existing clouds concerned with computer networks and the identification of a novel
research direction concerning tele-surgery is analyzed in the present study. Future work can
extend this work by implementing other cloud services, such as a database, private cloud,
queue service, and storage.
The network layer of the IoT offers functionality in terms of real-time traffic data rout-
ing and transmissions to different IoT hubs or devices over the IGP or MANET. Internet
gateways, switching, and routing devices, among others, operate with the application of the
most recent technologies such as WiFi, LTE, Bluetooth, 3G, ZigBee, OSPF, and OSLR AODV
in order to provide heterogeneous network services at this layer. The network gateways
serve as mediators between different IoT nodes, by aggregating, filtering, and transmitting
data to and from different sensors [9,24]. The research also discusses different challenges
related to network efficiency and performance as well as technologies. The reader will
take away the following concepts such as: aware of the network scenarios where deep
learning at the network edge can be useful; find common techniques for speeding up deep
J. Sens. Actuator Netw. 2021, 10, 30 8 of 17
6. Problem Definition
Network data transfer from source to the final destination can face many problems,
such as delay, congestion, loss, or jitters. The Internet had grown through successive
generations, most recently with 5G, with greatly increased network speed. Seizing the
opportunities offered by modern Internet technologies, industrial innovations have en-
abled consumers to integrate the Internet into many areas of their lives. Healthcare is
one of the most important areas in which smart technologies can play a major role, but e-
health solutions have been relatively slow to emerge compared to leisure and e-commerce
consumer applications. Nevertheless, many advanced technological solutions have been
developed, including tele-surgery, enabling operations to be remotely directed (including
in international contexts), reducing healthcare costs and increasing accessibility, and gal-
vanizing emergency care potential. Technological challenges for such solutions pertain to
the instructions (data packets) that need to be received between HPs and smart machines,
which execute these instructions accurately and without any delay. The IoT machine
must deal with these instructions with a high-acknowledgment response, and send a
notification that the mission has been successfully executed, notifying the HP of this in-
stantly. Hence, we consider the data to be sent and received is real-time traffic, requiring a
high-performance and reliable live streaming connection with no likelihood of session in-
terruption between the source and destination for emergency situations such as performing
surgery via live video streaming (e.g., a potential problem is that traffic paths may not work
effectively due to congestion in the network). We focus on the node buffers and algorithm
labeling of high-priority traffic, to avoid loss of emergency packets during connections and
to avoid delay if the buffer for each node on the selected path has any packets, by making
our s-RCA drop any packet not accorded emergency status.
Figure 3 shows how IoT is used in all devices based on network instructions. It shows
the relationship between the CC and all devices that can be used for the connections
or transmission of the data. In addition, all devices can be smart, to optimally achieve
targets. Our algorithm will help the existing routing protocol, and even the hardware
devices, to improve the connections and lead to success in the mission between HP and
patients, with less effort. However, the disadvantage of our algorithm is that it is required
to drop many other packets and keep the selected node booked until the session is expired
between HP and patients. In addition, the algorithm will take some time to determine the
highest quality path based on link-state information, which is provided by the existing
protocol. Once the operation has been done, then all nodes are free to be used normally by
other users.
J. Sens. Actuator Netw. 2021, 10, 30 9 of 17
there is another full path that can be used for the traffic which needs to be passed to
other destinations without affecting the QoS network.
• The path mutual relation check, which determines if paths lack common spans but
have common nodes other than end nodes, and whether the paths are mutually and
fully disjointed.
Start
Prepare the path with inform the node to receive only the label packets open Session
False
True
Find second adjacent
Keep it ready to send
Figure 4 presents an s-RCA algorithm to detect and determine the required path
to open the session between HP and patients during the surgery. The s-RCA algorithm
identifies the path with the lowest congestion, which is usually the shortest path, but once
we book the lowest congestion path and keep it ready for the emergency traffic then the
delay will not be very significant, as revealed in our results. The s-RCA algorithm uses
LSDB for each node, to make sure nodes are capable to be used during the session without
any undue disturbance or noise. This is based on the history of each node by relying on the
information from Link State DataBase (LSDB) in the routing protocol and the fault tolerance
capacity, provided by the routing protocol, such as OSPF or link state. As displayed in
Figure 4, the algorithm starts to work before the HP opens the session between the sender
and the destination, because the algorithm takes time to provide its services.
Naturally, any surgery will be decided long before the HP begins dealing with the tele-
surgery interface, and the algorithm will be ready before the HP commences procedures.
Algorithm 1 shows how the nodes are selected after the main routing table is created by
the routing protocol; our algorithm can be applied for pre-active or pro-active protocols.
Subsequently, the algorithm works on the network before starting the surgery and keeps
monitoring adjacent nodes in order to provide the required information about each node
in the network, and keeps a record once the inquiry packets start to be distributed. The IoT
J. Sens. Actuator Netw. 2021, 10, 30 11 of 17
smart technique, based on the collection of information and the registered record, enables
our algorithm to start to determine the path between the source and the destination in
order to begin sending and receiving the data. The path will only be available for the
label packets and for the required amount of time, as determined by the IoT surgery team.
However, in case the nodes received other packets, the s-RCA will reroute any other packets
to adjacent nodes, to send them to the required destination via lower-priority paths. This is
the core functionality required of our smart algorithm, which must work without raising
any affection for any other traffic. If there are huge emergency packets received, then each
node can keep these packets in its buffer to avoid packet drop, maintaining high-quality
service. This is will not increase delay, due to the huge availability built into the path.
The proposed s-RCA algorithm shown in Algorithm 1 can work with any routing
protocol; as we explained, the routing protocol is responsible for creating the routing
table, and our algorithm is configured according to the following steps inside the routing
protocol. This is in case, we use a pro-active routing protocol, but with pre-active ones
there is no need to read the full topology, because the algorithm can determine the path
independently by using the shortest path between each node which is computed by the
routing protocol, without knowing about other nodes in the network, which is faster. In our
protocol, we assume that all nodes on the primary path connect with an adjacent node,
which has secured all our protocol constraints, as follows (and as shown in Figure 5:
J. Sens. Actuator Netw. 2021, 10, 30 12 of 17
• All nodes on the path are selected by s-RCA algorithm to be included in the booked
path between the source and required destination, which should be tracked, and pos-
sess a very good history. The algorithm will decide based on the information collected
from LSDB (from the routing table).
• s-RCA algorithm will import the routing table created from the routing protocol to
make a full view of the network, and then start to select (node by node) until arriving
at the final destination.
• Each node on the main path should have an adjacent node and be ready to receive
other data traffic from the selected node if it receives or broadcasts packets by mistake.
Received packets are considered normal, and will not enter the buffer for the selected
path even if they come by mistake, and they will be forwarded directly to the adjacent
node that is not on the selected path.
• The adjacent node must know that any packets received from the selected node on the
path should pass from another node and should not be returned again, to avoid loops
in the network. This can be achieved by informing all adjacent nodes by sending small
inquiry packets informing all adjacent nodes that a node is busy, and that any packets
received will be directly forwarded to the adjacent nodes, which should not return
them until they receive information packets signaling availability, and the session
is terminated.
Robotic Doing
Operation for
Doctor giving Patient
instructions
This mechanism comprises two tasks: looking and checking all paths in the main rout-
ing table between nodes; and constructing a path from the main routing table (if possible),
or using the same path (if using a pre-active protocol such as AODV). Algorithm 1 explains
the main functionality using buffering. Based on the link-state database, we find the selected
nodes from the full topology Tr , s, d between source and destination. Each graph has edges
and vertices, and the edges have weights, but the routing protocol will construct the routing
table with the best (shortest) path between any source and destination. Once the session is
open, all emergency packets start to be forwarded hop-by-hop p a (s, NextHop) ← ∅ until
they arrive at the destination. The algorithm governs and controls packets from the source,
to avoid swimming around the networks.
8. Simulation Environment
This section shows and discusses the detailed explanation of the tests. In NS2 we
ran our experiment for 30-min online live packet streaming of UDP packets. UDP packets
are good examples of video live streaming packet transmission. m-QoS is optimized in
the source point and starts to be calculated during healthcare video transmission at the
remote location. Here, we assume a media stream with high un-stability, such as loss
of the connection during surgery of emergency patients, which causes more delay and
J. Sens. Actuator Netw. 2021, 10, 30 13 of 17
will be risky to his life. A comparison of QoS optimization is shown for proposed wRCA
and s-RCA, rerouting normal packets if the booking node receives, other than emergency
packets, using the configuration parameters displayed in Table 1. Experimental results of
performance analysis in Table 1, reveal that window-based rate control algorithm (w-RCA),
s-RCA, and re-routing normal packets depend on various buffer sizes and start-up delays
(0 t of 2 frames). It was observed that increased idle time decreases the media sequence’s
rate variability. Surgery simulation is conducted for attending a 99% confidence level in the
outcome (detailed parameters are presented in Table 1. As discussed above, we compare w-
RCA with another existing work. The experiment is performed by taking into account the
client buffer size, our new technique (s-RCA), and rerouting normal packets, to prove that
our technique will not affect the networks during the surgery time. For QoS optimization
in terms of different QoS metrics (such as packet received ratio and delay over 5G network),
we establish a trade-off between packet size and buffer size, with reducing packet loss
ratio, which shows the smooth peak-to-mean ratio, less delay, and less jitters. The analysis
is based on packet size transmission of the real-time video buffer rate (VBR) for medical
video quality. To evaluate the performance of the s-RCA algorithm in the IoT environment,
we modeled a different type of mesh topology scenario in NS2. Each scenario had a
different number of nodes. We also considered the amount of traffic that could be passed
on the network in each experiment. The topology started from 50 up to 200 nodes: the
node at the beginning of the network acted as the source node, while the one at the end
of the network alternately generated one normal data packet and one urgent data packet,
within a period of seconds.
Network simulation (NS2) was performed to evaluate the performance of the proposed
long VPN path between the source and the destination in terms of receiving high-priority
traffic for medical operations or any other important high-emergency traffic involving
the on-demand protocol between nodes in networks. The evidence gathered by the NS2
simulation offered good support for the transmission data in the networks. We repeat
our simulation around 30 times and we have taken the average delay among all of them.
The packet size was 100 B and the bit rate was set to 2 MB/s. A traffic rate of 200 KB/s was
generated from the source node to the destination during simulation.
Before evaluating the performance issues for the network topology, it is important to
determine which parameters could affect the QoS of the streamed video traffic. Here, the re-
search focuses on three parameters, which may better determine the effect of video traffic
techniques:
• Packet loss ratio: this is the packet ratio between dropped and sent data packets.
• Average delay time in the buffer: this is the average time between transmission and
arrival data packets include the buffering time.
• Throughput as we checked how many packets were received during the path booking
and if there are some packets dropped do they will make a huge problem for doing
the required task.
However, we have created an extension to the routing protocol by performing our
Algorithm 1 in order to prepare an adjacent node to be the next hop if faced with the
required conditions. As discussed previously, we added inquiry packets with negligible
J. Sens. Actuator Netw. 2021, 10, 30 14 of 17
sizes to find the next hop as an alternative to urgent packets, and gathered all required
information about the full topology.
Experimental Results
We particularly observed the effect of node density on real-time traffic delivery latency.
We simulated the reference scenarios by constantly increasing the number of nodes, and the
simulation was repeated 20 runs for each test. The collected confidence intervals were
always under ±5% of the estimated average. In Figure 6, we can see that the s-RCA
algorithm has improved in terms of receiving real-time data after we make a packet
labeling as an emergency packet. In addition, the data packets showed continuity in
improvements when passing between the nodes among networks from the selected path,
which, according to the s-RCA algorithm, is booked between the source and destination.
However, in Figure 7 shows different cases such as where the topology might face sudden
rerouting because of any failure occurring without any notification for normal packets
received by the selected node to be booked. In this case, the algorithm can reroute the
traffic according to the adjacent node which is already selected from the routing table;
although the delay time will increase. This is because the rerouting path can be longer
than the previous one. However, the rerouting will help to keep the data packets receiving
without any disconnections. The throughput is based on the number of packets received
among all experiments. As we showed in our results, the throughput increased because the
service will keep working even if the failure occurred. In addition, the path between source
and destination will be only using for forwarding the labeled packets which will reduce
the loss of packets as no congestion will occurr. Furthermore, because the delay will be
reduced and the path between source and destination will be reserved for the emergency
packets, then the loss of packets will be reduced, and the throughput will increase.
Conversely, the mean packet ratio value increases as the node buffer size, but their
range is below the range of threshold values of delay and jitters for surgery. For example,
the threshold values of delay and jitters are 250 ms and 20 ms respectively, and our proposed
algorithm provides 250 ms delay and 0.60 ms jitters. In addition, from experimental
results it is clear that if any one parameter from the node buffer size and reroute varies
disproportionately to each other, the performance of the proposed s-RCA will be affected.
After experimental analysis it is found that our proposed algorithm performs better than
the window-based rate control algorithm (w-RCA) optimal smoothing algorithm with
a window size of 600 frames, playback delay of 20 s, and node buffer size of 16 MB,
optimized with better QoS during the transmission system. The experimental results are
demonstrated in Table 1 and Figure 6.
J. Sens. Actuator Netw. 2021, 10, 30 15 of 17
Unsmoothed Stream
0.06
0.05
The s-RCA reduces the waiting time in the buffer according to the number of emer-
gency packets received. If the buffer size increases, then PMR and loss of packets decrease,
while delay increases for both algorithms. The performance of the s-RCA is better than the
w-RCA and rerouting for normal traffic, because using a larger buffer size and increasing
node buffer size shows a dramatic reduction in delay and rerouting for s-RCA compared
to w-RCA. The delay of s-RCA meets the requirements of medical applications such as
tele-surgery and tele-consultation, with threshold values of delay and jitters for real-time
video medical applications of 250 ms and 20 ms respectively; our proposed s-RCA pro-
vides delay values of 250 ms and 0.60 ms respectively for the two cases sending directly,
including the buffer time. Figures 7 and 8 reveal the loss packet ratio, and delay of different
algorithms versus buffer size. Figure 7 compares the packet loss of w-RCA and rerouting
packet compared at different buffer sizes, and it is observed that the packet loss of s-RCA
is more reduced with increased buffer size than the w-RCA and rerouting. w-RCA and
rerouting data packets results in larger delays, while s-RCA has less delay.
9. Conclusions
In this paper, we have proposed a new Smart Control Ration Control algorithm
(s-RCA) to create a smart path in the network between source and destination. This path
can be used to accelerate the receipt of emergency packets during medical surgery. It solves
solving problems of network congestion, delay time, and throughput, and minimizes
load on the required path and evacuation time. The emergency evaluation problem is
thus converted to a traditional network flow problem. The purpose here is to create a
high-priority path using an IoT smart algorithm to classify traffic as being of emergency
status. A reliable algorithm (i.e., an event-aware back-pressure scheduling scheme with a
multi-level priority approach) solves the emergency problem and enables regular packets
to deliver data via real-time live streaming, from source to destination, within the specified
timeline. We also use the node buffer to retain the emergency packets in case of receiving
a huge number of packets in a short time. In addition, the buffer helps avoid losing any
normal packets that might be received erroneously from other nodes. These normal packets
will be rerouted directly to adjacent nodes not on the selected path. Assigning prioritization
to packets facilitates congestion problem control throughout the network. Our simulation
results indicate that our scheme exhibits considerable improvements compared to existing
approaches in terms of network congestion, throughput, delay time, loss ratio, and network
overheads, as well as in terms of many other discussed factors.
Author Contributions: The authors confirm contribution to the paper as follows: study conception
and design: A.S.A.-A. and H.Y.; data collection: A.S.A.-A.; analysis and interpretation of results:
R.S.A., H.Y., A.S.A.-A.; draft manuscript preparation. All authors reviewed the results and approved
the final version of the manuscript.
Funding: This research was supported and funded by the Research Sector of the Arab Open Univer-
sity (Kuwait Branch) under Decision Number 20054.
Data Availability Statement: The data presented in this study are available on request from the
corresponding author.
Conflicts of Interest: The authors declare that they have no conflict of interest.
J. Sens. Actuator Netw. 2021, 10, 30 17 of 17
References
1. Elkhodr, M.; Alsinglawi, B.; Alshehri, M. A Privacy Risk Assessment for the Internet of Things in Healthcare. In Applications of
Intelligent Technologies in Healthcare; Springer: Cham, Switzerland, 2019; pp. 47–54.
2. Dhumane, A.; Prasad, R.; Prasad, J. Routing issues in internet of things: A survey. In Proceedings of the International MultiCon-
ference of Engineers and Computer Scientists, Hong Kong, China, 16–18 March 2016; Volume 1, pp. 16–18.
3. Rathee, G.; Sharma, A.; Saini, H.; Kumar, R.; Iqbal, R. A hybrid framework for multimedia data processing in IoT-healthcare
using blockchain technology. Multimed. Tools Appl. 2019, 79, 9711–9733. [CrossRef]
4. Mick, T.; Tourani, R.; Misra, S. LASeR: Lightweight authentication and secured routing for NDN IoT in smart cities. IEEE Internet
Things J. 2017, 5, 755–764. [CrossRef]
5. Zhao, L.; Wang, J.; Liu, J.; Kato, N. Routing for crowd management in smart cities: A deep reinforcement learning perspective.
IEEE Commun. Mag. 2019, 57, 88–93. [CrossRef]
6. François, J.; Cholez, T.; Engel, T. CCN traffic optimization for IoT. In Proceedings of the 2013 Fourth International Conference on
the Network of the Future (NoF), Pohang, Korea, 23–25 October 2013; pp. 1–5.
7. Park, S.; Crespi, N.; Park, H.; Kim, S.H. IoT routing architecture with autonomous systems of things. In Proceedings of the 2014
IEEE World Forum on Internet of Things (WF-IoT), Seoul, Korea, 6–8 March 2014; pp. 442–445.
8. Elappila, M.; Chinara, S.; Parhi, D.R. Survivable path routing in WSN for IoT applications. Pervasive Mob. Comput. 2018, 43, 49–63.
[CrossRef]
9. Le, Q.; Ngo-Quynh, T.; Magedanz, T. Rpl-based multipath routing protocols for internet of things on wireless sensor networks. In
Proceedings of the 2014 International Conference on Advanced Technologies for Communications (ATC 2014), Hanoi, Vietnam,
15–17 October 2014; pp. 424–429.
10. lalitha SuryaKumari, P. Healthcare Paradigms in the Internet of Things Ecosystem; Academic Press: Cambridge, MA, USA, 2017;
pp. 223–250.
11. Alameri, I. MANETS and internet of things: The development of a data routing algorithm. Eng. Technol. Appl. Sci. Res. 2018,
8, 2604–2608. [CrossRef]
12. Airehrour, D.; Gutierrez, J. An analysis of secure MANET routing features to maintain confidentiality and integrity in IoT routing.
In Proceedings of the International Conference on Information Resources Management (CONF-IRM), Ottawa, ON, Canada,
18–20 May 2015.
13. Giusto, D.; Iera, A.; Morabito, G.; Atzori, L. The Internet of Things: 20th Tyrrhenian Workshop on Digital Communications; Springer
Science & Business Media: New York, NY, USA, 2010.
14. Al-Qarni, B.H.; Almogren, A.; Hassan, M.M. An efficient networking protocol for internet of things to handle multimedia big
data. Multimed. Tools Appl. 2018, 78, 30039–30056. [CrossRef]
15. Jabbar, W.A.; Saad, W.K.; Ismail, M. MEQSA-OLSRv2: A Multicriteria-Based Hybrid Multipath Protocol for Energy-Efficient and
QoS-Aware Data Routing in MANET-WSN Convergence Scenarios of IoT. IEEE Access 2018, 6, 76546–76572. [CrossRef]
16. Conti, M.; Kaliyar, P.; Rabbani, M.M.; Ranise, S. Attestation-enabled Secure and Scalable Routing protocol for IoT Networks.
Ad Hoc Netw. 2019, 98, 102054. [CrossRef]
17. Vadivel, R.; Ramkumar, J. QoS-Enabled Improved Cuckoo Search-Inspired Protocol (ICSIP) for IoT-Based Healthcare Applications.
In Incorporating the Internet of Things in Healthcare Applications and Wearable Devices; IGI Global: Hershey, PA, USA, 2020; pp. 109–121.
18. Shreyas, J.; Singh, H.; Tiwari, S.; Srinidhi, N.; Kumar, S.D. CAFOR: Congestion avoidance using fuzzy logic to find an optimal
routing path in 6LoWPAN networks. J. Reliab. Intell. Environ. 2021, 1–16. [CrossRef]
19. Mohammadi, R.; Javidan, R. EFSUTE: A novel efficient and survivable traffic engineering for software defined networks. J. Reliab.
Intell. Environ. 2021, 1–14. [CrossRef]
20. AlZubi, A.A.; Al-Maitah, M.; Alarifi, A. A best-fit routing algorithm for non-redundant communication in large-scale IoT based
network. Comput. Netw. 2019, 152, 106–113. [CrossRef]
21. Chattopadhyay, A.K.; Nag, A.; Ghosh, D.; Chanda, K. A Secure Framework for IoT-Based Healthcare System. In Proceedings of
International Ethical Hacking Conference 2018, Kolkata, India, 6–7 April 2018; Springer: Singapore, 2019; pp. 383–393.
22. Coronato, A.; Cuzzocrea, A. An innovative risk assessment methodology for medical information systems. IEEE Trans. Knowl.
Data Eng. 2020. [CrossRef]
23. Al Rawajbeh, M. Performance evaluation of a computer network in a cloud computing environment. ICIC Int. 2019, 13, 719–727.
24. Alharthi, S.; Johnson, P.; Alharthi, M. IoT architecture and routing for MV and LV smart grid. In Proceedings of the 2017 Saudi
Arabia Smart Grid (SASG), Jeddah, Saudi Arabia, 12–14 December 2017; pp. 1–6.
25. Paul, M.A.V.; Sagar, T.A.; Venkatesan, S.; Gupta, A.K. Impact of Mobility in IoT Devices for Healthcare. In Digital Business;
Springer: Cham, Switzerland, 2019; pp. 243–261.
26. Al-Turjman, F.; Zahmatkesh, H.; Shahroze, R. An overview of security and privacy in smart cities’ IoT communications. Trans.
Emerg. Telecommun. Technol. 2019, e3677. [CrossRef]
27. Al Zamil, M.G.H.; Samarah, S.M.J.; Rawashdeh, M.; Hossain, M.A. An ODT-based abstraction for mining closed sequential
temporal patterns in IoT-cloud smart homes. Cluster Comput. 2017, 20, 1815–1829. [CrossRef]