Energy-Aware Routing Protocol with Fuzzy Logic in Industrial Internet of Things with Blockchain Technology

It is the expansion and use of the Industrial Internet of Things (IIoT) in various industrial sectors and applications that are referred to as the Industrial Internet of Things (IIoT). The Industrial Internet of Things includes industrial applications such as robots, medical devices, and software-defined manufacturing processes. In terms of energy conservation, routing is extremely essential. The creation of an energy effectual steering procedure leads to a substantial rise in energy consumption. To minimize network traffic and increase network life, the article presented an Industrial IoT Fuzzy Logic Energy-Aware Routing Protocol (FLEA-RPL), which decreases network traffic as well as improves network life. The most suitable parent for data transfer is selected based on, among other things, the routing parameters charge, residual energy, and expected transmission count. Since the load routing metric is taken into consideration during the construction of the route, the data traffic is spread across the network. This increases network’s lifetime while maintaining a high packet delivery ratio. The proposed work proposes a Multilayer Energy-Aware Aware RPL (MCEA-RPL) cluster for the Internet of Things to decrease network data traffic while increasing the lifetime of the network. It is split into three phases, each including the creation of network rings, intraring divisions, and intercluster routing. First and foremost, the virtual ring is created in the network. Secondly, each ring forms an identical cluster and chooses the CH node. Finally, it is responsible for the maintenance and performance of the DODAG. Data transfer from the lesser sheet to the DODAG root is known as data transfer. By using Blockchain technology, the lifetime of a network may be extended by reducing the number of identical data package transfers. This article offers Enhanced Mobility Support RPL (EM-RPL) in Industrial IoT which enhances mobility support with blockchain and spreads system generation. It comprises two processes: a collection of the parental static node and selection of the parent moving node. The static parent selection method uses routing metrics load and residual energy to identify the parent that is most suited for data transfer. Two phases of mobile parent selection must be distinguished: data transmission and route rediscovery. The mobile node utilizes furious logic to compute the hand-off value of the metric packet errors ratio and the signal strength indication received from the base station. If the hand-off value exceeds the threshold limit, the DODAG route has to be changed to work correctly. The EM-RPL thus increases the package delivery rate by reducing the amount of route interruption caused by mobility, while offering an efficient handling mechanism.

[1]  U. P. Rao,et al.  Blockchain for Information Security and Privacy , 2021 .

[2]  Sajjad Shaukat Jamal,et al.  Securing 5G-IoT Device Connectivity and Coverage Using Boltzmann Machine Keys Generation , 2021, Mathematical Problems in Engineering.

[3]  P. Shukla,et al.  CBO-IE: A Data Mining Approach for Healthcare IoT Dataset Using Chaotic Biogeography-Based Optimization and Information Entropy , 2021, Sci. Program..

[4]  P. Shukla,et al.  Improving the Protection of Wireless Sensor Network Using a Black Hole Optimization Algorithm (BHOA) on Best Feasible Node Capture Attack , 2021, IoT and Analytics for Sensor Networks.

[5]  Piyush Kumar Shukla,et al.  Session key based novel lightweight image encryption algorithm using a hybrid of Chebyshev chaotic map and crossover , 2021, Multimedia Tools and Applications.

[6]  Mohammad R. Khosravi,et al.  An Intelligent Session Key-Based Hybrid Lightweight Image Encryption Algorithm Using Logistic-Tent Map and Crossover Operator for Internet of Multimedia Things , 2021, Wireless Personal Communications.

[7]  Priti Maheshwary,et al.  Implementation of Fruit Fly Optimization Algorithm (FFOA) to escalate the attacking efficiency of node capture attack in Wireless Sensor Networks (WSN) , 2020, Comput. Commun..

[8]  Piyush Kumar Shukla,et al.  An Electronic Prescription System powered by Speech Recognition, Natural Language Processing and Blockchain Technology , 2019 .

[9]  Mohit Singh Tomar,et al.  Energy Efficient Gravitational Search Algorithm and Fuzzy Based Clustering With Hop Count Based Routing For Wireless Sensor Network , 2019, Multimedia Tools and Applications.

[10]  Nabil Benamar,et al.  OF-EC: A novel energy consumption aware objective function for RPL based on fuzzy logic , 2018, J. Netw. Comput. Appl..

[11]  Azzedine Boukerche,et al.  A Novel Adaptive and Efficient Routing Update Scheme for Low-Power Lossy Networks in IoT , 2018, IEEE Internet of Things Journal.

[12]  P. Shukla,et al.  Design and Development of Image Security Technique by Using Cryptography and Steganography: A Combine Approach , 2018 .

[13]  Andrew H. Kemp,et al.  A Game Theoretic Optimization of RPL for Mobile Internet of Things Applications , 2018, IEEE Sensors Journal.

[14]  Trilok Chand,et al.  Improved Trickle Algorithm for Routing Protocol for Low Power and Lossy Networks , 2018, IEEE Sensors Journal.

[15]  Antonio J. Jara,et al.  RPL-based networks in static and mobile environment: A performance assessment analysis , 2017, J. King Saud Univ. Comput. Inf. Sci..

[16]  S. V. R. Anand,et al.  Power control and cross-layer design of RPL objective function for low power and lossy networks , 2018, 2018 10th International Conference on Communication Systems & Networks (COMSNETS).

[17]  Hyung-Sin Kim,et al.  DT-RPL: Diverse bidirectional traffic delivery through RPL routing protocol in low power and lossy networks , 2017, Comput. Networks.

[18]  Jiwa Abdullah,et al.  Strategies for a better performance of RPL under mobility in wireless sensor networks , 2017 .

[19]  P. Shukla,et al.  Survey of Cyberbulling Detection on Social Media Big-Data , 2017 .

[20]  Abdulrahman H. Altalhi,et al.  Improved routing metrics for energy constrained interconnected devices in low-power and lossy networks , 2016, Journal of Communications and Networks.

[21]  Elyes Ben Hamida,et al.  An adaptive timer for RPL to handle mobility in wireless sensor networks , 2016, 2016 International Wireless Communications and Mobile Computing Conference (IWCMC).

[22]  Rajendra Gupta,et al.  Performance Analysis of Anti-Phishing Tools and Study of Classification Data Mining Algorithms for a Novel Anti-Phishing System , 2015 .

[23]  Mohamed Abid,et al.  Quality-of-service aware routing for static and mobile IPv6-based low-power and lossy sensor networks using RPL , 2015, Ad Hoc Networks.

[24]  Saewoong Bahk,et al.  QU-RPL: Queue utilization based RPL for load balancing in large scale industrial applications , 2015, 2015 12th Annual IEEE International Conference on Sensing, Communication, and Networking (SECON).

[25]  Fabrice Theoleyre,et al.  Using multiparent routing in RPL to increase the stability and the lifetime of the network , 2015, Ad Hoc Networks.

[26]  Marcus Chang,et al.  MoMoRo: Providing Mobility Support for Low-Power Wireless Applications , 2015, IEEE Systems Journal.

[27]  Jesus Alonso-Zarate,et al.  A Survey on Application Layer Protocols for the Internet of Things , 2015 .

[28]  Sanjay Silakari,et al.  Trust Formulization in Dynamic Source Routing Protocol Using SVM , 2014 .

[29]  Eduardo Tovar,et al.  Co-RPL: RPL routing for mobile low power wireless sensor networks using Corona mechanism , 2014, Proceedings of the 9th IEEE International Symposium on Industrial Embedded Systems (SIES 2014).

[30]  Sanjay Silakari,et al.  An Exhaustive Survey on Physical Node Capture Attack in WSN , 2014 .

[31]  Marimuthu Palaniswami,et al.  Internet of Things (IoT): A vision, architectural elements, and future directions , 2012, Future Gener. Comput. Syst..

[32]  Sarmad Ullah Khan,et al.  Future Internet: The Internet of Things Architecture, Possible Applications and Key Challenges , 2012, 2012 10th International Conference on Frontiers of Information Technology.

[33]  Anantha P. Chandrakasan,et al.  An application-specific protocol architecture for wireless microsensor networks , 2002, IEEE Trans. Wirel. Commun..