scholarly journals QoS Enabled Layered Based Clustering for Reactive Flooding in the Internet of Things

Symmetry ◽  
2019 ◽  
Vol 11 (5) ◽  
pp. 634 ◽  
Author(s):  
Fawad Ali Khan ◽  
Rafidah Md Noor ◽  
Miss Laiha Mat Kiah ◽  
Noorzaily Mohd Noor ◽  
Saleh M. Altowaijri ◽  
...  

The Internet of Things has gained substantial attention over the last few years, because of connecting daily things in a wide range of application and domains. A large number of sensors require bandwidth and network resources to give-and-take queries among a heterogeneous IoT network. Network flooding is a key questioning strategy for successful exchange of queries. However, the risk of the original flooding is prone to unwanted and redundant network queries which may lead to heavy network traffic. Redundant, unwanted, and flooded queries are major causes of inefficient utilization of resources. IoT devices consume more energy and high computational time. More queries leads to consumption of more bandwidth, cost, and miserable QoS. Current existing approaches focused primarily on how to speed up the basic routing for IoT devices. However, solutions for flooding are not being addressed. In this paper, we propose a cluster-based flooding (CBF) as an interoperable solution for network and sensor layer devices which is also capable minimizing the energy consumption, cost, network flooding, identifying, and eliminating of redundant flooding queries using query control mechanisms. The proposed CBF divides the network into different clusters, local queries for information are proactively maintained by the intralayer cluster (IALC), while the interlayer cluster (IELC) is responsible for reactively obtain the routing queries to the destinations outside the cluster. CBF is a hybrid approach, having the potential to be more efficient against traditional schemes in term of query traffic generation. However, in the absence of appropriate redundant query detection and termination techniques, the CBF may generate more control traffic compared to the standard flooding techniques. In this research work, we used Cooja simulator to evaluate the performance of the proposed CBF. According to the simulation results the proposed technique has superiority in term of traffic delay, QoS/throughput, and energy consumption, under various performance metrics compared with traditional flooding and state of the art.

Sensors ◽  
2020 ◽  
Vol 20 (1) ◽  
pp. 283
Author(s):  
Fawad Ali Khan ◽  
Rafidah Md Noor ◽  
Miss Laiha Mat Kiah ◽  
Ismail Ahmedy ◽  
Mohd Yamani ◽  
...  

Internet of Things (IoT) facilitates a wide range of applications through sensor-based connected devices that require bandwidth and other network resources. Enhancement of efficient utilization of a heterogeneous IoT network is an open optimization problem that is mostly suffered by network flooding. Redundant, unwanted, and flooded queries are major causes of inefficient utilization of resources. Several query control mechanisms in the literature claimed to cater to the issues related to bandwidth, cost, and Quality of Service (QoS). This research article presented a statistical performance evaluation of different query control mechanisms that addressed minimization of energy consumption, energy cost and network flooding. Specifically, it evaluated the performance measure of Query Control Mechanism (QCM) for QoS-enabled layered-based clustering for reactive flooding in the Internet of Things. By statistical means, this study inferred the significant achievement of the QCM algorithm that outperformed the prevailing algorithms, i.e., Divide-and-Conquer (DnC), Service Level Agreements (SLA), and Hybrid Energy-aware Clustering Protocol for IoT (Hy-IoT) for identification and elimination of redundant flooding queries. The inferential analysis for performance evaluation of algorithms was measured in terms of three scenarios, i.e., energy consumption, delays and throughput with different intervals of traffic, malicious mote and malicious mote with realistic condition. It is evident from the results that the QCM algorithm outperforms the existing algorithms and the statistical probability value “P” < 0.05 indicates the performance of QCM is significant at the 95% confidence interval. Hence, it could be inferred from findings that the performance of the QCM algorithm was substantial as compared to that of other algorithms.


2021 ◽  
Vol 2021 ◽  
pp. 1-16
Author(s):  
Yanli Zhu ◽  
Xiaoping Yang ◽  
Yi Hong ◽  
Youfang Leng ◽  
Chuanwen Luo

The low-power wide-area network (LPWAN) technologies, such as LoRa, Sigfox, and NB-IoT, bring new renovation to the wireless communication between end devices in the Internet of things (IoT), which can provide larger coverage and support a large number of IoT devices to connect to the Internet with few gateways. Based on these technologies, we can directly deploy IoT devices on the candidate locations to cover targets or the detection area without considering multihop data transmission to the base station like the traditional wireless sensor networks. In this paper, we investigate the problems of the minimum energy consumption of IoT devices for target coverage through placement and scheduling (MTPS) and minimum energy consumption of IoT devices for area coverage through placement and scheduling (MAPS). In the problems, we consider both the placement and scheduling of IoT devices to monitor all targets (or the whole detection area) such that all targets (or the whole area) are (or is) continuously observed for a certain period of time. The objectives of the problems are to minimize the total energy consumption of the IoT devices. We first, respectively, propose the mathematical models for the MTPS and MAPS problems and prove that they are NP-hard. Then, we study two subproblems of the MTPS problem, minimum location coverage (MLC), and minimum energy consumption scheduling deployment (MESD) and propose an approximation algorithm for each of them. Based on these two subproblems, we propose an approximation algorithm for the MTPS problem. After that, we investigate the minimum location area coverage (MLAC) problem and propose an algorithm for it. Based on the MLAC and MESD problems, we propose an approximation algorithm to solve the MAPS problem. Finally, extensive simulation results are given to further verify the performance of the proposed algorithms.


2021 ◽  
Author(s):  
Malik bader alazzam ◽  
Fawaz Alassery

Abstract The Internet of Things (IoT) has subsequently been applied to a variety of sectors, including smart grids, farming, weather prediction, power generation, wastewater treatment, and so on. So if the Internet of Things has enormous promise in a wide range of applications, there still are certain areas where it may be improved. Designers had focused our present research on reducing the energy consumption of devices in IoT networks, which will result in a longer network lifetime. The far more suitable Cluster Head (CH) throughout the IoT system is determined in this study to optimize energy consumption. Whale Optimization Algorithm (WOA) with Evolutionary Algorithm (EA) is indeed a mixed meta-heuristic algorithm used during the suggested study. Various quantifiable metrics, including the variety of adult nodes, workload, temperatures, remaining energy, and a target value, were utilized IoT network groups. The suggested method then is contrasted to several cutting-edge optimization techniques, including the Artificial Bee Colony method, Neural Network, Adapted Gravity Simulated annealing. The findings show that the suggested hybrid method outperforms conventional methods.


Author(s):  
A Pasumpon Pandian

This research article surveys the most recent IoT healthcare system research articles as the integration of IoT models have been extended to healthcare systems, such as health monitoring, fitness routines, and other applications. Extensive research study has been conducted on Internet of Things (IoT) technology to enhance the monitoring efficiency. This research is aimed at investigating the Internet of Things [IoT] architecture with an emphasis on cloud-based applications. The most significant challenges in the Internet of Things [IoT] include different elements such as accuracy and energy consumption, wherein this research is focused on improving the performance of IoT-based medical equipment. In this research, data management techniques for the Internet of Things-based cloud healthcare system are also thoroughly investigated. The performance and limitations of the Internet of Things (IoT) health system are evaluated. The majority of studies are successful in detecting a wide range of markers and correctly predicting illness. The Internet of Things (IoT) health system is being developed as an effective solution to the health concerns of elderly population. The major drawbacks of current systems are their increased energy consumption, reduced availability of resources, and safety concerns resulting from the use of a large number of different pieces of equipment.


2020 ◽  
Vol 2020 ◽  
pp. 1-11
Author(s):  
Xixi Yan ◽  
Guanghui He ◽  
Jinxia Yu ◽  
Yongli Tang ◽  
Mingjie Zhao

In the Internet of Things (IoT) environment, the intelligent devices collect and share large-scale sensitive personal data for a wide range of application. However, the power of storage and computing of IoT devices is limited, so the mass perceived data will be encrypted and transmitted to a cloud platform-interconnected IoT devices. Therefore, the concern how to save the encryption/decryption cost and preserve the privacy of the sensitive data in IoT environment is an issue that deserves research. To mitigate these issues, an offline/online attribute-based encryption scheme that supports partial policy hidden and outsourcing decryption will be proposed. This scheme adopts offline/online attribute-based encryption algorithms; then, the key generation algorithm and encryption algorithm are divided into two stages: offline stage and online stage. Meanwhile, in order to solve the problem of policy disclosure under the cloud platform, the policy hidden is supported, that is, the attribute is divided into the attribute value and the attribute name. For the pairing operation involved in decryption process, a verifiable outsourced decryption is implemented. Our scheme is constructed based on composite bilinear groups, which meets full security under the standard model. Finally, by comparing with other schemes in terms of functionality and computational overhead, it is shown that the proposed scheme is more efficient and applicable to the mobile devices with limited computing and storage functions in the Internet of Things environment.


Author(s):  
Flávia Pisani ◽  
Edson Borin

With the ever-growing scale of the IoT, transmitting a massive volume of sensor data through the network will be too taxing. However, it will be challenging to include resource-constrained IoT devices as processing nodes in the fog computing hierarchy. To allow the execution of custom code sent by users on these devices, which are too limited for many current tools, we developed a platform called LibMiletusCOISA (LMC). Moreover, we created two models where the user can choose a cost metric (e.g., energy consumption) and then use it to decide whether to execute their code on the cloud or on the device that collected the data. We employed these models to characterize different scenarios and simulate future situations where changes in the technology can impact this decision.


2019 ◽  
Vol 01 (02) ◽  
pp. 31-39 ◽  
Author(s):  
Duraipandian M. ◽  
Vinothkanna R.

The paper proposing the cloud based internet of things for the smart connected objects, concentrates on developing a smart home utilizing the internet of things, by providing the embedded labeling for all the tangible things at home and enabling them to be connected through the internet. The smart home proposed in the paper concentrates on the steps in reducing the electricity consumption of the appliances at the home by converting them into the smart connected objects using the cloud based internet of things and also concentrates on protecting the house from the theft and the robbery. The proposed smart home by turning the ordinary tangible objects into the smart connected objects shows considerable improvement in the energy consumption and the security provision.


Energies ◽  
2021 ◽  
Vol 14 (9) ◽  
pp. 2417
Author(s):  
Andrzej Michalski ◽  
Zbigniew Watral

This article presents the problems of powering wireless sensor networks operating in the structures of the Internet of Things (IoT). This issue was discussed on the example of a universal end node in IoT technology containing RFID (Radio Frequency Identification) tags. The basic methods of signal transmission in these types of networks are discussed and their impact on the basic requirements such as range, transmission speed, low energy consumption, and the maximum number of devices that can simultaneously operate in the network. The issue of low power consumption of devices used in IoT solutions is one of the main research objects. The analysis of possible communication protocols has shown that there is a possibility of effective optimization in this area. The wide range of power sources available on the market, used in nodes of wireless sensor networks, was compared. The alternative possibilities of powering the network nodes from Energy Harvesting (EH) generators are presented.


2018 ◽  
Author(s):  
Henry Tranter

Security is always at the forefront of developing technologies. One can seldom go a week without hearing of a new data breach or hacking attempt from various groups around the world, often taking advantage of a simple flaw in a system’s architecture. The Internet of Things (IoT) is one of these developing technologies which may be at risk of such attacks. IoT devices are becoming more and more prevalent in everyday life. From keeping track of an individual’s health, to suggesting meals from items available in an individual’s fridge, these technologies are taking a much larger role in the personal lives of their users. With this in mind, how is security being considered in the development of these technologies? Are these devices that monitor individual’s personal lives just additional vectors for potential data theft? Throughout this survey, various approaches to the development of security systems concerning IoT devices in the home will be discussed, compared, and contrasted in the hope of providing an ideal solution to the problems this technology may produce.


Sign in / Sign up

Export Citation Format

Share Document