scholarly journals Routing protocols for internet of things: a survey

2018 ◽  
Vol 7 (2.4) ◽  
pp. 196 ◽  
Author(s):  
Tamoghno Romario Bhattacharyya ◽  
Dr M. Pushpalatha

The world of wireless sensor network(WSN) is widening day by day and the latest technology in use the Internet of Things known as IOT is the latest craze in it. But the IOT technique and its devices requires routing protocols in situations like low power and lossy networks(LLNs) which brings great challenges. In many and some emergency cases, like in case of large and more data traffic which causes to lead in network congestions and also brings loss in packets and delay. In order to overcome all this problems , many group research and individuals are trying and focusing on different solutions to maximize the throughput for the RPL network. In this paper we will we studying and reviewing some of the different methods that has been taken to maximize the throughput in the network and hence try to come to a conclusion for the future techniques needed to be done.  

2021 ◽  
Vol 15 (02) ◽  
pp. 19-24
Author(s):  
Vishv Patel ◽  
Devansh Shah ◽  
Nishant Doshi

The large deployment of the Internet of Things (IoT) is empowering Smart City tasks and activities everywhere throughout the world. Items utilized in day-by-day life are outfitted with IoT devices and sensors to make them interconnected and connected with the internet. Internet of Things (IoT) is a vital piece of a smart city that tremendously impact on all the city sectors, for example, governance, healthcare, mobility, pollution, and transportation. This all connected IoT devices will make the cities smart. As different smart city activities and undertakings have been propelled in recent times, we have seen the benefits as well as the risks. This paper depicts the primary challenges and weaknesses of applying IoT innovations dependent on smart city standards. Moreover, this paper points the outline of the technologies and applications of the smart cities.


2019 ◽  
Vol 20 (3) ◽  
pp. 457-484 ◽  
Author(s):  
Syed Rameem Zahra ◽  
Mohammad Ahsan Chishti

The purpose of this paper is to chalk out the criticality of the most important pillar of Internet of Things (IoT),i.e., Security and Privacy (S&P). IoT has seen its journey from implausible and impossible to sustainable and tenable. Its rateof expansion into various grounds from agriculture to sports; personal health to intelligent trac detection; waste managementto smart homes is astonishing, dramatic and unforeseen. With such vast adaptability and functionality, its security remains thebiggest concern because in contrast to the traditional networks, IoT faces huge vulnerabilities some of which are inherent and othersexplicit. The existing security solutions cannot be implemented in IoT because of its unique characteristics. Therefore, there is adire need to develop novel security procedures betting IoT. This paper spots the features that are peculiar to IoT and concurrentlyanalyzes the security threats and challenges they pose. This work also provides a glimpse of the major IoT implementations withtheir particular security requirements and challenges. Moreover, this paper critically evaluates the proposed countermeasures tosecurity attacks on dierent features and why they cannot be used in IoT environments. Also, it is found that most of the securitysolutions used in IoT devices are inspired from Wireless Sensor Networks (WSN) but the striking dierences among the two makethem inadequate in IoT. The security requirements and challenges peculiar to various IoT services are also identied. To assist theresearchers in remaining up-to-date, we for the rst time have thoroughly expressed some of the most famous and practical attacksfaced across the world in the recent past, how much damage they caused, how much nancial losses were faced, etc.


Energies ◽  
2021 ◽  
Vol 14 (9) ◽  
pp. 2417
Author(s):  
Andrzej Michalski ◽  
Zbigniew Watral

This article presents the problems of powering wireless sensor networks operating in the structures of the Internet of Things (IoT). This issue was discussed on the example of a universal end node in IoT technology containing RFID (Radio Frequency Identification) tags. The basic methods of signal transmission in these types of networks are discussed and their impact on the basic requirements such as range, transmission speed, low energy consumption, and the maximum number of devices that can simultaneously operate in the network. The issue of low power consumption of devices used in IoT solutions is one of the main research objects. The analysis of possible communication protocols has shown that there is a possibility of effective optimization in this area. The wide range of power sources available on the market, used in nodes of wireless sensor networks, was compared. The alternative possibilities of powering the network nodes from Energy Harvesting (EH) generators are presented.


2020 ◽  
Vol 9 (2) ◽  
pp. 136-138 ◽  
Author(s):  
Md. Siddikur Rahman ◽  
Noah C. Peeri ◽  
Nistha Shrestha ◽  
Rafdzah Zaki ◽  
Ubydul Haque ◽  
...  

2015 ◽  
Vol 2015 ◽  
pp. 1-16 ◽  
Author(s):  
Jun Huang ◽  
Liqian Xu ◽  
Cong-cong Xing ◽  
Qiang Duan

The design of wireless sensor networks (WSNs) in the Internet of Things (IoT) faces many new challenges that must be addressed through an optimization of multiple design objectives. Therefore, multiobjective optimization is an important research topic in this field. In this paper, we develop a new efficient multiobjective optimization algorithm based on the chaotic ant swarm (CAS). Unlike the ant colony optimization (ACO) algorithm, CAS takes advantage of both the chaotic behavior of a single ant and the self-organization behavior of the ant colony. We first describe the CAS and its nonlinear dynamic model and then extend it to a multiobjective optimizer. Specifically, we first adopt the concepts of “nondominated sorting” and “crowding distance” to allow the algorithm to obtain the true or near optimum. Next, we redefine the rule of “neighbor” selection for each individual (ant) to enable the algorithm to converge and to distribute the solutions evenly. Also, we collect the current best individuals within each generation and employ the “archive-based” approach to expedite the convergence of the algorithm. The numerical experiments show that the proposed algorithm outperforms two leading algorithms on most well-known test instances in terms of Generational Distance, Error Ratio, and Spacing.


Sign in / Sign up

Export Citation Format

Share Document