An Efficient Routing Algorithm for IoT Using GWO Approach

2021 ◽  
Vol 12 (2) ◽  
pp. 67-84
Author(s):  
Sharad Sharma ◽  
Aparna Kapoor

The internet of things (IoT) is a technology representing a rapidly ubiquitous development. The technologies supporting the IoT are becoming significant as it forms the basic need to analyze the environment and making it smarter. So far, the internet in context of IPs is considered as the largest network globally. The collection of data that includes the process of harvesting the monitored data is sensed by a huge number of participating sensors, which presents a challenging task due to its openly built technical issues resulting from typical limitations of WSNs (delivery time, energy, bandwidth) to the lack of standardized data collection of widespread WSN, required for practical deployment in both the upcoming and existing scenarios of IoT. This paper improves the above critical issue with optimizing the process of routing using the algorithm grey wolf optimization (GWO) which represents semantic form of optimization that typically reduces the drop, time delay, and energy.

Author(s):  
Sarita Tripathy ◽  
Shaswati Patra

The huge number of items associated with web is known as the internet of things. It is associated with worldwide data consisting of various components and different types of gadgets, sensors, and software, and a large variety of other instruments. A large number of applications that are required in the field of agriculture should implement methods that should be realistic and reliable. Precision agriculture practices in farming are more efficient than traditional farming techniques. Precision farming simultaneously analyzes data along with generating it by the use of sensors. The application areas include tracking of farm vehicles, monitoring of the livestock, observation of field, and monitoring of storage. This type of system is already being accepted and adopted in many countries. The modern method of smart farming has started utilizing the IoT for better and faster yield of crops. This chapter gives a review of the various IoT techniques used in smart farming.


2020 ◽  
Vol 12 (1) ◽  
pp. 7
Author(s):  
Wan Alamsyah ◽  
Eka Mutia ◽  
Yulina Ismida ◽  
Asmadi Suria ◽  
Rachmad Almi Putra

<p>There is an early flood detection tool that has been successfully designed called the Early Flood Detection (EFDe) a system that uses the Internet of Things system which can be accessed by the users through a browser or an Android smartphone. In general, this tool has an accurate sensor response to the water level reading by the sensor. The time needed for the sensor to send data to the server is 10-15 seconds. The speed of this delivery time is influenced by several factors, including sensor response, server response, and the cellular network used. The EFDe system is equipped with an alarm around the location and has 10-15 second response when the indicator shows FLOOD POTENTIAL and will not stop until the signal changed to SAFE. This EFDe System is equipped with a solar panel and solar control charger and has an independent energy source that comes from the sun and stored in batteries. That is why the EFDe system is able to send information in real-time.</p>


Author(s):  
Ishfaq Sultan ◽  
Mohammad Tariq Banday

The spatial ubiquity and the huge number of employed nodes monitoring the surroundings, individuals, and devices makes security a key challenge in IoT. Serious security apprehensions are evolving in terms of data authenticity, integrity, and confidentiality. Consequently, IoT requires security to be assured down to the hardware level, as the authenticity and the integrity need to be guaranteed in terms of the hardware implementation of each IoT node. Physically unclonable functions recreate the keys only while the chip is being powered on, replacing the conventional key storage which requires storing information. Compared to extrinsic key storage, they are able to generate intrinsic keys and are far less susceptible against physical attacks. Physically unclonable functions have drawn considerable attention due to their ability to economically introduce hardware-level security into individual silicon dice. This chapter introduces the notion of physically unclonable functions, their scenarios for hardware security in IoT devices, and their interaction with traditional cryptography.


2021 ◽  
Vol 54 (6) ◽  
pp. 1-42
Author(s):  
Panagiotis Oikonomou ◽  
Anna Karanika ◽  
Christos Anagnostopoulos ◽  
Kostas Kolomvatsos

Nowadays, we are witnessing the advent of the Internet of Things (IoT) with numerous devices performing interactions between them or with their environment. The huge number of devices leads to huge volumes of data that demand the appropriate processing. The “legacy” approach is to rely on Cloud where increased computational resources can realize any desired processing. However, the need for supporting real-time applications requires a reduced latency in the provision of outcomes. Edge Computing (EC) comes as the “solver” of the latency problem. Various processing activities can be performed at EC nodes having direct connection with IoT devices. A number of challenges should be met before we conclude a fully automated ecosystem where nodes can cooperate or understand their status to efficiently serve applications. In this article, we perform a survey of the relevant research activities towards the vision of Edge Mesh (EM), i.e., a “cover” of intelligence upon the EC. We present the necessary hardware and discuss research outcomes in every aspect of EC/EM nodes functioning. We present technologies and theories adopted for data, tasks, and resource management while discussing how machine learning and optimization can be adopted in the domain.


2021 ◽  
Vol 26 (4) ◽  
pp. 403-408
Author(s):  
Chirihane Gherbi

The IoT network is used to provide an object with connectivity to the Internet to allow the feedback of information. The IoT has the ambition to make objects interact with each other and with people. It promises to be the engine of great transformations in the lives of individuals by democratizing new uses and services in the mobility sector. This is why it is compared to the internet of the future. The global size of the IoT, the huge number of Things in the IoT, the changing topology of the IoT, and the resource constraints make routing in the IoT difficult. Routing is a necessary process in the Internet of Things because it enables the interchange of data between Things by quickly guiding and reliably delivering data through the network from its origins to its destinations. The Internet of Things is enabled by key pillars: radio frequency identification (RFID) and wireless sensor networks (WSNs) (IoT), NFC (Near Field Communication), BLE (Bluetooth Low-Energy technology), LoRa and Sigfox. This paper examines these different technologies as well as the barriers and challenges that must be solved.


Author(s):  
Alaa Ahmed Abbood ◽  
Qahtan Makki Shallal ◽  
Mohammed A. Fadhel

<p><span>Internet of Things (IoT) devices are spread in different areas such as e-tracking, e-commerce, e-home, and e-health, etc. Thus, during the last ten years, the internet of things technology (IoT) has been a research focus. Both privacy and security are the key concerns for the applications of IoT, and still face a huge number of challenges. There are many elements used to run the IoT technology which include hardware and software such as sensors, GPS, cameras, applications, and so forth. In this paper, we have analyzed and explain the technology of IoT along with its elements, security features, security issues, and threats that attached to each layer of IoT to guide the consideration of researchers into solve and understand the most serious problems in IoT environment.</span></p>


Author(s):  
Ishfaq Sultan ◽  
Mohammad Tariq Banday

The spatial ubiquity and the huge number of employed nodes monitoring the surroundings, individuals, and devices makes security a key challenge in IoT. Serious security apprehensions are evolving in terms of data authenticity, integrity, and confidentiality. Consequently, IoT requires security to be assured down to the hardware level, as the authenticity and the integrity need to be guaranteed in terms of the hardware implementation of each IoT node. Physically unclonable functions recreate the keys only while the chip is being powered on, replacing the conventional key storage which requires storing information. Compared to extrinsic key storage, they are able to generate intrinsic keys and are far less susceptible against physical attacks. Physically unclonable functions have drawn considerable attention due to their ability to economically introduce hardware-level security into individual silicon dice. This chapter introduces the notion of physically unclonable functions, their scenarios for hardware security in IoT devices, and their interaction with traditional cryptography.


Sign in / Sign up

Export Citation Format

Share Document