An Evolutionary Secure Energy Efficient Routing Protocol in Internet of Things

Recently, Internet of Things (IoT) devices are highly utilized in diverse fields such as environmental monitoring, industries, smart home etc. Under such instance, a cluster head is selected among the diverse IoT devices of wireless Sensor Network (WSN) based IoT network to maintain the reliable network with efficient data transmission. To accomplish the efficient cluster head selection, we have used Fuzzy C-Means (FCM) clustering algorithm. Therefore, it is necessary to implement secure energy aware routing protocol in IoT. This paper proposed a novel method with the combination of Optimal Secured Energy Aware Protocol (OSEAP) and Improved Bacterial Foraging Optimization (IBFO) algorithm. The aforesaid challenges against the secure energy awareness objective under IoT are not yet dealt by any researchers. Furthermore, the Optimal Secured Energy Aware Protocol (OSEAP) and Improved Bacterial Foraging Optimization (IBFO) algorithm is one of the best methods to save more energy with security among the nodes. The performance analysis in terms of delay, throughput, and energy determined by comparing the proposed method with the existing method Secure Energy aware routing protocol (SEAP). Thus, the analysis of our implementation reveals the superior performance of the proposed method.

[1]  Latha Tamilselvan,et al.  Towards Maximum Resource Utilization and Optimal Task Execution for Gaming IoT Workflow in Mobile Cloud , 2017 .

[2]  Qazi Mamoon Ashraf,et al.  Autonomic schemes for threat mitigation in Internet of Things , 2015, J. Netw. Comput. Appl..

[3]  Fan Wu,et al.  A Collusion-Resistant Routing Scheme for Noncooperative Wireless Ad Hoc Networks , 2010, IEEE/ACM Transactions on Networking.

[4]  Chunhua Jin,et al.  Practical access control for sensor networks in the context of the Internet of Things , 2016, Comput. Commun..

[5]  Chi Harold Liu,et al.  Scalable Channel Allocation and Access Scheduling for Wireless Internet-of-Things , 2013, IEEE Sensors Journal.

[6]  Lida Xu,et al.  The internet of things: a survey , 2014, Information Systems Frontiers.

[7]  Li-Rong Zheng,et al.  An Internet-of-Things solution for food safety and quality control: A pilot project in China , 2016, J. Ind. Inf. Integr..

[8]  Hsiao-Hwa Chen,et al.  An Energy-Aware Trust Derivation Scheme With Game Theoretic Approach in Wireless Sensor Networks for IoT Applications , 2014, IEEE Internet of Things Journal.

[9]  Hannu Tenhunen,et al.  End-to-end security scheme for mobility enabled healthcare Internet of Things , 2016, Future Gener. Comput. Syst..

[10]  Athanasios V. Vasilakos,et al.  A knowledge-based resource discovery for Internet of Things , 2016, Knowl. Based Syst..

[11]  Bin Ren,et al.  The monitoring and managing application of cloud computing based on Internet of Things , 2016, Comput. Methods Programs Biomed..

[12]  Feng Xia,et al.  ERGID: An efficient routing protocol for emergency response Internet of Things , 2016, J. Netw. Comput. Appl..

[13]  Luca Mottola,et al.  Building Internet of Things software with ELIoT , 2016, Comput. Commun..

[14]  Feng Xia,et al.  A greedy model with small world for improving the robustness of heterogeneous Internet of Things , 2016, Comput. Networks.

[15]  Carlo Fischione,et al.  MAC-aware routing metrics for the internet of things , 2013, Comput. Commun..

[16]  Hangyang Dai,et al.  Key Predistribution Approach in Wireless Sensor Networks Using LU Matrix , 2010, IEEE Sensors Journal.

[17]  Arun Agarwal,et al.  The 5th Generation Mobile Wireless Networks- Key Concepts, Network Architecture and Challenges , 2015 .

[18]  Nadjib Badache,et al.  Event-Aware Framework for Dynamic Services Discovery and Selection in the Context of Ambient Intelligence and Internet of Things , 2016, IEEE Transactions on Automation Science and Engineering.

[19]  Saraju P. Mohanty,et al.  Design of a High-Performance System for Secure Image Communication in the Internet of Things , 2016, IEEE Access.

[20]  Mohsen Guizani,et al.  A survey of secure mobile Ad Hoc routing protocols , 2008, IEEE Communications Surveys & Tutorials.

[21]  Paulo F. Pires,et al.  On the interplay of Internet of Things and Cloud Computing: A systematic mapping study , 2016, Comput. Commun..

[22]  Carsten Bormann,et al.  6LoWPAN: The Wireless Embedded Internet , 2009 .

[23]  Cristina Alcaraz,et al.  Security of industrial sensor network-based remote substations in the context of the Internet of Things , 2013, Ad Hoc Networks.

[24]  Cristina Alcaraz,et al.  A Security Analysis for Wireless Sensor Mesh Networks in Highly Critical Systems , 2010, IEEE Transactions on Systems, Man, and Cybernetics, Part C (Applications and Reviews).

[25]  Nei Kato,et al.  Effective Data Collection Via Satellite-Routed Sensor System (SRSS) to Realize Global-Scaled Internet of Things , 2013, IEEE Sensors Journal.