SMART: Secured and Mobility Aware Routing Technique for Opportunistic IoT Network in Smart Cities
DOI:
https://doi.org/10.13052/jmm1550-4646.2024Keywords:
Internet of Things, opportunistic network, smart cities, routing protocols, delivery probability, time to live, scheduled energy, ONE simulatorAbstract
Transferring data between nodes in the Opportunistic Internet of Things (OppIoT) network may lead to the transmission of multiple copies of each message, which can increase communication costs and jeopardise network security. This necessitates a routing method that is effective and can address both problems. To protect transmitted data and reduce communication overhead, this study suggests a Secured and Mobility Aware Routing Method (SMART) routing algorithm for OppIoT networks in smart cities. With a buffer size of 30 MB and an overhead ratio of 27.9, the delivery probability can be increased by more than 50%. The simulation’s findings demonstrate that, in terms of delivery probability, overhead ratio, and reports, the proposed SMART protocol outperforms more traditional routing methods.
Downloads
References
Atzori, L., Iera, A., Morabito, G., The Internet of Things: a survey, Comput. Netw., 2010, 54, (15), pp. 2787—2805.
Pelusi, L., Passarella, A., Conti, M., Opportunistic Networking: Data forwarding in disconnected mobile ad hoc networks, IEEE Commun. Mag., 2006, 44, (11), pp. 134–141.
H. C. Gao, X. J. Chen, D. Xu, Y. Peng, Z. Y. Tang, and D. Y. Fang, Balance of energy and delay opportunistic routing protocol for passive sensing network, Journal of Software, vol. 30, no. 8, pp. 2528–2544, 2019.
H. D. Ma, P. Y. Yuan, and D. Zhao, Research progress on routing problem in mobile opportunistic networks, Journal of Software, vol. 26, no. 3, pp. 600–616, 2015.
Y. Lu, W. Wang, L. Chen, Z. Zhang, and A. Huang, Opportunistic forwarding in energy harvesting mobile delay tolerant networks, in Proceedings of the 2014 IEEE International Conference on Communications (ICC), pp. 526–531, Sydney, NSW, Australia, June 2014.
A. Lohachab and A. Jangra, Opportunistic Internet of Things (IoT): Demystifying t he Effective Possibilities of Opportunistic Networks towards IoT, in Proceedings of the 2019 6th International Conference on Signal Processing and Integrated Networks (SPIN), pp. 1100–1105, Noida, India, March 2019.
V. Petrov, A. Samuylov, V. Begishev et al., Vehicle-based relay assistance for opportunistic crowdsensing over narrowband IoT (NB-IoT), IEEE Internet of things Journal, vol. 5, no. 5, pp. 3710–3723, 2018.
M. Gharbieh, H. ElSawy, M. Emara, H.-C. Yang, and M.-S. Alouini, Grant-free opportunistic uplink transmission in wireless-powered IoT: a spatio-temporal model, IEEE Transactions on Communications, vol. 69, no. 2, pp. 991–1006, 2021.
Yugank, H.K., Sharma, R. and Gupta, S.H. An approach to analyse energy consumption of an IoT system. Int. J. Inf. Tecnol. 14, 2549–2558 (2022). https://doi.org/10.1007/s41870-022-00954-5.
Bongale, A.M., Nirmala, C.R. and Bongale, A.M. Energy efficient intra-cluster data aggregation technique for wireless sensor network. Int. J. Inf. Tecnol. 14, 827–835 (2022). https://doi.org/10.1007/s41870-020-00419-7.
T. Spyropoulos, K. Psounis, and C. S. Raghavendra, Spray and wait: an efficient routing scheme for intermittently connected mobile networks, in Proceedings of the 2005 ACM Security and Communication Networks 11 SIGCOMM Workshop on Delay-Tolerant Networking, pp. 252–259, New York, NY, USA, August 2005.
Arora, U., Singh, N. IoT application modules placement in heterogeneous fog–cloud infrastructure. Int. j. inf. tecnol. 13, 1975–1982 (2021). https://doi.org/10.1007/s41870-021-00672-4.
Guo B., Zhang D., Wang Z., Yu Z., Zhou X, Opportunistic IoT: Exploring the harmonious interaction between human and the Internet of Things,J. Netw. Comput. Appl. 2013, 36, 1531–1539. doi: 10.1016/j.jnca.2012.12.028.
Rishiwal, V., Singh, O. Energy efficient emergency rescue scheme in wireless sensor networks. Int. J. Inf. Tecnol. 13, 1951–1958 (2021). https://doi.org/10.1007/s41870-020-00584-9.
Aloi G.,Caliciuri G.,Fortino G.,Gravina R., Pace P., Russo W.,Savaglio C., Enabling IoT interoperability through opportunistic smartphone-based mobile gateways,J. Netw. Comput. Appl., 2017, 81, 74–84. doi:10.1016/j.jnca.2016.10.013.
Chalew Zeynu Sirmollo, Mekuanint Agegnehu Bitew, Mobility-Aware Routing Algorithm for Mobile Ad Hoc Networks, Wireless Communications and Mobile Computing, vol. 2021, Article ID 6672297, 12 pages, 2021.
F. Li and Y. Si, Trust-based security routing decision method for opportunistic networks, Journal of Software, vol. 29, no. 9, pp. 2829–2843, 2018.
Zhu, H., Du, S., Gao, Z., et al., A probabilistic misbehavior detection scheme toward efficient trust establishment in delay-tolerant networks, IEEE Trans. Parallel Distrib. Syst., 2013, 25, (1), pp. 22–32.
A. Vahdat, D. Becker.,Epidemic routing for partially connected ad hoc networks. Technical Report CS-2000-06, Dept. of Computer Science, Duke University, Durham, NC, 2000.
P. Sok, S. Tan and K. Kim, PRoPHET Routing Protocol Based on Neighbor Node Distance Using a Community Mobility Model in Delay Tolerant Networks, 2013 IEEE 10th International Conference on High Performance Computing and Communications & 2013 IEEE International Conference on Embedded and Ubiquitous Computing, 2013.
S. Banyal, K. Bhardwaj, and D. Sharma, Probabilistic routing protocol with firefly particle swarm optimisation for delay tolerant networks enhanced with chaos theory. Int. J. Innovative Computing and Applications, 12, 2, pp. 25–37, 2021.
D. Sharma, S. Dhurandher, I. Woungang, R. Srivastava, A. Mohananey and J. Rodrigues, A Machine Learning-Based Protocol for Efficient Routing in Opportunistic Networks, IEEE Systems Journal, vol. 12, no. 3, pp. 2207–2213, 2018.
D. Sharma, Aayush, A. Sharma and J. Kumar, KNNR: K-nearest neighbour classification-based routing protocol for opportunistic networks, Tenth International Conference on Contemporary Computing (IC3), 2017.
V. Vashishth, A. Chhabra, D.K. Sharma, GMMR: A Gaussian mixture model based unsupervised machine learning approach for optimal routing in opportunistic IoT networks, Comput. Commun. 134 (2019) 138–148.
V. Vashishth, A. Chhabra and D. Sharma, A Machine Learning Approach Using Classifier Cascades for Optimal Routing in Opportunistic Internet of Things Networks, 16th Annual IEEE International Conference on Sensing, Communication, and Networking (SECON), Boston, MA, USA, 2019, pp. 1–9, 2019.
D. Sharma, J. Rodrigues, V. Vashishth, A. Khanna and A. Chhabra, RLProph: A dynamic programming based reinforcement learning approach for optimal routing in opportunistic IoT networks, Wireless Networks, vol. 26, no. 6, pp. 4319–4338, 2020.
Sharma DK, Dhurandher SK, Agarwal D, Arora K. kROp: k-means clustering based routing protocol for opportunistic networks. J Ambient Intel Human Comput. 2019;10(4):1289–1306.
Banyal, Siddhant, Bharadwaj, Kartik, Sharma, Deepak, Khanna, Ashish and Rodrigues, Joel. HiLSeR: Hierarchical Learning-based Sectionalised Routing Paradigm for Pervasive Communication and Resource Efficiency in Opportunistic IoT Network. Sustainable Computing: Informatics and Systems. 30. 100508. doi:10.1016/j.suscom. 2021.100508.
Badis, H., Rida, K., Sherali, Z., Achraf, F., Lyes, K,. Internet of Things (IoT) Technologies for Smart Cities, IET Networks, 2018, 7(1), pp. 1–13.
Corrente, G., Random motion nodes empowering opportunistic networks for smart cities, Internet of Things, 2020, 11, pp. 100258.
Pham, T.N.D., Yeo, C.K., Detecting colluding blackhole and greyhole attacks in delay tolerant networks, IEEE Trans. Mob. Comput., 2016, 15(5), pp. 1116–1129.
Douceur, J.R., The sybil attack. Int. Workshop on Peer-to-Peer Systems, Cambridge, MA, USA, 2002, pp. 251–260.
C. Boldrini, M. Conti, J. Jacopini and A. Passarella, “HiBOp: a History Based Routing Protocol for Opportunistic Networks,” 2007 IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks, 2007, pp. 1–12, doi: 10.1109/WOWMOM.2007.4351716.
Ari Keränen, Jörg Ott and TeemuKärkkäinen, The ONE simulator for DTN protocol evaluation, Proceedings of the 2nd International Conference on simulation tools and techniques, pp. 55, 2009.