A Comprehensive Review of Internet of Things (IOT) in Medical Health Services facilities

  Share :          
  11

A Comprehensive Review of Internet of Things (IOT) in Medical Health Services Facilities<br />Dr. Tarik Raoof Al-Khateeb<br />Medical Instrumentation Techniques Engineering Department,<br />College of Engineering and Engineering Techniques,<br />Al-Mustaqbal University, 51001, Babylon, Iraq<br /><br />Abstract <br /><br /><br />1. Introduction: Review Internet of Things (IOT) History <br />History of Internet was long period of time of almost three decades or more. The internet we know is created by people for people and about people services in many applications. All games, graphic design and videos, everything was produced by people. As we all see that internet has changed our life and so the world. In the pre-internet age, fixed and mobile telephones was the major mode of human to human communication. However, with the origin of Internet, the world changed and made the information available for us from miles away, at just the click of a button. <br /><br />The Internet have had gowned the invention of social media, meetings, conferences, etc. began to explode in attractiveness, and popularities around the global, as well as social media sites expanded distinction, and introduced completely new technique for the people to communicate, and shared information with each other across great long distances. Practically, all the data available on the Internet today is created by human for humans. But human has limited time, attention, and accuracy, which limits their ability to capture the data about things in the real world. Consequently, we should have had things or devices that knew everything about things, using data they collected without a human support, then, we would be able to track and count everything and greatly reduce waste, loss and cost and this concept has brought the birth to what we called “Internet of Things” (IOT) [1-11].<br /><br /><br /><br />2. Internet of Things in Communication Network Technology<br />Internet of Things (IoT) has been developing as a new technology that is used to express a modern wireless telecommunication network. With the rapid advancement in Internet of Things (IoT) which will transform our lives in the next 30-40 years to the physical world. Hence, the term “Internet of Things (IoT)” will become very widespread in network, and communication technology developments in many ways and is called as the next frontline. Whereas, in the past and coming years, the number of IoT devices is expected to grow vastly and dramatically. <br /><br />Somedays, IoT stuff technologies have been reached more than (12-15) billion devices that can currently connect with Internet However, by the years 2020-2030 it is estimated that there will be (24-26) times more connected things with the Internet than the people [6,7]. Currently, everything around us from household lights and different home appliances to selling new products machines, cars etc. has the capability to become online and interact with other machines. These IoT’s technology raises to increase sensors devices or objects that can be interacted with ‘the Internet by manufacture’s use of physical and biochemical devices, etc. like different purposes types of sensors, microcontrollers, and network connectivity that enable these objects to collect and exchange data. IoT’s were connected to many physical things and objects [2]. <br />Consequently, to collect the real time data consistently with a minimal time, each and every device has its Unique Identifier (UID), which makes the communication possible in an easy way like machine to machine (M2M) communication. A massive amount of data is collected from devices all over the world which is stored in the cloud. As a result, systems will become more efficient and smarter. IoT creates smart objects which constitute eventual building blocks in the improvement of cyber-physical smart universal frameworks. It is intended for billions of physical things or objects that will be equipped with different kinds of sensors and actuators, that are joined by the Internet through diverse access networks assisted by different technologies such as wireless sensor networks (WSN), radio frequency identification (RFID), real time and semantic web services [1].<br /><br />Although, IoT allows people seamless interactions among different types of devices such as medical sensors, monitoring cameras, home appliances and so on [3]. By keeping all these things in view, we all know several applications which have been developed for IoT, in which each and every physical object is connected through the Internet by employing sensor devices [4]. The communication is aided through the sensors installed into the participating devices. Sensors play a vital role in detecting signals. Sensors are now found in many applications, such as smart devices (mobile devices, tablets, etc.), automotive systems, climate monitoring, industrial control and healthcare.<br /> <br />3. Future of Internet of Things<br />The features and specification of updated devices required data acquire us from the surrounding environments by using embedded sensors, processors and communication hardware. These devices, often called "connected" or "smart" devices as it can talk through machine-to-machine (M2M) communication other related devices and can act on the information they get from one another. Humans can interact with the devices to set them up, and give them instructions or access the necessary data, nonetheless these devices are doing most of the tasks on their own without human intervention.<br />At the present time, communication and network represents one of the most significant events of our interconnected world, because the Internet is a vital technology that provides many beneficial applications for our society and our daily lives activities. From the advantage of the Internet architecture, Internet of Things (IoT) has been developed in which different types of devices or substances things can make decisions, communicate, and exchange data with each other [6.7]. The advance deployment and various practical applications, wireless sensor networks (WSNs) [2] have become a serious factor for the Future Internet (FI) example in the IoT era with the rapidly growing number of Internet users. <br />Where, Internet of Things (IoT) has been used in numerous fields such as smart and intelligent homes, healthcare, smart cities, automation, smart grid, traffic management, agriculture, and so on. Though, medical services and health care facilities are the most significant areas for IoT growth. Where, IoT development and advancements in healthcare technologies reduces cost and increase the quality of user’s life as they can monitor their everyday activities such as dietary habits, sleep cycles, and exercise routines to produce specific tips that help and keep maintaining healthier lifestyle for better [2]. Moreover, the use of IoT’s has benefited many medical fields in the healthcare environment. The continuous real-time tracking, management of patient information, health emergency management, management of blood information, and health management [3].<br />Although, health system is the one of the significant concern of the world. Developed countries spend masses of funds to offer better health facilities to their citizens. With the advancement of new technologies, and the latest improvements in Internet of Things (IoT) is the vision of a future connected to the world. With the Internet of Things (IoT) we can provide a better health environment healthcare system can be made more fast, efficient, reliable which will give a better service for the people [1].<br />There were also some challenges in IoT’s implementation when there is huge amount of data will be gathered from various resources connected devices become intelligent, powerful, and more efficient. These devices on the Internet can easily communicate and exchange data with other objects according to environment, and have various forms of data; such as wearable, implanted, and environmental were interconnected through a network. These devises were produce a large amount of data. In order to execute their desired functionality, these devices are controlled remotely to the IoT’s systems [2,3,4].<br />Generally, IoT’s devices and sensors produce a large amount of health information that gathered, processed, and analyzed. Devices containing sensors have low power, limited memory, network and battery charge limitations, so IoT data needs to be computed, stored, accessed, and analyzed [4]. Also, there is a major issue in the storage and security of the enormous volume of data that is produced by healthcare IoT devices [5]. A platform that handles all this is called “Cloud”. Cloud has unlimited capabilities of storage and processing power. Figure1 shows the conventional cloud computing structure which enables data to be generated from various sites and devices and output is again sent to the desired device [6]. <br /><br /><br /><br /><br />Figure 1 Cloud Computing Paradigm<br />The integration of IoT’s and cloud provides storage, processing, and network capabilities. Cloud computing can help in avoiding IoT limitations [2,3]. The key requirement for the IoT platform is the sharing of resources. Cloud computing shares and maximizes resources. It is location independent as user access cloud services from any location and from any computer through the internet connection [7].<br />4.Concept of Fog Edge Computing and Internet of Things<br />The concept of “Fog and Edge Computing” was first propose [15,16]. In 2006 Cisco joined the concept of Fog to offload the cloud by injecting smart device over network layer to provide limited computation facilities at the edge of device layer, the fog layer is also known as Edge layer because it is consisting of smart gateways, routers and dedicated computing devices [16,17]. A fog computing model is equivalent to a local cloud, where data management is done and controlled by the users themselves. <br />Fog computing is a highly virtualized platform that provides and delivers vision of Fog computing to accelerate value from billions of connected devises to the IOT and most of the users can analyze and manage their data at any time, from anywhere and in any way. in terms of storage, and networking services between end devices and traditional Cloud Computing Data Centers [16-19].<br />In addition, Cloud-based systems allow data from different sites and devices to be collected, and output is again sent to the desired device, causing the response delay in response and requiring high bandwidth for large data. Although, data security and user privacy are also a major concern. These are the reasons why individuals are cautious to use the cloud. To address these issues, researchers have proposed other comparable computing paradigms to fog computing, such as edge computing, mist computing the cloud of things, and also cloudlets. <br />This review paper will provide an in-depth fog computing analysis, its challenges, and solutions to these problems. This thesis also will present the principles and functionality of fog computing. Edge computing correlates with fog computing and claims that fog computing type of computing, mostly because of its detailed concept of range and versatility [10].<br />Furthermore, the core idea of fog computing lies in what’s call the “smart front-end” concepts which promotes the use of networked or dedicated devices to provide computing, storage, and network communication services between cloud servers and terminal devices. Thus, bringing data storage and computing much closer to acquisition terminal; reducing data transmission and storage overhead, improving application response speed (i.e. reducing delay and enhancing response time) and improving the utilization of network resources.<br />Consequently, fog computing can be viewed as a middle layer between cloud computing and terminal computing. Which is located at the edge of the network and close to the terminal. Also, it is often combined with cloud computing to form a common network structure model, which includes the cloud computing layer, fog computing layer and terminal access layer as shown in Figure 2 and Figure 3 [25-28] show a zoom-in into the fog/edge layer. In the coverage area of the fog node, various intelligent terminals access the node and achieve interconnection and intercommunication. <br />In addition, as an advantage the fog computing layer is able to complete the direct computing processing thereby reducing network transmission delay from sending/receiving from the remote cloud. Initially, the number of fog nodes was small and easily manageable, but their number has increased drastically in recent times. This increase in IoT terminals has brought the critical issue of energy consumption in fog nodes to the limelight [16-23]. In our study, the instruments required in this research is “NS3/Cooja/iFogSim” discrete event network simulator(s), in order to build the IoT network to run and extract the result for analysis.<br /> <br />Figure 2 A descriptive system framework for IoT’s<br /><br /> <br /><br /> Figure 3 A descriptive system framework for IoT<br />5.Congestion Control of the Network<br />Congestion control in network and IoT occur whenever the traffic gets near to the network capacity. Hence, a congestion control algorithm is of great significance to prevent congestion. Transmission Control Protocol (TCP) includes a congestion control mechanism [17]. However, in IoT communications, the traffic patterns are different from the ones in conventional networks. Constrained devices often communicate periodically to notify their sensor measurements. Even when individual devices create small amounts of data, the large number of communicating devices can be a cause of network congestion. Additional possible reason for congestion is traffic bursts generated as a reaction to events [18]. Congestion of the network depends on many factors like packet size, type of cross traffic, number of competing connections, load on every link in the path, router buffer size and bottleneck queue size [19].<br />The congestion of the network increases exponentially due to continuous growth of the Internet. The Transmission Control Protocol (TCP) is a transport-layer protocol that deals with the congestion of the network.<br />Transmission Control Protocol TCP has many congestion-control variants to deal with different network scenarios that might lead to congestion problems. With the advent of new network paradigms like the internet of things (IoT) and cloud computing, the congestion control problem becomes more critical and worth of investigation. Although such paradigms have recently attracted both academia and industry and impacted our daily lives in different ways, they still have their shortcomings. Though being cheap and convenient, cloud services consume a huge amount of network bandwidth. Furthermore, the physical distance between data source(s) and the data center makes delays a frequent problem in cloud computing infrastructures. Fog computing has been introduced as a distributed service computing model that provides a solution to these limitations. It is based on a para virtualized architecture that fully utilizes the computing functions of terminal devices and the advantages of local proximity processing [16]. How legacy and state-of-the art congestion control mechanisms perform in different scenarios of Fog/Edge IoT computing is an issue worth of investigation.<br />6.Research Investigation in Internet of Things<br />The Internet of Things (IoT) is a global network and service infrastructure with connectivity and self-configuring capabilities; based on standard and interoperable protocols. The IoT consists of heterogeneous with various things that have to be identities, physical and virtual attributes, and are seamlessly and securely integrated into the Internet [1]. The goal of the IoT is to enable things to be connected anytime, anyplace, with anything and anyone, ideally using any network. Indeed, by connecting millions of things to the Internet, IoT. will created a plethora of applications that touch every aspect of human life; to name but a few: such as Wearables things, and different type of sensors [12] including, health monitoring devices [3]. While, in military applications as intrusion detection in remote or hostile environments, environmental monitoring devices [13]. Other applications Internet of Things (IoT) has been implemented in smart cities [2], smart grids [14] and connected cars [15]. <br />In the meantime, there are some issues that conflicting the IoT and the standard Internet. The ultimate difference resides in the fact that IoT networks mainly use Low Power Lossy Networks (LLN). Mainly, LLNs have figure some limitations. These limitations named such as energy, memory, and computational constraints of incorporated connected devices, uncertain radio connectivity, and extensive protocol overheads against memory. <br />7. Conclusion Strategy Study and Objective<br />The proposed strategy is scheduled to study the performance of legacy and state-of-the art congestion control mechanisms. Evaluate in fog/edge IoT networks in terms of Quality of Service (QoS) metrics of the network presentation metrics.<br />This research is to evaluate the performance of congestion-control algorithms within fog/edge computing in IoT networks, this implies conducting a simulation study that reflects the IoT network environment and architecture such as power constrain, traffic delay, security issues, congestion control and other related factors. <br />Also, a simulation model and a mathematical/analytical model will be developed to analyse the IoT network performance with and without the fog/edge layer.<br />The proposed thesis is to build a simulation modelling and its application study methodology relies on developing a simulation model using “NS3/Cooja/iFogSim” discrete event network simulator(s) according to the following steps:<br />1. Define the simulation scenario and simulation study.<br />2. Define the network topology and network parameters.<br />3. Define the performance metrics that will be measured.<br />4. Construction of the simulation model, and build the program/script.<br />5. Run the simulation and collect the data, and Analyses simulation results.<br /><br />References more than 60 reference<br /><br />[1] K. R. Darshan and K. R. Anandakumar, "A Comprehensive Review on Usage of Internet of Things (IoT) in Healthcare System,"International Conference on Emerging Research in Electronics, Computer Science and Technology (ICERECT), Mandya, India, 2015, pp. 132-136, pp. 374–380.<br />[2] How “Internet of Things” connects with physical devices, objects and Sensors [Online] http://www.binarytattoo.com/wp-content/uploads/2015/12/IoT- BTdesign.png. [Accessed: 12-04-2017].<br />[3] Gope P. and T. Hwang, "BSN-Care: A Secure IoT-Based Modern Healthcare System Using Body Sensor Network," in IEEE Sensors Journal, vol. 16, no. 5, pp. 1368- 1376, 2016.<br />[4] R. K. Kodali, G. Swamy and B. Lakshmi, "An implementation of IoT for Healthcare, "IEEE Recent Advances in Intelligent Computational Systems (RAICS), Trivandrum, India, 2015, pp. 411-416.<br />[5] S. K. Dhar, S. S. Bhunia and N. Mukherjee, "Interference Aware Scheduling of Sensors in IoT Enabled Health-Care Monitoring System,"Fourth International Conference of Emerging Applications of Information Technology, Kolkata, India, 2014, pp. 152-157.<br />[6] L. Catarinucci et al., "An IoT-Aware Architecture for Smart Healthcare Systems," in IEEE Internet of Things Journal, vol. 2, no. 6, pp. 515-526, Dec. 2015.<br />[7] D. Niewolny. 18 Oct 2013. How the Internet of Things Is Revolutionizing Healthcare, Freescale Semiconductors<br />[8] S. M. R. Islam, D. Kwak, M. H. Kabir, M. Hossain and K. S. Kwak, "The Internet of Things for Health Care: A Comprehensive Survey," in IEEE Access, vol. 3, pp. 678- 708, 2015.<br />[9] Y. J. Fan, Y. H. Yin, L. D. Xu, Y. Zeng and F. Wu, "IoT-Based Smart Rehabilitation System," in IEEE Transactions on Industrial Informatics, vol. 10, no. 2, pp. 1568- 1577, May 2014.<br />[10] C. Rotariu and V. Manta, "Wireless System for Remote Monitoring of Oxygen Saturation and Heart Rate, "Federated Conference on Computer Science and Information Systems (FedCSIS), Wroclaw, Poland, 2012, pp. 193-196.<br />[11] L. Yang, Y. Ge, W. Li, W. Rao and W. Shen, "A Home Mobile Healthcare System for Wheelchair Users, "IEEE International Conference on Computer Supported Cooperative Work in Design (CSCWD), Hsinchu, China, 2014, pp. 609-614.<br />[12] Shou-Hsiung Cheng, "An Intelligent Infant Healthcare System of Vital Signs Integrated by Active RFID, "International Conference on Machine Learning and Cybernetics, Tianjin, China, 2013, pp. 1157-1160.<br />[13] C. Lee Ventola, MS Mobile Devices and Apps for Health Care Professionals: Uses andBenefits.PT.2014;39(5):356:364.[Online]https://www.ncbi.nlm.nih.gov/pmc/artic les/PMC4029126/. [Accessed: 04-05-2017].<br />[14] K. Patel, “Health and Medicine” IoT can help you obtain greater efficiency through smarter asset management, [Online] https://www.ibm.com/blogs/internet-of- things/6-benefits-of-iot-for-healthcare/. [Accessed: 04-05-2017].<br /> [15] Rodolfo Milito, Preethi Natarajan and Jiang Zhu,Fog Computing: A Platform for Internet of Things and Analytics, Flavio Bonomi, Enterprise Networking Labs, <br />Cisco Systems Inc., San Jose, USA, DOI: 10.1007/978-3-319-05029-47, <br />Springer International Publishing <br /><br /> [16] Ma, K., Bagula, A., Nyirenda, C., & Ajayi, O. (2019). An IoT-based fog <br /> computing model. Sensors (Switzerland), 19(12), 1–17. https://doi.org/10.3390/s19122783<br /><br /> [17] Rahmani, W. U., Choi, Y. S., & Chung, K. (2019). Performance Evaluation of <br /> Video Streaming Application over CoAP in IoT. IEEE Access, 7, 39852–39861.<br />https://doi.org/10.1109/ACCESS.2019.2907157<br /><br /> [18] Betzler, A., Gomez, C., Demirkol, I., & Paradells, J. (2016). CoAP congestion control for the internet of things. IEEE Communications Magazine, 54(7), 154 <br />160. https://doi.org/10.1109/MCOM.2016.7509394<br /><br />[19] Ajay Kumar Gupta, Devendra Singh, Karan Singh, L. P. V. (2021). An adaptive<br /> congestion control algorithm. Journal of Discrete Mathematical Sciences and<br /> Cryptography, 24(5), 1273–1282. https://doi.org/10.1080/09720529.2021.1932912<br /><br /> <br />[32] Xylomenos, G.; Ververidis, C.; Siris, V.; Fotiou, N.; Tsilopoulos, C.; Vasilakos, X.; Katsaros, K.; Polyzos, G.A survey of information-centric networking research. IEEE Commun. Surv. Tutor. 2014, Vol 16, pp1024–1049.<br />14. Arifuzzaman, M.; Yu, K.; Sato, T. Content distribution in Information Centric Network: Economic incentive<br />analysis in game theoretic approach. In Proceedings of the 2014 ITU Kaleidoscope Academic Conference,<br />St. Petersburg, Russia, 3–5 June 2014; pp. 215–220.<br />15. Chiu, D.; Jain, R. Analysis of the increase/decrease algorithms for congestion avoidance in computer<br />networks. J. Comput. Netw. ISDN 1989, 17, 1–14. [CrossRef]<br />16. Kreuzberger, C.; Rainer, B.; Hellwagner, H. Modelling the impact of caching and popularity on concurrent<br />adaptive multimedia streams in Information-Centric Networks. In Proceedings of the 2015 IEEE International<br />Conference on Multimedia & Expo. Workshops (ICMEW), Turin, Italy, 29 June–3 July 2015; pp. 1–6.<br />17. Mejri, S.; Touati, H.; Malouch, N.; Kamoun, F. Hop-by-hop congestion control for named data networks. In<br />Proceedings of the 2017 IEEE/ACS 14th International Conference on Computer Systems and Applications<br />(AICCSA), Hammamet, Tunisia, 30 October–3 November 2017; pp. 114–119.<br />18. Badov, M.; Seetharam, A.; Kurose, J.; Firoiu, V.; Nanda, S. Congestion-aware caching and search in<br />information-centric networks. In Proceedings of the 1st International Conference on Information-Centric<br />Networking (ICN 2014), Paris, France, 24–26 September 2014; pp. 37–46.<br />19. Chu, W.; Dehghan, M.; Towsley, D.; Zhang, Z.L. On allocating cache resources to content providers.<br />In Proceedings of the 3rd ACM Conference on Information-Centric Networking (ACM-ICN’16), Kyoto, Japan,<br />26–28 September 2016; pp. 154–159.<br />20. Safitri, C.; Yamada, Y.; Baharun, S.; Goudarzi, S.; Ngoc Nguyen, Q.; Yu, K.; Sato, T. An Intelligent Content<br />Prefix Classification Approach for Quality of Service Optimization in Information-Centric Networking.<br />Future Internet 2018, 10, 33. [CrossRef]<br />21. Takemasa, J.; Koizumi, Y.; Hasegawa, T.; Psaras, I. On Energy Reduction and Green Networking Enhancement<br />Due to In-Network Caching. In Proceedings of the 2015 IEEE 12th International Conference on Mobile Ad<br />Hoc and Sensor Systems, Dallas, TX, USA, 19–22 October 2015; pp. 513–518.<br />22. Bhattad, J.M.; Chede, S.D. Improved iterative adaptive thresholding algorithm with sleep scheduling for<br />lifetime maximization in wireless sensor Network. In Proceedings of the 2016 IEEE International WIE<br />Conference on Electrical and Computer Engineering (WIECON-ECE), Pune, India, 19–21 December 2016;<br />pp. 269–272.<br />23. Arshad, R.; Zahoor, S.; Shah, M.A.; Wahid, A.; Yu, H. Green IoT: An Investigation on Energy Saving Practices<br />for 2020 and Beyond. IEEE Access 2017, 5, 15667–15681. [CrossRef]<br />24. Zhu, C.; Leung, V.C.M.; Shu, L.; Ngai, E.C.H. Green Internet of Things for Smart World. IEEE Access 2015, 3,<br />2151–2162. [CrossRef]<br />25. Biason, A.; Pielli, C.; Rossi, M.; Zanella, A.; Zordan, D.; Kelly, M.; Zorzi, M. EC-CENTRIC: An Energy- and<br />Context-Centric Perspective on IoT Systems and Protocol Design. IEEE Access 2017, 5, 6894–6908. [CrossRef]<br />26. Xing, J.; Berger, T. Energy efficient neurons with generalized inverse Gaussian conditional and marginal<br />hitting times. IEEE Trans. Inf. Theory 2015, 61, 4390–4398. [CrossRef]<br />27. Bhinge, R.; Biswas, N.; Dornfeld, D.; Park, J.; Law, K.H.; Helu, M.; Rachuri, S. An intelligent machine<br />monitoring system for energy prediction using a Gaussian Process regression. In Proceedings of the<br />2014 IEEE International Conference on Big Data (Big Data), Washington, DC, USA, 27–30 October 2014;<br />pp. 978–986.<br />28. Sungkar, M.; Berger, T.; Levy, W.B. Capacity achieving input distribution to the generalized inverse Gaussian<br />neuron model. In Proceedings of the 2017 55th Annual Allerton Conference on Communication, Control.,<br />and Computing (Allerton), Monticello, IL, USA, 3–6 October 2017; pp. 860–869.<br />29. Ventura, J.; Chowdhury, K. Markov modeling of energy harvesting Body Sensor Networks. In Proceedings<br />of the 2011 IEEE 22nd International Symposium on Personal, Indoor and Mobile Radio Communications,<br />Toronto, ON, Canada, 11–14 September 2011; pp. 2168–2172.<br />30. Cheng, H.; Wu, L.; Zhang, Y.; Xiong, N. Data recovery in wireless sensor networks using Markov random<br />field model. In Proceedings of the 2018 Tenth International Conference on Advanced Computational<br />Intelligence (ICACI), Xiamen, China, 29–31 March 2018; pp. 706–711.<br /><br /><br />Sensors 2018, 18, 2889 19 of 19<br /><br />31. Nguyen, Q.N.; Arifuzzaman, M.; Sato, T. Proactive-caching based information centric networking<br />architecture for reliable green communication in intelligent transport system. In Proceedings of the 2015 ITU<br />Kaleidoscope: Trust in the Information Society (K-2015), Barcelona, Spain, 9–11 December 2015; pp. 1–7.<br />32. Yi, C.; Afanasyev, A.; Wang, L.; Zhang, B.; Zhang, L. Adaptive Forwarding in Named Data Networking.<br />ACM SIGCOMM Comput. Commun. Rev. 2012, 16, 62–67. [CrossRef]<br />33. Wang, M.; Zhang, J.; Bensaou, B. Intra-AS cooperative caching for content-centric networks. In Proceedings<br />of the 3rd ACM SIG-COMM Workshop on Information-Centric Networking, Hong Kong, China, 12 August<br />2013; pp. 61–66.<br />34. Rajagopalan, R.; Varshney, P.K. Data-aggregation techniques in sensor networks: A survey. IEEE Commun.<br />Surv. Tutor. 2006, 8, 48–63. [CrossRef]<br />35. Wissingh, B.; D’Acunto, L.; Trichias, K. In-network data aggregation in ICN: Demo paper. In Proceedings<br />of the 2017 8th International Conference on the Network of the Future (NOF), London, UK,<br />22–24 November 2017; pp. 129–131.<br />36. Harada, S.; Yan, Z.; Park, Y.J.; Nisar, K.; Ibrahim, A.A. Data aggregation in named data<br />networking. In Proceedings of the TENCON 2017—2017 IEEE Region 10 Conference, Penang, Malaysia,<br />5–8 November 2017; pp. 1839–1842.<br />37. Shi, R.; Rui, L.; Huang, H.; Qiu, X.; Guo, H.; Zhang, P. A Shapley value-based forwarding strategy in<br />Information-Centric Networking. In Proceedings of the 2016 18th Asia-Pacific Network Operations and<br />Management Symposium (APNOMS), Kanazawa, Japan, 5–7 October 2016.<br />38. Breslau, L.; Cao, P.; Fan, L.; Phillips, G.; Shenker, S. Web caching and Zipf-like distributions: Evidence<br />and implications. In Proceedings of the Eighteenth Annual Joint Conference of the IEEE Computer and<br />Communications Societies (INFOCOM’99), New York, NY, USA, 21–25 March 1999; pp. 126–134.<br />39. Abo-Zahhad, M.; Farrag, M.; Ali, A.; Amin, O. An energy consumption model for wireless sensor networks.<br />In Proceedings of the 5th International Conference on Energy Aware Computing Systems & Applications,<br />Cairo, Egypt, 24–26 March 2015; pp. 1–4.<br />40. ndnSIM Homepage. Available online: http://ndnsim.net/current/ (accessed on 31 August 2018).<br /><br />© 2018 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access<br />article distributed under the terms and conditions of the Creative <br />اعداد الاستاذ طارق روؤف <br /><br />