scholarly journals Protect Mobile Travelers Information in Sensitive Region Based on Fuzzy Logic in IoT Technology

2020 ◽  
Vol 2020 ◽  
pp. 1-12
Author(s):  
Imran Memon ◽  
Riaz Ahmed Shaikh ◽  
Mohammad Kamrul Hasan ◽  
Rosilah Hassan ◽  
Amin Ul Haq ◽  
...  

The Internet of Things (IoT) is susceptible to several identities, primarily based on attacks. However, these attacks are controlling for IoT due to extraordinary growth in consumers’ density and slight analysis with low power access nodes. In this work, we explore the possible flaws associated with security for IoT environment insensitively meant for transfer conditions. We proposed a novel design aimed at detecting a spoofing attack that inspects the probability distributions of received power founded for the regions designed for mobile (moving) users. Additionally, we examine the influence on the Confidentiality Scope of targeted consumers in the absence and presence of observer. Our approaches were done through simulation results used for three diverse regions. Grounded on outcomes, we suggest an algorithm called MTFLA, which will guarantee detection and protection techniques intended to protect vastly sensitive areas, i.e., wherever the chance of an attack is maximized. We provide a comparison among various security algorithms prepared for the energy consumption of different patterns. Simulation results revealed that the proposed algorithm for protection (MTFL) is verified to be energy-proficient (secure garnering). It decreases the energy prerequisite for encrypting the data. We evaluated our techniques over simulation results for sensitive region information built on fuzzy logic.

2019 ◽  
Vol 01 (02) ◽  
pp. 31-39 ◽  
Author(s):  
Duraipandian M. ◽  
Vinothkanna R.

The paper proposing the cloud based internet of things for the smart connected objects, concentrates on developing a smart home utilizing the internet of things, by providing the embedded labeling for all the tangible things at home and enabling them to be connected through the internet. The smart home proposed in the paper concentrates on the steps in reducing the electricity consumption of the appliances at the home by converting them into the smart connected objects using the cloud based internet of things and also concentrates on protecting the house from the theft and the robbery. The proposed smart home by turning the ordinary tangible objects into the smart connected objects shows considerable improvement in the energy consumption and the security provision.


Sensors ◽  
2020 ◽  
Vol 20 (1) ◽  
pp. 283
Author(s):  
Fawad Ali Khan ◽  
Rafidah Md Noor ◽  
Miss Laiha Mat Kiah ◽  
Ismail Ahmedy ◽  
Mohd Yamani ◽  
...  

Internet of Things (IoT) facilitates a wide range of applications through sensor-based connected devices that require bandwidth and other network resources. Enhancement of efficient utilization of a heterogeneous IoT network is an open optimization problem that is mostly suffered by network flooding. Redundant, unwanted, and flooded queries are major causes of inefficient utilization of resources. Several query control mechanisms in the literature claimed to cater to the issues related to bandwidth, cost, and Quality of Service (QoS). This research article presented a statistical performance evaluation of different query control mechanisms that addressed minimization of energy consumption, energy cost and network flooding. Specifically, it evaluated the performance measure of Query Control Mechanism (QCM) for QoS-enabled layered-based clustering for reactive flooding in the Internet of Things. By statistical means, this study inferred the significant achievement of the QCM algorithm that outperformed the prevailing algorithms, i.e., Divide-and-Conquer (DnC), Service Level Agreements (SLA), and Hybrid Energy-aware Clustering Protocol for IoT (Hy-IoT) for identification and elimination of redundant flooding queries. The inferential analysis for performance evaluation of algorithms was measured in terms of three scenarios, i.e., energy consumption, delays and throughput with different intervals of traffic, malicious mote and malicious mote with realistic condition. It is evident from the results that the QCM algorithm outperforms the existing algorithms and the statistical probability value “P” < 0.05 indicates the performance of QCM is significant at the 95% confidence interval. Hence, it could be inferred from findings that the performance of the QCM algorithm was substantial as compared to that of other algorithms.


2014 ◽  
Vol 590 ◽  
pp. 741-745
Author(s):  
Peng Wang ◽  
Yue Jiang ◽  
Xu Chuan Zhou ◽  
Hao Yang

The Internet of Things (IOT) provides people with a more integrated and intelligent services. The applications based IOT is focus on the solution driving safety in the paper. The design of driving safety control system based on the IOT is proposed and the topology of the system is given. Meanwhile, the alcohol content testing modeling of human blood after drinking is established using the simple differential equations sets. Meanwhile, the model is established and the model solution is given. In the end, MATLAB fitting curves of alcohol content in the blood is proposed and the simulation results showed whether measures are taken after driving, such driving permitted. it shows deeply intelligent driving safety control system can provide mankind with the better services of personal security.


2020 ◽  
pp. 6-10
Author(s):  
Arulanantham D ◽  
Pradeepkumar G ◽  
Palanisamy C ◽  
Dineshkumar Ponnusamy

The Internet of Things (IoT) is an establishment with sensors, base station, gateway, and network servers. IoT is an efficient and intellectual system that minimizes human exertion as well as right to use to real devices. This method also has an autonomous control property by which any device can control without any human collaboration. IoT-based automation has become very reasonable and it has been applied in several sectors such as manufacturing, transport, health care, consumer electronics, etc. In WSN’s smaller energy consumption sensors are expected to run independently for long phases. So much ongoing researches on implementing routing protocols for IoTbased WSNs.Energy consciousness is an essential part of IoT based WSN design issue. Minimalizing Energy consumption is well-thought-out as one of the key principles in the Expansion of routing protocols for the Internet of things. In this paper, we propose a Location based Energy efficient path routing for Internet of things and its applications its sensor position and clustering based finding the shortest path and real time implementation of Arduino based wireless sensor network architecture with the ESP8266 module. Finally, analyze the principles of Location-based energy-efficient routing and performance of QoS parameters, and then implemented automatic gas leakage detection and managing system.


Author(s):  
Jing-Shu Sun ◽  
Teng Zhu ◽  
Marcin Wozniak

AbstractCurrent IoT communication node spacing selection process show may potential areas for improvements such as high delay ratio, high total energy consumption ratio, confusion of the optimal communication information band, intelligent spacing node design under the constraints of the energy-saving selection of IoT communication. Based on energy-saving constraints, the link status between nodes is evaluated through link stability and link quality. In order to prevent the generation of serious noisy nodes and frequency hopping data, the interference nodes under the intrusion of the Internet of Things are identified by determining transition amplitude of the noise nodes in the transmission data sequence. Finally, according to the calculation results of the optimal communication node selection, the design of the intelligent spacing selection model for the communication nodes of the Internet of Things is realized. The simulation results show that the established model not only reduces energy consumption of nodes, shortens the average transmission delay of nodes, but also improves anti-interference effect of node spacing selection.


2021 ◽  
Vol 2021 ◽  
pp. 1-20
Author(s):  
Abbas Akhbari ◽  
Ali Ghaffari

The Internet of things describes a network of physical things for example, “things” that are connected with the sensors, software, and other technologies to connect and exchange data with other devices and systems via the Internet. In this type of network, the nodes communicate with each other because of the low radio range by step by step with the help of each other until they reach their destination, but there are nodes in the network that do not cooperate with other nodes in the network, which are called “selfish nodes”. In this paper, we try to detect selfish nodes based on a hybrid approach to increase the performance of our network. The proposed method consists of three stages: in the first stage, with the help of the Harris hawk operation, we try to set up the cluster and select head cluster; in the second stage, the sink investigates the existence or nonexistence of selfish nodes in the network by considering the general parameters of the network; and in the event of a selfish node in the network, it informs the head clusters to check the cluster members and recognize the selfish node. In the third stage, with the help of fuzzy logic, the amount of reputation of each of the nodes has been realized, and finally, with the help of fusion of head clusters and fuzzy logic, each node is decided to be cooperate or selfish nodes, and in case of head clusters and fuzzy logic in some cases, the opportunity node will be reestablished to participate in network activities otherwise the node will be isolated. The results show that the accuracy of selfish node detection has increased by an average of 12% and the false positive rate is 8% in comparison to existing methods.


Sign in / Sign up

Export Citation Format

Share Document