Energy aware approach for security and power optimization in advance wireless networks of internet of things (IoT)

 
 
 
  • Abstract
  • Keywords
  • References
  • PDF
  • Abstract


    In the recent years, the advance wireless networks and Internet of Things (IoT) are becoming very prominent in assorted domains. In the traffic system, the problem of congestion control is very common, and it is classically handled by the global positioning systems by the drivers as well as traffic administrative authorities. But as the traffic density is increasing day by day, it is becoming difficult to handle and view all the possibilities in the prospective traffic area where the driver is willing to move. Moreover, the problem of security and integrity is also increasing rapidly as there are number of attacks in VANET and GPS systems being used by the crackers by sending the malicious code or fake packets. Ubiquitous computing is one of the recent technologies that is in the phase of implementation under Internet of Things (IoT). In this research manuscript, the approach to integrate the dynamic key exchange with the Elephant Herd Optimization (EHO) is presented to achieve the higher degree of energy optimization and overall lifetime of the network communication. The key concept of the cluster head shuffling using EHO and inner modules of key exchange are simulated in Contiki-Cooja that is open source simulator for advance wireless networks.


  • Keywords


    Advance Wireless Networks, Energy Aware Wireless Networks, Power and Energy Optimized Wireless Systems.

  • References


      [1] A.Zanella, N. Bui, A. Castellani, L. Vangelista and L, Zorzi. Internet of things for smart cities, IEEE Internet of Things Journal. 7 (2014), 22-32.

      [2] K.Zhang, X.Liang &X. Shen, Sybil attacks and their defenses in the internet of things. IEEE Internet of Things Journal, 1, 5 (2014) 372-383.

      [3] M. Farooq, M. Waseem, A. Khairi. A critical analysis on the security concerns of internet of things (IoT), International Journal of Computer Applications. 9 (2015) 1-7

      [4] J. Stankovic. Research directions for the internet of things. IEEE Internet of Things Journal. 10 (2017) 3-9.

      [5] O. Said, M. Masud., Towards internet of things: Survey and future vision. International Journal of Computer Networks. 12 (2015) 1-7.

      [6] C. Perera,A. Zaslavsky, P. Christen, D. Georgakopoulos, Context aware computing for the internet of things: A survey, IEEE Communications Surveys & Tutorials., 15 (2014) 414-454.

      [7] Q. Jing, A. V. Vasilakos, J. Wan, J. Lu, and D. Qiu, Security of the Internet of Things: perspectives and challenges, Wireless Networks, 20, 8 (2014) 2481–2501.

      [8] L. Chen, Z. Yan, W. Zhang, and R. Kantola, TruSMS: A trustworthy SMS spam control system based on trust management,” Future Generation Computer Systems, 49 (2015) 77–93.

      [9] D. Lake, R. Milito, M. Morrow and R. Vargheese, Internet of Things: Architectural Framework for eHealth Security, Journal of ICT, 1, 3 (2014), 301–328.

      [10] N. Ye, Y. Zhu, R. C. Wang, R. Malekian, and Q. M. Lin, An efficient authentication and access control scheme for perception layer of internet of things,Appl. Math. Inf. Sci., 8 (2014) 1617–1624.

      [11] M. Turkanović, B. Brumen, and M. Hölbl, A novel user authentication and key agreement scheme for heterogeneous ad hoc wireless sensor networks, based on the Internet of Things notion, Ad Hoc Networks, 20 (2014) 96–112.

      [12] S. Sicari, A. Rizzardi, L. A. Grieco, and A. Coen-Porisini, “Security, privacy and trust in Internet of Things: The road ahead,” Computer Networks, 76 (2015) 146–164.

      [13] J. Granjal, E. Monteiro, and J. Sa Silva, Security for the internet of things: A survey of existing protocols and open research issues, IEEE Commun. Surv. Tutorials, 17 (2015) 1294–1312.

      [14] K. Nguyen, M. Laurent, and N. Oualha, Survey on secure communication protocols for the Internet of Things, Ad Hoc Networks, 32 (2015) 17–31.

      [15] M. Vucinic, B. Tourancheau, F. Rousseau, A. Duda, L. Damon, and R. Guizzetti, OSCAR: Object Security Architecture for the Internet of Things, Science Direct Ad Hoc Networks, 12 (2014) 3-16.

      [16] W. Trappe, R. Howard, and R. S. Moore, Low-energy security: Limits and opportunities in the internet of things, IEEE Security and Privacy, 13 (2015) 14–21.


 

View

Download

Article ID: 10038
 
DOI: 10.14419/ijet.v7i2.4.10038




Copyright © 2012-2015 Science Publishing Corporation Inc. All rights reserved.