Research on low consumption ad hoc network method of mine the internet of Things

Author(s):  
Ge Bin
2014 ◽  
Vol 556-562 ◽  
pp. 5852-5854
Author(s):  
Ying Wei

The internet of things perception and recognition by the ubiquitous information to the physical world. Ad Hoc provide suitable network environment to the internet of things, whose routing protocol Protect data transmission efficient and reliable. This paper not only analyzes the particularity of Ad Hoc network technology in the Internet of Things, but also simulates AODV and DSDV in test environment to analysis the communication performance in the internet of things.


2020 ◽  
Vol 9 (1) ◽  
pp. 1532-1535

The vehicular ad hoc network is the network in which vehicles can move from one location to another without help of driver. The vehicle ad hoc network has two type of communication which is vehicles to vehicle and vehicle to road side units. The internet of things is the technology in which source can transmit sensed information over the internet. This research work is based on the vehicle of internet things. In the vehicles of internet things, the vehicles are connected with each other through internet. The various techniques of data aggregation in vehicle of things are reviewed in this paper and analyzed in terms of certain parameters


2020 ◽  
Author(s):  
Tanweer Alam

The Internet of Things (IoT) devices have the capabilities to interact and communicate in 5G heterogeneous networks. They also have the capabilities to form a network with neighborhood devices without a centralized approach. This network is called the mobile ad hoc network (MANET). Through an infrastructure-less system of the Internet of Things environment, the MANET enables IoT nodes to interact with one another. Those IoT nodes could interactively connect, communicate as well as share knowledge between several nodes. The role of cloud throughout this structure is to store as well as interpret information through IoT nodes. The communication security has been introduced as one of the techniques to solve the data transmission security issue that could result in increased performance in cloud consumption and ubiquity. The purpose of this research is to establish a communication system among IoT nodes in an embedded Cloud and MANET structure. Aiming to create an efficient and secure approach for communication in Cloud-MANET-IoT integrated framework, this approach has been implemented and tested.


2020 ◽  
Vol 4 (2) ◽  
pp. 90
Author(s):  
Tanweer Alam

In this paper, we propose a mobility framework for connecting the physical things in wireless ad hoc sensor networks. Our area of study is the internet of things by using an ad hoc sensor network. Our purpose in this study is to create a mobility framework for the internet of things. For example- how we connect many physical objects and give them a sense of sensing each other in an ad hoc environment. We can connect different physical objects in a framework of an ad hoc sensor network. Our main contribution is a new methodology for simulating mobility physical objects for the internet of things. Our methodology uses the correct and efficient simulation of the desired study and can be implemented in a framework of ad hoc sensor networks. Our study will generate a new framework for solving the issue of connectivity among physical objects. The proposed mobility framework is feasible to run among physical objects using the ad hoc sensor network.


Author(s):  
Xiaoni Wang ◽  
◽  

Through ad hoc routing protocol AODVjr and resource-aware data mining algorithms research, a resource-aware clustering based routing protocol in the Internet of Things, RA-AODVjr, is proposed. It solves the short comings of the constrained resources of memory, computing power, and the power energy of the wireless sensor’s terminal node in the Internet of Things. RA-AODVjr protocol is designed combining with the RA-cluster and AODVjr routing protocol. This protocol selects the best neighbor in the terminal node and balances the network traffic when terminal node resource is constrained, using the relevance of the ad hoc network. The simulation results show that the agreement achieves load balancing of energy constrained nodes to a certain extent. Compared with the original AODVjr protocol, due to the best neighbor node delivery technology, the local network traffic gets a better balance and less time delay means better choice of routing.


2020 ◽  
Author(s):  
Tanweer Alam

The Internet of Things (IoT) devices have capabilities to interact and communicate in 5G heterogeneous networks. The IoT devices also have capabilities to form a network with neighborhood devices without a centralized approach. This network is called the mobile ad hoc network (MANET). Through an infrastructure-less system of the Internet of Things environment, the MANET enables IoT nodes to interact with one another. Those IoT nodes could interactively connect, communicate as well as share knowledge between several nodes. The role of cloud throughout this structure would be to store as well as interpret information through IoT nodes. The communication security has also been introduced to be one of the techniques in which trying to solve the data transmission security issue that could result in the performance increase in cloud consumption and ubiquity. Our purpose in this research would be to establish a communication system among IoT nodes in such an embedded Cloud and MANET structure. The main goal of this research is to create an efficient and secure approach for communication in Cloud-MANET-IoT integrated framework. This approach is implemented and tested.


2020 ◽  
Author(s):  
Tanweer Alam

The Internet of Things (IoT) devices have capabilities to interact and communicate in 5G heterogeneous networks. The IoT devices also have capabilities to form a network with neighborhood devices without a centralized approach. This network is called the mobile ad hoc network (MANET). Through an infrastructure-less system of the Internet of Things environment, the MANET enables IoT nodes to interact with one another. Those IoT nodes could interactively connect, communicate as well as share knowledge between several nodes. The role of cloud throughout this structure would be to store as well as interpret information through IoT nodes. The communication security has also been introduced to be one of the techniques in which trying to solve the data transmission security issue that could result in the performance increase in cloud consumption and ubiquity. Our purpose in this research would be to establish a communication system among IoT nodes in such an embedded Cloud and MANET structure. The main goal of this research is to create an efficient and secure approach for communication in Cloud-MANET-IoT integrated framework. This approach is implemented and tested.


2020 ◽  
Vol 2020 ◽  
pp. 1-21
Author(s):  
Muhammad Haleem Junejo ◽  
Ab Al-Hadi Ab Rahman ◽  
Riaz Ahmed Shaikh ◽  
Kamaludin Mohamad Yusof ◽  
Imran Memon ◽  
...  

The Internet of things (IoT) and advancements of wireless technology have evolved intelligent transport systems to integrate billion of smart objects ready to connect to the Internet. The modern era of the Internet of things (IoT) has brought significant development in vehicular ad hoc networks (VANETs) which transformed the conventional VANET into the Internet of Vehicle (IoV) to improve road safety and diminished road congestion. However, security threats are increasing due to dependency on infrastructure, computing, dynamic nature, and control technologies of VANET. The security threats of VANETs could be addressed comprehensively by increasing trustworthiness on the message received and transmitting node. Conversely, the presence of dishonest vehicles, for instance, Man in the Middle (MiTM) attackers, in the network sharing malicious content could be posed as a severe threat to VANET. Thus, increasing trustworthiness among nodes can lead to increased authenticity, privacy, accuracy, security, and trusted information sharing in the VANET. In this paper, a lightweight trust model is proposed, presented model identifying dishonest nodes and revoking its credential in the MiTM attack scenario. Furthermore, addressing the privacy and security requirement, the pseudonym scheme is used. All nodes in the VANET established trust provided by initially RSU, which is a trusted source in the network. Extensive experiments are conducted based on a variety of network scenarios to evaluate the accuracy and performance of the presented lightweight trust model. In terms of recall, precision, and F-score, our presented model significantly outperformed compared to MARINE. The simulation results have validated that the proposed lightweight model realized a high trust level with 40% of MiTM attackers and in terms of F-score 95%, whereas the MARINE model has 90%, which leads to the model to attain high detection accuracy.


Sign in / Sign up

Export Citation Format

Share Document