Resource-aware clustering based routing protocol in the Internet of Things

Author(s):  
Xiaoni Wang
Author(s):  
Xiaoni Wang ◽  
◽  

Through ad hoc routing protocol AODVjr and resource-aware data mining algorithms research, a resource-aware clustering based routing protocol in the Internet of Things, RA-AODVjr, is proposed. It solves the short comings of the constrained resources of memory, computing power, and the power energy of the wireless sensor’s terminal node in the Internet of Things. RA-AODVjr protocol is designed combining with the RA-cluster and AODVjr routing protocol. This protocol selects the best neighbor in the terminal node and balances the network traffic when terminal node resource is constrained, using the relevance of the ad hoc network. The simulation results show that the agreement achieves load balancing of energy constrained nodes to a certain extent. Compared with the original AODVjr protocol, due to the best neighbor node delivery technology, the local network traffic gets a better balance and less time delay means better choice of routing.


Author(s):  
Faiza Medjek ◽  
Djamel Tandjaoui ◽  
Imed Romdhani ◽  
Nabil Djedjig

In the internet of things (IoT) vision, people, systems, and objects with sensing and/or actuating capabilities communicate to monitor and control the physical world. Nowadays, the IoT concept has attracted significant attention from different application domain such as healthcare and smart homes. Indeed, self-organization and self-configuration are key characteristics of IoT given that IoT represents a pervasive environment where objects are resource-constrained and communication technologies are very ubiquitous. These characteristics in addition to the vulnerability of objects themselves and of the communication channels make IoT more susceptible to malicious attacks. In this context, a deep analysis of IoT security breach and vulnerabilities is necessary. This chapter presents IoT requirements and existing threats as well as security protocols and mechanisms. It specifically analyzes existing and new threats against the IoT's routing protocol (the routing protocol for low-power and lossy networks: RPL) and presents intrusion detection solutions (IDS) to counter RPL attacks.


2020 ◽  
Vol 10 (3) ◽  
pp. 1-17
Author(s):  
Asma Lahbib ◽  
Khalifa Toumi ◽  
Anis Laouiti ◽  
Steven Martin

2021 ◽  
Vol 23 (07) ◽  
pp. 1499-1508
Author(s):  
Bhukya Suresh ◽  
◽  
G Shyama Chandra Prasad ◽  

Wireless Sensor Networks (WSNs) are a resource-constrained network class recognized as a major energy consumer. Wireless sensor technologies are used in many commercialized industrial automation processes and other real-world applications. The WSN protocol is well-suited to harsh situations where deployment is difficult or impossible, such as the battlefield, a toxic chemical plant, the cloud, fog computing, and the Internet of Things, but not in a high-temperature network infrastructure environment. WSNs have introduced various Energy-Efficient Routing Protocols based on network (NW) organization and protocols in recent years. Various WSN routing options for energy efficiency are explored in this work. The WSN Energy Efficient Routing Protocol is compared to other routing systems. We also compare and investigate better WSN routing algorithms for cloud computing, fog computing, and the Internet of Things.


Sign in / Sign up

Export Citation Format

Share Document