7 research outputs found
Energy and Delay Aware Data Aggregation in Routing Protocol for Internet of Things
Energy conservation is one of the most critical problems in Internet of Things (IoT). It can be achieved in several ways, one of which is to select the optimal route for data transfer. IPv6 Routing Protocol for Low Power and Lossy Networks (RPL) is a standardized routing protocol for IoT. The RPL changes its path frequently while transmitting the data from source to the destination, due to high data traffic in dense networks. Hence, it creates data traffic across the nodes in the networks. To solve this issue, we propose Energy and Delay Aware Data aggregation in Routing Protocol (EDADA-RPL) for IoT. It has two processes, namely parent selection and data aggregation. The process of parent selection uses routing metric residual energy (RER) to choose the best possible parent for data transmission. The data aggregation process uses the compressed sensing (CS) theory in the parent node to combine data packets from the child nodes. Finally, the aggregated data transmits from a downward parent to the sink. The sink node collects all the aggregated data and it performs the reconstruction operation to get the original data of the participant node. The simulation is carried out using the Contiki COOJA simulator. EDADA-RPL’s performance is compared to RPL and LA-RPL. The EDADA-RPL offers good performance in terms of network lifetime, delay, and packet delivery ratio
CT-RPL: Cluster Tree Based Routing Protocol to Maximize the Lifetime of Internet of Things
Energy conservation is one of the most critical challenges in the Internet of Things (IoT). IoT devices are incredibly resource-constrained and possess miniature power sources, small memory, and limited processing ability. Clustering is a popular method to avoid duplicate data transfer from the participant node to the destination. The selection of the cluster head (CH) plays a crucial role in gathering and aggregating the data from the cluster members and forwarding the data to the sink node. The inefficient CH selection causes packet failures during the data transfer and early battery depletion nearer to the sink. This paper proposes a cluster tree-based routing protocol (CT-RPL) to increase the life span of the network and avoid the data traffic among the network nodes. The CT-RPL involves three processes, namely cluster formation, cluster head selection, and route establishment. The cluster is formed based on the Euclidean distance. The CH selection is accomplished using a game theoretic approach. Finally, the route is established using the metrics residual energy ratio (RER), queue utilization (QU), and expected transmission count (ETX). The simulation is carried out by using a COOJA simulator. The efficiency of a CT-RPL is compared with the Routing Protocol for Low Power and Lossy Networks (RPL) and energy-efficient heterogeneous ring clustering routing (E2HRC-RPL), which reduces the traffic load and decreases the packet loss ratio. Thus, the CT-RPL enhances the lifetime of the network by 30–40% and the packet delivery ratio by 5–10%
MADCR:Mobility aware dynamic clustering-based routing protocol in Internet of Vehicles
Internet of Vehicles (IoV) is an evolution of the Internet of Things (IoT) to improve the capabilities of vehicular ad-hoc networks (VANETs) in intelligence transport systems. The network topology in IoV paradigm is highly dynamic. Clustering is one of the promising solutions to maintain the route stability in the dynamic network. However, existing algorithms consume a considerable amount of time in the cluster head (CH) selection process. Thus, this study proposes a mobility aware dynamic clustering-based routing (MADCR) protocol in IoV to maximize the lifespan of networks and reduce the end-to-end delay of vehicles. The MADCR protocol consists of cluster formation and CH selection processes. A cluster is formed on the basis of Euclidean distance. The CH is then chosen using the mayfly optimization algorithm (MOA). The CH subsequently receives vehicle data and forwards such data to the Road Side Unit (RSU). The performance of the MADCR protocol is compared with that of Ant Colony Optimization (ACO), Comprehensive Learning Particle Swarm Optimization (CLPSO), and Clustering Algorithm for Internet of Vehicles based on Dragonfly Optimizer (CAVDO). The proposed MADCR protocol decreases the end-to-end delay by 5-80 ms and increases the packet delivery ratio by 5%-15%
Secure and efficient transmission of data based on Caesar Cipher Algorithm for Sybil attack in IoT
The Internet of Things (IoT) is an emerging concept in the field of information technology. IoT can integrate any real-time entity with another, using sensing, computing and communication capabilities to offer enhanced services in everyday life. In this article, IoT-based patient health monitoring is considered for use in IoT sensors deployed in devices. These devices are attached to the body of the patient for timely tracking of his or her health condition. During data transfers from devices connected to the patient’s body to the doctor, the data may be susceptible to security threats. IoT devices are subjected to many routing attacks, like blackhole, greyhole, Sybil, sinkhole and wormhole attacks. Sybil attacks are the most dangerous routing attacks. This type of attack involves stealing the identities of legitimate nodes; this, in turn, leads to information loss, misinterpretation in the network and an increase in routing disturbances. Hence, in this paper, we propose the use of the traditional Caesar Cipher Algorithm (CCA) along with the lightweight encryption algorithm (LEA) and the Received Signal Strength Indicator (RSSI) to detect and prevent Sybil attacks in an IoT environment. The proposed algorithm detects the false node in a particular path by announcing the attack to another node. It also prevents the attack by choosing an alternative path by which to forward data packets to the desired users. To ensure authentication, privacy and data integrity, the lightweight encryption algorithm with a 64-bit key is used with AODV as the routing protocol