A Fuzzy-Based System for Selection of IoT Devices in Opportunistic Networks Considering IoT Device Storage, Waiting Time and Security Parameters

The opportunistic networks are a subclass of delay-tolerant networks where communication opportunities (contacts) are intermittent and there is no need to establish an end-to-end link between the communication nodes. The Internet of Things (IoT) present the notion of large networks of connected devices, sharing data about their environments and creating a diverse ecosystem of sensors, actuators, and computing nodes. IoT networks are a departure from tradi- tional enterprise networks in terms of their scale and consist of heterogeneous collections of resource constrained nodes that closely interact with their environment. There are different issues for these networks. One of them is the selection of IoT devices in order to carry out a task in opportunistic networks. In this work, we implement a Fuzzy-Based System for IoT device selection in opportunistic networks. For our system, we use three input parameters: IoT Device Storage (IDST), IoT Device Waiting Time (IDWT) and IoT Device Node Centrality (IDNC). The output parameter is IoT Device Selection Decision (IDSD). The simulation results show that IoT device selection is increased up to 33% and 43% by increasing IDNC and IDSD, respectively.

[1]  Leonard Barolli,et al.  A multi-modal simulation system for wireless sensor networks: a comparison study considering stationary and mobile sink and event , 2015, J. Ambient Intell. Humaniz. Comput..

[2]  Dario Pompili,et al.  Communication and Coordination in Wireless Sensor and Actor Networks , 2007, IEEE Transactions on Mobile Computing.

[3]  Isaac Woungang,et al.  HBPR: History Based Prediction for Routing in Infrastructure-less Opportunistic Networks , 2013, 2013 IEEE 27th International Conference on Advanced Information Networking and Applications (AINA).

[4]  B. V. R. Reddy,et al.  Node centrality in wireless sensor networks: Importance, applications and advances , 2013, 2013 3rd IEEE International Advance Computing Conference (IACC).

[5]  Fatos Xhafa,et al.  A Fuzzy-Based System for Peer Reliability in JXTA-Overlay P2P Considering Number of Interactions , 2013, 2013 16th International Conference on Network-Based Information Systems.

[6]  J. Mendel Fuzzy logic systems for engineering: a tutorial , 1995, Proc. IEEE.

[7]  Lotfi A. Zadeh,et al.  Fuzzy logic, neural networks, and soft computing , 1993, CACM.

[8]  Leonard Barolli,et al.  FBMIS: A Fuzzy-Based Multi-interface System for Cellular and Ad Hoc Networks , 2014, 2014 IEEE 28th International Conference on Advanced Information Networking and Applications.

[9]  Damla Turgut,et al.  Local positioning for environmental monitoring in wireless sensor and actor networks , 2010, IEEE Local Computer Network Conference.

[10]  Fatos Xhafa,et al.  A comparison study for two fuzzy-based systems: improving reliability and security of JXTA-overlay P2P platform , 2016, Soft Comput..

[11]  Damla Turgut,et al.  APAWSAN: Actor positioning for aerial wireless sensor and actor networks , 2011, 2011 IEEE 36th Conference on Local Computer Networks.

[12]  Leonard Barolli,et al.  A comparison study of two fuzzy-based systems for selection of actor node in wireless sensor actor networks , 2015, J. Ambient Intell. Humaniz. Comput..

[13]  Leonard Barolli,et al.  Integrating Wireless Cellular and Ad-Hoc Networks Using Fuzzy Logic Considering Node Mobility and Security , 2015, 2015 IEEE 29th International Conference on Advanced Information Networking and Applications Workshops.

[14]  Nobuo Funabiki,et al.  Classification extension based on IoT-big data analytic for smart environment monitoring and analytic in real-time system , 2017, Int. J. Space Based Situated Comput..

[15]  Leonard Barolli,et al.  An Integrated System for Wireless Cellular and Ad-Hoc Networks Using Fuzzy Logic , 2014, 2014 International Conference on Intelligent Networking and Collaborative Systems.

[16]  M. Grabisch The application of fuzzy integrals in multicriteria decision making , 1996 .

[17]  Leonard Barolli,et al.  A Fuzzy-Based CAC Scheme for Cellular Networks Considering Security , 2014, 2014 17th International Conference on Network-Based Information Systems.

[18]  Leonard Barolli,et al.  A CAC Scheme Based on Fuzzy Logic for Cellular Networks Considering Security and Priority Parameters , 2014, 2014 Ninth International Conference on Broadband and Wireless Computing, Communication and Applications.

[19]  Leonard Barolli,et al.  FACS-MP: A fuzzy admission control system with many priorities for wireless cellular networks and its performance evaluation , 2015, J. High Speed Networks.

[20]  Panwit Tuwanut,et al.  A survey on internet of things architecture, protocols, possible applications, security, privacy, real-world implementation and future trends , 2015, 2015 IEEE 16th International Conference on Communication Technology (ICCT).

[21]  Fatos Xhafa,et al.  Goodput and PDR analysis of AODV, OLSR and DYMO protocols for vehicular networks using CAVENET , 2011, Int. J. Grid Util. Comput..

[22]  Marco Conti,et al.  Opportunistic networking: data forwarding in disconnected mobile ad hoc networks , 2006, IEEE Communications Magazine.

[23]  Fatos Xhafa,et al.  Trustworthiness in P2P: performance behaviour of two fuzzy-based systems for JXTA-overlay platform , 2014, Soft Comput..