Most of the current research has been restricted to scalar sensor data based IoT applications. However, today’s research and development activities rely on multimedia-based services and applications while this kind of applications has several requirements in terms of storage, bandwidth, latency, etc. Furthermore, protocols dedicated to IoT applications have proved their weakness in multimedia environments. Hence, a new paradigm called internet of multimedia things (IoMT) has been proposed to fulfill the requirements of multimedia applications. In this paradigm different multimedia things can interact and cooperate with each other over the Internet. Moreover, IETF ROLL working group standardized an IPv6 routing protocol for low-power and lossy networks (RPL for LLNs) for resource constrained devices. In this paper, we propose an enhanced version of RPL for IoMT called free bandwidth (FreeBW)-RPL in which the sensed data is essentially provided by multimedia devices. FreeBW-RPL protocol proposes a new objective function called FreeBW that takes the FreeBW calculation in the network layer. We set the QoS routing challenge as the amount of the bandwidth while selecting the routing path in order to measure the maximum FreeBW so as to deliver better performance of the multimedia applications. Simulations have been conducted over COOJA simulator. The obtained results proved that our proposal outperforms the basic ones in terms of end-to-end delay, throughput, packet delivery ratio and energy consumption and provides better performance than other protocols.
相似文献WSN serves as a medium for linking the physical and information network of IoT. Energy and trust are the two major factors that facilitate reliable communication in the network. During multicast routing, the BS engages in forwarding the data securely to the multiple destinations through the intermediate nodes, which is the major challenge in IoT. The paper addresses the challenges through proposing an energy-aware multicast routing protocol based on the optimization, CrowWhale-ETR, which is the integration of CSA and WOA based on the objective function designed with the energy and trust factors of the nodes. Initially, the trust and energy of the nodes are evaluated for establishing the routes that is chosen optimally using CWOA. This optimally chosen path is used for the data transmission, in which energy and trusts of the individual nodes are updated at the end of the individual transmission, in such a way the secure nodes can be selected, and which improves the secure communication in the network. The simulation is analyzed using 50 and 100 nodes in terms of the performance measures. The proposed method acquired the minimal delay of 0.2729 and 0.3491, maximal detection rate of 0.6726, maximal energy of 66.4275 and 71.0567, and maximal throughput of 0.4625 and 0.8649 in the presence and absence of attacks with 50 nodes for analysis.
相似文献The wireless sensor network based IoT applications mainly suffers from end to end delay, loss of packets during transmission, reduced lifetime of sensor nodes due to loss of energy. To address these challenges, we need to design an efficient routing protocol that not only improves the network performance but also enhances the Quality of Service. In this paper, we design an energy-efficient routing protocol for wireless sensor network based IoT application having unfairness in the network with high traffic load. The proposed protocol considers three-factor to select the optimal path, i.e., lifetime, reliability, and the traffic intensity at the next-hop node. Rigorous simulation has been performed using NS-2. Also, the performance of the proposed protocol is compared with other contemporary protocols. The results show that the proposed protocol performs better concerning energy saving, packet delivery ratio, end-to-end delay, and network lifetime compared to other protocols.
相似文献Many errors in data communication cause security attacks in Internet of Things (IoT). Routing errors at network layer are prominent errors in IoT which degrade the quality of data communication. Many attacks like sinkhole attack, blackhole attack, selective forwarding attack and wormhole attack enter the network through the network layer of the IoT. This paper has an emphasis on the detection of a wormhole attack because it is one of the most uncompromising attacks at the network layer of IoT protocol stack. The wormhole attack is the most disruptive attack out of all the other attacks mentioned above. The wormhole attack inserts information on incorrect routes in the network; it also alters the network information by causing a failure of location-dependent protocols thus defeating the purpose of routing algorithms. This paper covers the design and implementation of an innovative intrusion detection system for the IoT that detects a wormhole attack and the attacker nodes. The presence of a wormhole attack is identified using location information of any node and its neighbor with the help of Received Signal Strength Indicator (RSSI) values and the hop-count. The proposed system is energy efficient hence it is beneficial for a resource-constrained environment of IoT. It also provides precise true-positive (TPR) and false-positive detection rate (FPR).
相似文献Recently, Internet is moving quickly toward the interaction of objects, computing devices, sensors, and which are usually indicated as the Internet of things (IoT). The main monitoring infrastructure of IoT systems main monitoring infrastructure of IoT systems is wireless sensor networks. A wireless sensor network is composed of a large number of sensor nodes. Each sensor node has sensing, computing, and wireless communication capability. The sensor nodes send the data to a sink or a base station by using wireless transmission techniques However, sensor network systems require suitable routing structure to optimizing the lifetime. For providing reasonable energy consumption and optimizing the lifetime of WSNs, novel, efficient and economical schemes should be developed. In this paper, for enhancing network lifetime, a novel energy-efficient mechanism is proposed based on fuzzy logic and reinforcement learning. The fuzzy logic system and reinforcement learning is based on the remained energies of the nodes on the routes, the available bandwidth and the distance to the sink. This study also compares the performance of the proposed method with the fuzzy logic method and IEEE 802.15.4 protocol. The simulations of the proposed method which were carried out by OPNET (Optimum Network performance) indicated that the proposed method performed better than other protocols such as fuzzy logic and IEEE802.15.4 in terms of power consumption and network lifetime.
相似文献There are many smart applications evolved in the area of the wireless sensor networks. The applications of WSNs are exponentially increasing every year which creates a lot of security challenges that need to be addressed to safeguard the devices in WSN. Due to the dynamic characteristics of these resource constrained devices in WSN, there must be high level security requirements to be considered to create a high secure environments. This paper presents an efficient multi attribute based routing algorithm to provide secure routing of information for WSNs. The work proposed in this paper can decrease the energy and enhances the performance of the network than the currently available routing algorithm such as multi-attribute pheromone ant secure routing algorithm based on reputation value and ant-colony optimization algorithm. The proposed work secures the network environment with the improved detection techniques based on nodes’ higher coincidence rates to find the malicious behavior using trust calculation algorithm. This algorithm uses some QoS parameters such as reliability rate, elapsed time to detect impersonation attacks, and stability rate for trust related attacks, to perform an efficient trust calculation of the nodes in communication. The outcome of the simulation show that the proposed method enhances the performance of the network with the improved detection rate and secure routing service.
相似文献Constraint Application Protocol (CoAP), an application layer based protocol, is a compressed version of HTTP protocol that is used for communication between lightweight resource constraint devices in Internet of Things (IoT) network. The CoAP protocol is generally associated with connectionless User Datagram Protocol (UDP) and works based on Representational State Transfer architecture. The CoAP is associated with Datagram Transport Layer Security (DTLS) protocol for establishing a secure session using the existing algorithms like Lightweight Establishment of Secure Session for communication between various IoT devices and remote server. However, several limitations regarding the key management, session establishment and multi-cast message communication within the DTLS layer are present in CoAP. Hence, development of an efficient protocol for secure session establishment of CoAP is required for IoT communication. Thus, to overcome the existing limitations related to key management and multicast security in CoAP, we have proposed an efficient and secure communication scheme to establish secure session key between IoT devices and remote server using lightweight elliptic curve cryptography (ECC). The proposed ECC-based CoAP is referred to as ECC-CoAP that provides a CoAP implementation for authentication in IoT network. A number of well-known cryptographic attacks are analyzed for validating the security strength of the ECC-CoAP and found that all these attacks are well defended. The performance analysis of the ECC-CoAP shows that our scheme is lightweight and secure.
相似文献The idea of Smart City incorporates a few ideas being technology, economy, governance, people, management, and infrastructure. This implies a Smart City can have distinctive communication needs. Wireless technologies, for example, WiFi, Zig Bee, Bluetooth, WiMax, 4G or LTE have introduced themselves as a solution for the communication in Smart City activities. Nonetheless, as the majority of them utilize unlicensed interference, coexistence and bands issues are increasing. So to solve the problem IoT is used in smart cities. This paper addresses the issues of both resource allocation and routing to propose an energy efficient, congestion aware resource allocation and routing protocol (ECRR) for IoT network based on hybrid optimization techniques. The first contribution of proposed ECRR technique is to employ the data clustering and metaheuristic algorithm for allocate the large-scale devices and gateways of IoT to reduce the total congestion between them. The second contribution is to propose a queue based swarm optimization algorithm for select a better route for future route based on multiple constraints, which improves the route discovering mechanism. The proposed ECRR technique is implemented in Network Simulator (NS-2) tool and the simulation results are compared with the existing state-of-art techniques in terms of energy consumption, node lifetime, throughput, end-to-end delay, packet delivery ratio and packet overheads.
相似文献The wireless sensor network (WSN) is always known for its limited-energy issues and finding a good solution for energy minimization in WSNs is still a concern for researchers. Implementing mobility to the sink node is used widely for energy conservation or minimization in WSNs which reduces the distance between sink and communicating nodes. In this paper, with the intention to conserve energy from the sensor nodes, we designed a clustering based routing protocol implementing a mobile sink called ‘two dimensional motion of sink node (TDMS)’. In TDMS, each normal sensor node collects data and send it to their respective leader node called cluster head (CH). The sink moves in the two dimensional direction to collect final data from all CH nodes, particularly it moves in the direction to that CH which has the minimum remaining energy. The proposed protocol is validated through rigorous simulation using MATLAB and comparisons have been made with WSN’s existing static sink and mobile sink routing protocols over two different geographical square dimensions of the network. Here, we found that TDMS model gives the optimal result on energy dissipation per round and increased network lifetime.
相似文献The wireless body area network (WBAN) can effectively modify the health and lifestyle monitoring specifically where multiple body parameters are measured using biomedical sensor devices. However, power consumption and reliability are crucial issues in WBAN. Cooperative Communication usually prolongs the network lifetime of WBAN and allows reliable delivery of bio-medical packets. Hence, the main aim of this investigation is to propose a novel protocol Cooperative Energy efficient and Priority based Reliable routing protocol with Network coding (CEPRAN) to enhance the reliability and energy efficiency of WBAN using cooperative communication method. Firstly, to identify a relay node from the group of sensor nodes for data forwarding, an enhanced Cuckoo search optimization algorithm is proposed. Secondly, Cooperative Random Linear Network Coding approach is incorporated into the relay node to improve the packet transfer rate. CEPRAN is implemented in Ns-3 simulator and the experimental results prove that the proposed protocol outperforms the existing SIMPLE Protocol.
相似文献