Energy is vital parameter for communication in Internet of Things (IoT) applications via Wireless Sensor Networks (WSN). Genetic algorithms with dynamic clustering approach are supposed to be very effective technique in conserving energy during the process of network planning and designing for IoT. Dynamic clustering recognizes the cluster head (CH) with higher energy for the data transmission in the network. In this paper, various applications, like smart transportation, smart grid, and smart cities, are discussed to establish that implementation of dynamic clustering computing-based IoT can support real-world applications in an efficient way. In the proposed approach, the dynamic clustering-based methodology and frame relay nodes (RN) are improved to elect the most preferred sensor node (SN) amidst the nodes in cluster. For this purpose, a Genetic Analysis approach is used. The simulations demonstrate that the proposed technique overcomes the dynamic clustering relay node (DCRN) clustering algorithm in terms of slot utilization, throughput and standard deviation in data transmission.
相似文献The wireless sensor network technology of Internet of Things (IoT) senses, collects and processes the data from its interconnected intelligent sensors to the base station. These sensors help the IoT to understand the environmental change and respond towards it. Thus sensor placement is a crucial device of IoT for efficient coverage and connectivity in the network. Many existing works focus on optimal sensor placement for two dimensional terrain but in various real-time applications sensors are often deployed over three-dimensional ambience. Therefore, this paper proposes a vertex coloring based sensor deployment algorithm for 3D terrain to determine the sensor requirement and its optimal spot and to obtain 100% target coverage. Further, the quality of the connectivity of sensors in the network is determined using Breadth first search algorithm. The results obtained from the proposed algorithm reveal that it provides efficient coverage and connectivity when compared with the existing methods.
相似文献The Internet of Things (IoT) embodies the confluence of the virtual & physical world. IoT will play an important role in managing the managing depleting resource such as water, fuel, food, etc. However, to realize these applications enormous IoT devices will communicate with each other. This massive connectivity will directly or indirectly aid in Green House Gas emissions. Hence, to admissibly reduce this environmental impact of IoT, it must be greened in terms of energy consumption. Green IoT will reduce environmental exploitation by slashing carbon emission effectively and thus will help in achieving sustainability of the planet. This paper describes the journey of IoT to Green IoT. Along with this, the survey on recent Green-IoT techniques that will effectively help in reducing required energy consumption is presented. Along with this ability of unmanned aerial vehicle (UAV) technology to provide Green IoT and survey on recent energy-efficient UAV assisted communication is presented. In addition to this, a dual battery enabled Unmanned Aerial vehicle base station, an energy-efficient clustering algorithm, has also been proposed to prolong the battery life.
相似文献With the vigorous development of Internet of Things technology, the current distribution network is developing towards the information-based and intelligent distribution Internet of Things (D-IoT). D-IoT adopts the mode of the cloud computing center and the edge cloud network working together. The edge cloud network has a large number of intelligent terminals, which can well adapt to the current sharply expanding power data scale. In order to further improve the ability of the edge network in D-IoT to process data in real time, and to maximize the quality of user experience (QoE) while minimizing energy consumption when performing computing offload, this paper proposes a dynamic non-cooperative game based edge Computing task offloading strategy, considering the dynamic nature of task generation, designed a distributed iterative optimization algorithm, which decomposes computing offloading into a series of sub-problems to solve. The results of simulation experiments prove that the calculation offloading mechanism proposed in this paper can greatly improve D -Compute efficiency of IoT system.
相似文献Internet of Things (IoT) is a heterogeneous network of interconnected things where users, smart devices and wireless technologies, collude for providing services. It is expected that a great deal of devices will get connected to the Internet in the near future. Opportunistic networks(OppNet) are a class of disruption tolerant networks characterized by uncertain topology and intermittent connectivity between the nodes. Opportunistic Internet of Things(OppIoT) is an amalgamation of the OppNet and IoT exploiting the communication between the IoT devices and the communities formed by humans. The data is exposed to a wide unfamiliar audience and the message delivery is dependent on the residual battery of the node, as most of the energy is spent on node discovery and message transmission. In such a scenario where a huge number of devices are accommodated, a scalable, adaptable, inter-operable, energy-efficient and secure network architecture is required. This paper proposes a novel defense mechanism against black hole and packet fabrication attacks for OppIoT, GFRSA, A Green Forwarding ratio and RSA (Rivest, Shamir and Adleman) based secure routing protocol. The selection of the next hop is based on node’s forwarding behavior, current energy level and its predicted message delivery probability. For further enhancing the security provided by the protocol, the messages are encrypted using asymmetric cryptography before transmission. Simulations performed using opportunistic network environment (ONE) simulator convey that GFRSA provides message security, saves energy and outperforms the existing protocols, LPRF-MC (Location Prediction-based Forwarding for Routing using Markov Chain) and RSASec (Asymmetric RSA-based security approach) in terms of correct packet delivery by 27.37%, message delivery probability is higher by 34.51%, number of messages dropped are reduced by 15.17% and the residual node energy is higher by 14.08%.
相似文献In WSN-assisted IoT, energy efficiency and security which play pivotal role in Quality of Service (QoS) are still challenging due to its open and resource constrained nature. Although many research works have been held on WSN-IoT, none of them is able to provide high-level security with energy efficiency. This paper resolves this problem by designing a novel Secure Deep Learning (SecDL) approach for dynamic cluster-based WSN-IoT networks. To improve energy efficiency, the network is designed to be Bi-Concentric Hexagons along with Mobile Sink technology. Dynamic clusters are formed within Bi-Hex network and optimal cluster heads are selected by Quality Prediction Phenomenon (QP2) that ensure QoS and also energy efficiency. Data aggregation is enabled in each cluster and handled with a Two-way Data Elimination then Reduction scheme. A new One Time-PRESENT (OT-PRESENT) cryptography algorithm is designed to achieve high-level security for aggregated data. Then, the ciphertext is transmitted to mobile sink through optimal route to ensure high-level QoS. For optimal route selection, a novel Crossover based Fitted Deep Neural Network (Co-FitDNN) is presented. This work also concentrates on IoT-user security since the sensory data can be accessed by IoT users. This work utilizes the concept of data mining to authenticate the IoT users. All IoT users are authenticated by Apriori based Robust Multi-factor Validation algorithm which maps the ideal authentication feature set for each user. In this way, the proposed SecDL approach achieves security, QoS and energy efficiency. Finally, the network is modeled in ns-3.26 and the results show betterment in network lifetime, throughput, packet delivery ratio, delay and encryption time.
相似文献Heterogeneous sensors are equipped with a limited battery source that is concerned with network lifetime problems. However, this problem can be tackled with the effective design of WSN-IoT by clustering and sleep scheduling mechanisms. This paper addresses this issue by presenting novel ideas involved in the WSN operations such as grid construction, cluster head selection, sleep scheduling, and data gathering by intelligent Agents (iAgents). An energy-efficient dual iAgents based Heterogeneous WSN (E2IA-HWSN) is proposed. iAgents are used in this paper to automatically collect the sensed data from IoT sensors. In this E2IA-HWSN, a 3?×?3 grid is built and each cell is sub-divided into four in which cluster heads (CH) are selected in each sub-division, followed by ring partitioning for selecting a CH present at the center. Multi-Objective Harris Hawks optimization (MO-HHO) algorithm is used to select CH and supernode, here to minimize the energy consumption of CH, the supernode takes responsibility to assign sleep schedules to devices. The scheduling slots are assigned only after a sensor reaches below the energy threshold. For scheduling, the Bayes rule-based Markov model (BR-MM) is applied with the determination of residual energy and sensed packet counts. Generator de Bits Pseudo Aleatorios (GBPA) eliminates redundant data in CH and then inter-cluster routing is performed in case of emergency events. If not, then the CH waits for the arrival of iagents, the trajectory of iAgents is dynamically predicted with Deep Policy Gradient (DDPG). The implementation is carried out in NS3.26 and the results show betterment to the well-known methods.
相似文献Wireless Sensor Network (WSN) is a part of Internet of Things (IoT), and has been used for sensing and collecting the important information from the surrounding environment. Energy consumption in this process is the most important issue, which primarily depends on the clustering technique and packet routing strategy. In this paper, we propose an Energy efficient Hierarchical Clustering and Routing using Fuzzy C-Means (EHCR-FCM) which works on three-layer structure, and depends upon the centroid of the clusters and grids, relative Euclidean distances and residual energy of the nodes. This technique is useful for the optimal usage of energy by employing grid and cluster formation in a dynamic manner and energy-efficient routing. The fitness value of the nodes have been used in this proposed work to decide that whether it may work as the Grid Head (GH) or Cluster Head (CH). The packet routing strategy of all the GHs depend upon the relative Euclidean distances among them, and also on their residual energy. In addition to this, we have also performed the energy consumption analysis, and found that our proposed approach is more energy efficient, better in terms of the number of cluster formation, network lifetime, and it also provides better coverage.
相似文献The growth of Wireless Sensor Networks (WSN) becomes the backbone of all smart IoT applications. Deploying reliable WSNs is particularly significant for critical Internet of Things (IoT) applications, such as health monitoring, industrial and military applications. In such applications, the WSN’s inability to perform its necessary tasks and degrading QoS can have profound consequences and can not be tolerated. Thus, deploying reliable WSNs to achieve better Quality of Service (QoS) support is a relatively new topic gaining more interest. Consequently, deploying a large number of nodes while simultaneously optimizing various measures is regarded as an NP-hard problem. In this paper, a Grey wolf-based optimization technique is used for node deployment that guarantees a given set of QoS metrics, namely maximizing coverage, connectivity and minimizing the overall cost of the network. The aim is to find the optimum number of appropriate positions for sensor nodes deployment under various p-coverage and q-connectivity configurations. The proposed approach offers an efficient wolf representation scheme and formulates a novel multi-objective fitness function. A rigorous simulation and statistical analysis are performed to prove the proposed scheme’s efficiency. Also, a comparative analysis is being carried with existing state-of-the-art algorithms, namely PSO, GA, and Greedy approach, and the efficiency of the proposed method improved by more than 11%, 14%, and 20%, respectively, in selecting appropriate positions with desired coverage and connectivity.
相似文献The Internet of Things (IoT) is the next big challenge for the research community where the IPv6 over low power wireless personal area network (6LoWPAN) protocol stack is a key part of the IoT. Recently, the IETF ROLL and 6LoWPAN working groups have developed new IP based protocols for 6LoWPAN networks to alleviate the challenges of connecting low memory, limited processing capability, and constrained power supply sensor nodes to the Internet. In 6LoWPAN networks, heavy network traffic causes congestion which significantly degrades network performance and impacts on quality of service aspects such as throughput, latency, energy consumption, reliability, and packet delivery. In this paper, we overview the protocol stack of 6LoWPAN networks and summarize a set of its protocols and standards. Also, we review and compare a number of popular congestion control mechanisms in wireless sensor networks (WSNs) and classify them into traffic control, resource control, and hybrid algorithms based on the congestion control strategy used. We present a comparative review of all existing congestion control approaches in 6LoWPAN networks. This paper highlights and discusses the differences between congestion control mechanisms for WSNs and 6LoWPAN networks as well as explaining the suitability and validity of WSN congestion control schemes for 6LoWPAN networks. Finally, this paper gives some potential directions for designing a novel congestion control protocol, which supports the IoT application requirements, in future work.
相似文献Many errors in data communication cause security attacks in Internet of Things (IoT). Routing errors at network layer are prominent errors in IoT which degrade the quality of data communication. Many attacks like sinkhole attack, blackhole attack, selective forwarding attack and wormhole attack enter the network through the network layer of the IoT. This paper has an emphasis on the detection of a wormhole attack because it is one of the most uncompromising attacks at the network layer of IoT protocol stack. The wormhole attack is the most disruptive attack out of all the other attacks mentioned above. The wormhole attack inserts information on incorrect routes in the network; it also alters the network information by causing a failure of location-dependent protocols thus defeating the purpose of routing algorithms. This paper covers the design and implementation of an innovative intrusion detection system for the IoT that detects a wormhole attack and the attacker nodes. The presence of a wormhole attack is identified using location information of any node and its neighbor with the help of Received Signal Strength Indicator (RSSI) values and the hop-count. The proposed system is energy efficient hence it is beneficial for a resource-constrained environment of IoT. It also provides precise true-positive (TPR) and false-positive detection rate (FPR).
相似文献With the development of the Internet of Things (IoT), a large amount of data is generated on the network edge. Given the limited computing power of mobile devices (MDs) and access to computing resources from remote clouds, which leads to high latency to MDs, edge computing provides a way to reduce service latency by building a miniature cloud (Cloudlet). MDs transfer tasks they generate to nearby cloudlets for lower latency. Although a lot of research has been done in the field of edge computing, little attention has been paid to how to deploy cloudlets in the network. In this paper, we study the cloudlet deployment on a large number of wireless access points (APs) in an IoT network to optimize both deployment cost and network latency. When the cloudlets has been deployed in the network, we propose a fault-tolerant cloudlet deployment scheme. When the original cloudlets in the network fail, the software-defined network technology is used to start the fault-tolerant cloudlets in time to ensure the stability of the network latency. To address the above problems, we propose a binary-based differential evolution cuckoo search (BDECS) algorithm, which selects the permanent cloudlet deployment location among a large number of APs on the network. Extensive simulations reveal that the proposed algorithm has better performance in minimizing cost and latency compared with other deploymegt algorithms. Moreover, the convergence speed of the BDECS algorithm is also superior to other algorithms.
相似文献In the Internet of Things (IoT), the number of devices connected to the internet, and they can collect and exchange information at any time. IoT is helpful for the progress of a smart city and different applications. Software-Defined Network (SDN) offers programmability and flexibility in the IoT network. Nevertheless, the adoption of the number of gadgets will increase the transmission delay and this will lead the network to heavy loaded. To overcome this issue, an efficient load balancing technique has to be presented in the SDN network. By considering this solution as an aim, spider monkey optimization algorithm based load balancing (LB-SMOA) is presented in this paper. Using this technique, the controller with minimum load is selected and this selected controller balances the load of the heavily loaded controller. Simulation results show that the performance of the proposed LB-SMOA outperforms the existing load balancing techniques in terms of average response time, packet loss rate, and throughput.
相似文献