Reliable critical nodes detection for Internet of Things (IoT)

被引:0
|
作者
Shailendra Shukla
机构
[1] Motilal Nehru National Institute of Technology Allahabad,Computer Science and Engineering Department
来源
Wireless Networks | 2021年 / 27卷
关键词
3D critical node detection; RSSI; Reliability; Security; Wireless sensor networks (WSN); Internet of Thing (IoT);
D O I
暂无
中图分类号
学科分类号
摘要
The 3D critical node (C-N) detection can play a vital role in algorithm development of security, surveillance, monitoring, topology detection, and situation-aware emergency navigation for the Internet of Things (IoT). However, 3D C-N detection problem in IoT raises some issues and also introduces new challenges. The existing state of the art in 3D C-N detection shows that rely on prior known anchor node, known coordinate, embedding of the 3D situation on a 2D geometrical structure like circles and presence of unreliable node and ignores the energy constraint in Low Power and Lossy Networks IoT. In this paper, we present a practical, distributed, and energy-efficient algorithm for reliable 3DC-N detection. The goal of the proposed mechanism is twofold, firstly a 3D critical nodes (C-N) detection algorithm is proposed which uses only Received Signal Strength Indicator information of neighbor. Secondly, a correlation-based algorithm for the reliability approach is proposed to increases the node resilience against malicious IoT nodes. The complexity of our proposed algorithms has a time complexity of O(log(N))\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$\mathcal {O}(\log (N))$$\end{document} and computation cost O(δ(logN))\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$\mathcal {O}(\delta (\log N))$$\end{document} where N is the number of nodes in networks, and δ\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$\delta $$\end{document} is the total number of forward and the backward message from an individual node. To validate our work, we implemented our proposed approach with the IPv6 Routing Protocol for Low-Power and Lossy Networks (RPL) based IoT routing protocol compare it with RPL and cryptographic approach Version Number and Rank Authentication (VeRa). The result shows that the proposed approach can detect 10–15% more C-N nodes. Result also shows that our proposed algorithm has better PDR than RPL based approach by 12% and less than VeRa (cryptographic approach) by 8% however our proposed approach consumes almost 50% less power than the VeRa.
引用
收藏
页码:2931 / 2946
页数:15
相关论文
共 50 条
  • [41] Smart Detection-IoT: A DDoS Sensor System for Internet of Things
    Fernandes Silveira, Frederico Augusto
    Lima-Filho, Francisco
    Dantas Silva, Felipe Sampaio
    Brito Junior, Agostinho de Medeiros
    Silveira, Luiz Felipe
    PROCEEDINGS OF THE 2020 INTERNATIONAL CONFERENCE ON SYSTEMS, SIGNALS AND IMAGE PROCESSING (IWSSIP), 27TH EDITION, 2020, : 343 - 348
  • [42] Reliable Wireless Sensor Networks Topology Control for Critical Internet of Things Applications
    Deif, Dina
    Gadallah, Yasser
    2018 IEEE WIRELESS COMMUNICATIONS AND NETWORKING CONFERENCE (WCNC), 2018,
  • [43] An efficient steganographic approach for protecting communication in the Internet of Things (IoT) critical infrastructures
    Bairagi, Anupam Kumar
    Khondoker, Rahamatullah
    Islam, Rafiqul
    INFORMATION SECURITY JOURNAL, 2016, 25 (4-6): : 197 - 212
  • [44] Critical Success Factors for Internet of Things (IoT) Implementation in Automotive Companies, Indonesia
    Hakim, Inaki Maulida
    Singgih, Moses Laksono
    Gunarta, I. Ketut
    SUSTAINABILITY, 2023, 15 (04)
  • [45] A Review on Internet of Things (IoT), Internet of Everything (IoE) and Internet of Nano Things (IoNT)
    Miraz, Mahdi H.
    Ali, Maaruf
    Excell, Peter S.
    Picking, Rich
    2015 INTERNET TECHNOLOGIES AND APPLICATIONS (ITA) PROCEEDINGS OF THE SIXTH INTERNATIONAL CONFERENCE (ITA 15), 2015, : 219 - 224
  • [46] Securing the Internet of Things (IoT): A Security Taxonomy for IoT
    Rizvi, Syed
    Pfeffer, Joseph, III
    Kurtz, Andrew
    Rizvi, Mohammad
    2018 17TH IEEE INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (IEEE TRUSTCOM) / 12TH IEEE INTERNATIONAL CONFERENCE ON BIG DATA SCIENCE AND ENGINEERING (IEEE BIGDATASE), 2018, : 163 - 168
  • [47] Internet of Reliable Things: Toward D2D-enabled NB-IoT
    Malarski, Krzysztof Mateusz
    Moradi, Farnaz
    Ballal, Kalpit Dilip
    Dittmann, Lars
    Ruepp, Sarah
    2020 FIFTH INTERNATIONAL CONFERENCE ON FOG AND MOBILE EDGE COMPUTING (FMEC), 2020, : 196 - 201
  • [48] A FAIR SURVEY ON INTERNET OF THINGS (IoT)
    Beevi, M. Joharan
    FIRST INTERNATIONAL CONFERENCE ON EMERGING TRENDS IN ENGINEERING, TECHNOLOGY AND SCIENCE - ICETETS 2016, 2016,
  • [49] Internet of Things (IoT): Architecture and Design
    Abed, Ali Ahmed
    2016 AL-SADIQ INTERNATIONAL CONFERENCE ON MULTIDISCIPLINARY IN IT AND COMMUNICATION TECHNIQUES SCIENCE AND APPLICATIONS (AIC-MITCSA), 2016,
  • [50] IoT Maps: Charting the Internet of Things
    Shaw, Peter
    Mikusz, Mateusz
    Nurmi, Petteri
    Davies, Nigel
    HOTMOBILE '19 - PROCEEDINGS OF THE 20TH INTERNATIONAL WORKSHOP ON MOBILE COMPUTING SYSTEMS AND APPLICATIONS, 2019, : 105 - 110