scholarly journals Performance Evaluation of "Dynamic Double Trickle Timer Algorithm" in RPL for Internet of Things (IoT)

Author(s):  
Muneer Yassein ◽  
Ismail Hmeidi ◽  
Haneen Shehadeh ◽  
Waed Yaseen ◽  
Esra’a Masadeh ◽  
...  
Author(s):  
Tasmima Noushiba Mahbub ◽  
S. M. Salim Reza ◽  
Dilshad Ara Hossain ◽  
Mehedi Hasan Raju ◽  
Md Murshedul Arifeen ◽  
...  

Sensors ◽  
2020 ◽  
Vol 20 (1) ◽  
pp. 283
Author(s):  
Fawad Ali Khan ◽  
Rafidah Md Noor ◽  
Miss Laiha Mat Kiah ◽  
Ismail Ahmedy ◽  
Mohd Yamani ◽  
...  

Internet of Things (IoT) facilitates a wide range of applications through sensor-based connected devices that require bandwidth and other network resources. Enhancement of efficient utilization of a heterogeneous IoT network is an open optimization problem that is mostly suffered by network flooding. Redundant, unwanted, and flooded queries are major causes of inefficient utilization of resources. Several query control mechanisms in the literature claimed to cater to the issues related to bandwidth, cost, and Quality of Service (QoS). This research article presented a statistical performance evaluation of different query control mechanisms that addressed minimization of energy consumption, energy cost and network flooding. Specifically, it evaluated the performance measure of Query Control Mechanism (QCM) for QoS-enabled layered-based clustering for reactive flooding in the Internet of Things. By statistical means, this study inferred the significant achievement of the QCM algorithm that outperformed the prevailing algorithms, i.e., Divide-and-Conquer (DnC), Service Level Agreements (SLA), and Hybrid Energy-aware Clustering Protocol for IoT (Hy-IoT) for identification and elimination of redundant flooding queries. The inferential analysis for performance evaluation of algorithms was measured in terms of three scenarios, i.e., energy consumption, delays and throughput with different intervals of traffic, malicious mote and malicious mote with realistic condition. It is evident from the results that the QCM algorithm outperforms the existing algorithms and the statistical probability value “P” < 0.05 indicates the performance of QCM is significant at the 95% confidence interval. Hence, it could be inferred from findings that the performance of the QCM algorithm was substantial as compared to that of other algorithms.


2018 ◽  
Vol 7 (2.6) ◽  
pp. 231
Author(s):  
Teyi Yann Cedric Lawson ◽  
Senthilnathan T

Elliptic Curves when compared to other encryptions scheme such as RSA etc., provides an equivalent security, smaller key sizes, less power consumption, faster calculations, less bandwidth used and is more suitable for Internet of Things devices. In addition of encrypting the data, the devices in the network should also be able to authenticate themselves, which can be achieved with the implementation of “Non-Interactive Zero Knowledge protocol” (NIZKP). This protocol involves two parties: The prover and the Verifier. Prover party should prove to the Verifier that they have the knowledge of something, without revealing what is it. In this paper, a study of Schnorr protocol or ∑- protocol over Elliptic Curves is done and the protocol is implemented in Python using the Python Cryptography Toolkit PyCrypto which is a collection of cryptographic modules implementing various algorithms and protocols. Finally, the results were compared with Elliptic Curve Diffie-Hellmann(ECDH) and present a performance evaluation of the protocols on the Raspberry Pi 3B model, a credit-card sized computer used for the development of IoT devices hence the perfect platforms to test the protocol.  


2014 ◽  
Vol 989-994 ◽  
pp. 5041-5044
Author(s):  
Hong Xia Zhang ◽  
Qiang Zhang

With the development of modern information and communication technology and network technology, modern enterprises choose to build virtual dynamic alliance to achieve business development goals. There are many uncertain relationships between the participating companies in the virtual dynamic alliance. These companies join together to accomplish a particular goal, but also has their own unique individual needs. Internet of Things is an important part of a new generation of information technology. Things technology is an extension and expansion of the network based on the Internet. Basis for building virtual dynamic alliance is the Internet. The enterprises participating in a virtual dynamic alliance communicate with each other relying on information communication technology. Internet of Things technology provides real-time performance evaluation data to the participating enterprises. This will ensure real-time performance data communication between the dynamic alliance enterprises relatively loose.


Sign in / Sign up

Export Citation Format

Share Document