Reliable critical nodes detection for Internet of Things (IoT)

被引:0
|
作者
Shailendra Shukla
机构
[1] Motilal Nehru National Institute of Technology Allahabad,Computer Science and Engineering Department
来源
Wireless Networks | 2021年 / 27卷
关键词
3D critical node detection; RSSI; Reliability; Security; Wireless sensor networks (WSN); Internet of Thing (IoT);
D O I
暂无
中图分类号
学科分类号
摘要
The 3D critical node (C-N) detection can play a vital role in algorithm development of security, surveillance, monitoring, topology detection, and situation-aware emergency navigation for the Internet of Things (IoT). However, 3D C-N detection problem in IoT raises some issues and also introduces new challenges. The existing state of the art in 3D C-N detection shows that rely on prior known anchor node, known coordinate, embedding of the 3D situation on a 2D geometrical structure like circles and presence of unreliable node and ignores the energy constraint in Low Power and Lossy Networks IoT. In this paper, we present a practical, distributed, and energy-efficient algorithm for reliable 3DC-N detection. The goal of the proposed mechanism is twofold, firstly a 3D critical nodes (C-N) detection algorithm is proposed which uses only Received Signal Strength Indicator information of neighbor. Secondly, a correlation-based algorithm for the reliability approach is proposed to increases the node resilience against malicious IoT nodes. The complexity of our proposed algorithms has a time complexity of O(log(N))\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$\mathcal {O}(\log (N))$$\end{document} and computation cost O(δ(logN))\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$\mathcal {O}(\delta (\log N))$$\end{document} where N is the number of nodes in networks, and δ\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$\delta $$\end{document} is the total number of forward and the backward message from an individual node. To validate our work, we implemented our proposed approach with the IPv6 Routing Protocol for Low-Power and Lossy Networks (RPL) based IoT routing protocol compare it with RPL and cryptographic approach Version Number and Rank Authentication (VeRa). The result shows that the proposed approach can detect 10–15% more C-N nodes. Result also shows that our proposed algorithm has better PDR than RPL based approach by 12% and less than VeRa (cryptographic approach) by 8% however our proposed approach consumes almost 50% less power than the VeRa.
引用
收藏
页码:2931 / 2946
页数:15
相关论文
共 50 条
  • [1] Reliable critical nodes detection for Internet of Things (IoT)
    Shukla, Shailendra
    WIRELESS NETWORKS, 2021, 27 (04) : 2931 - 2946
  • [2] READ-IoT: Reliable Event and Anomaly Detection Framework for the Internet of Things
    Yahyaoui, Aymen
    Abdellatif, Takoua
    Yangui, Sami
    Attia, Rabah
    IEEE ACCESS, 2021, 9 : 24168 - 24186
  • [3] Assignment of IoT Nodes to Edge Computing Devices in Internet of Things
    Perkin, T. Madhu
    Mini, S.
    2019 EUROPEAN CONFERENCE ON NETWORKS AND COMMUNICATIONS (EUCNC), 2019, : 528 - 532
  • [4] Smart Nodes of Internet of Things (IoT): A Hardware Perspective View & Implementation
    Sanchez-Sinencio, Edgar
    GLSVLSI'14: PROCEEDINGS OF THE 2014 GREAT LAKES SYMPOSIUM ON VLSI, 2014, : 137 - 137
  • [5] FUZZY POWER MANAGEMENT FOR INTERNET OF THINGS (IOT) WIRELESS SENSOR NODES
    Nabil, Mohamed Sherif
    ElKhatib, Mohamed Misbah
    Tammam, Ashraf
    PROCEEDINGS OF 2019 36TH NATIONAL RADIO SCIENCE CONFERENCE (NRSC), 2019, : 173 - 182
  • [6] Realtime Object Detection in IoT (Internet of Things) Devices
    Aribas, Erke
    Daglarli, Evren
    2017 25TH SIGNAL PROCESSING AND COMMUNICATIONS APPLICATIONS CONFERENCE (SIU), 2017,
  • [7] Overview on Intrusion Detection Schemes for Internet of Things (IoT)
    Ghayyad, Saher
    Du, Shengzhi
    2018 INTERNATIONAL CONFERENCE ON INTELLIGENT AND INNOVATIVE COMPUTING APPLICATIONS (ICONIC), 2018, : 614 - 619
  • [8] An Internet of Things (IoT) Approach for Automatic Context Detection
    Ojagh, Soroush
    Malek, Mohammad Reza
    Saeedi, Sara
    Liang, Steve
    2018 IEEE 9TH ANNUAL INFORMATION TECHNOLOGY, ELECTRONICS AND MOBILE COMMUNICATION CONFERENCE (IEMCON), 2018, : 223 - 226
  • [9] Evaluation of Reliable UDP-Based Transport Protocols for Internet of Things (IoT)
    Masirap, Madzirin
    Amaran, Mohd Harith
    Yussoff, Yusnani Mohd
    Ab Rahman, Ruhani
    Hashim, Habibah
    2016 IEEE SYMPOSIUM ON COMPUTER APPLICATIONS & INDUSTRIAL ELECTRONICS (ISCAIE), 2016, : 200 - 205
  • [10] Internet of Things for Epidemic Detection: A Critical Review
    Kaushalya, S. A. D. S.
    Kulawansa, K. A. D. T.
    Firdhous, M. F. M.
    ADVANCES IN COMPUTER COMMUNICATION AND COMPUTATIONAL SCIENCES, IC4S 2018, 2019, 924 : 485 - 495