An Optimal Cluster-Based Routing Algorithm for Lifetime Maximization of Internet of Things

Author(s):  
Ramin Yarinezhad ◽  
Masoud Sabaei
2020 ◽  
Author(s):  
Nadine Boudargham ◽  
Jacques Bou Abdo ◽  
Jacques Demerjian ◽  
Christophe Guyeux ◽  
Abdallah Makhoul

2019 ◽  
Vol 8 (2) ◽  
pp. 4054-4059

In present scenario, Mobile Ad-hoc Networks (MANETs) is the emerging research topic in the applications like disaster situations (battle fields, earthquake, etc). The utility of MANET is increased by combining with the internet. The conventional techniques in MANET have a few issues like less infrastructure, standalone networks, and dynamic or complex topology. In order to address these issues, an efficient clustering and channeling algorithm (Hybrid K-means, Particle Swarm Optimization (PSO) based Ad-hoc On-demand Distance Vector (AODV) channeling algorithm) is developed for maximizing the network lifetime. The proposed algorithm finds the optimal cluster head selection for discovering the shortest path among the cluster heads. The Hybrid-K-means-PSO-AODV technique is applied to increase the Network Lifetime (NL), alive nodes, total packet send, throughput, and also to minimizes the dead nodes and energy consumption in a network. In the experimental phase, the proposed approach reduced the emery consumption up to 170 joules related to the existing approaches: PSO-PSO- MANETs and PSO-GSO- MANETs.


2019 ◽  
Vol 01 (01) ◽  
pp. 42-61
Author(s):  
Jennifer S. Raj ◽  
Alphina Stephy S

The development in the area of networking is Internet of Things (IoT). This will interrelated the object and things together. The realization of IoT subsystems will be subjected to numerous constraints that include cost, power, energy, and lifetime. However, most challenging requirement will be trust. It is widely recognized that the attacks from malicious parties can activate from Internet to the physical word. Hence, trust of IoT is of essential importance. Therefore, trust management is considered as a efficient solution to IoT related issues. Trust management has useful technology for providing security service and it has been used in many applications such as P2P, Grid, adhoc network and so on. Thus the trust based routing algorithm in Internet of Things is proposed for providing a potential security system. With this, the major focus on the problem of trust on the malicious nodes in any environment.


2017 ◽  
Vol 4 (3) ◽  
pp. 1-16 ◽  
Author(s):  
Amol V. Dhumane ◽  
Rajesh S. Prasad ◽  
Jayashree R. Prasad

In Internet of things and its relevant technologies the routing of data plays one of the major roles. In this paper, a routing algorithm is presented for the networks consisting of smart objects, so that the Internet of Things and its enabling technologies can provide high reliability while the transmitting the data. The proposed technique executes in two stages. In first stage, the sensor nodes are clustered and an optimal cluster head is selected by using k-means clustering algorithm. The clustering is performed based on energy of sensor nodes. Then the energy cost of the cluster head and the trust level of the sensor nodes are determined. At second stage, an optimal path will be selected by using the Genetic Algorithm (GA). The genetic algorithm is based on the energy cost at cluster head, trust level at sensor nodes and path length. The resultant optimal path provides high reliability, better speed and more lifetimes.


Sensors ◽  
2020 ◽  
Vol 20 (3) ◽  
pp. 791 ◽  
Author(s):  
Liviu-Adrian Hîrţan ◽  
Ciprian Dobre ◽  
Horacio González-Vélez

A disruptive technology often used in finance, Internet of Things (IoT) and healthcare, blockchain can reach consensus within a decentralised network—potentially composed of large amounts of unreliable nodes—and to permanently and irreversibly store data in a tamper-proof manner. In this paper, we present a reputation system for Intelligent Transportation Systems (ITS). It considers the users interested in traffic information as the main actors of the architecture. They securely share their data which are collectively validated by other users. Users can choose to employ either such crowd-sourced validated data or data generated by the system to travel between two locations. The data saved is reliable, based on the providers’ reputation and cannot be modified. We present results with a simulation for three cities: San Francisco, Rome and Beijing. We have demonstrated the impact of malicious attacks as the average speed decreased if erroneous information was stored in the blockchain as an implemented routing algorithm guides the honest cars on other free routes, and thus crowds other intersections.


2013 ◽  
Vol 11 (4) ◽  
pp. 578-585 ◽  
Author(s):  
G. Li ◽  
D.G. Zhang ◽  
K. Zheng ◽  
X.C. Ming ◽  
Z.H. Pan ◽  
...  

Sign in / Sign up

Export Citation Format

Share Document