An Optimal Routing Algorithm for Internet of Things Enabling Technologies

An Optimal Routing Algorithm for Internet of Things Enabling Technologies

Amol V. Dhumane, Rajesh S. Prasad, Jayashree R. Prasad
Copyright: © 2017 |Pages: 16
DOI: 10.4018/IJRSDA.2017070101
OnDemand:
(Individual Articles)
Available
$37.50
No Current Special Offers
TOTAL SAVINGS: $37.50

Abstract

In Internet of things and its relevant technologies the routing of data plays one of the major roles. In this paper, a routing algorithm is presented for the networks consisting of smart objects, so that the Internet of Things and its enabling technologies can provide high reliability while the transmitting the data. The proposed technique executes in two stages. In first stage, the sensor nodes are clustered and an optimal cluster head is selected by using k-means clustering algorithm. The clustering is performed based on energy of sensor nodes. Then the energy cost of the cluster head and the trust level of the sensor nodes are determined. At second stage, an optimal path will be selected by using the Genetic Algorithm (GA). The genetic algorithm is based on the energy cost at cluster head, trust level at sensor nodes and path length. The resultant optimal path provides high reliability, better speed and more lifetimes.
Article Preview
Top

Introduction

Kavin Ashton in 2009 proposed the term “Internet of Things”. According to him “The Internet of Things has the potential to change the world, just as the Internet did. May be even more so”. Future Internet aims to incorporate heterogeneous communication technologies, both wired and wireless, so as to contribute considerably to declare the idea of Internet of Things (IoT) (Kortuem, Kawsar, Fitton et al., 2010). Albeit there are numerous approaches to depict an Internet of Thing, which can characterize it as a worldwide network of uniquely addressable interconnected objects, based on standard communication protocols. The low cost of sensor technology has eased the proliferation of Wireless Sensor Networks (WSNs) in numerous applicative scenarios such as home and office automation, environmental monitoring, agriculture, healthcare, and smart buildings. Internet of things networks are described by high heterogeneity because they are consistent with distinctive proprietary and non-proprietary solutions. Interoperability among heterogeneous sensing systems and abstraction between low layers (i.e. hardware) and high layers (i.e. user applications) are thus very vital difficulties (Zorzi, Gluhak, Lange et al., 2010).

Sensor networks based on closed or proprietary systems are integration islands with constrained communication to the outside world. There generally is the need to utilize gateways with application particular knowledge to export WSN data to other devices connected to the Internet. In addition, there is no direct communication between different standards unless complex application-specific conversions are implemented in gateways or proxies. The current trend is to utilize the Internet Protocol (IP) to attain native connectivity between wireless sensor network and the Internet (Vasseur and Dunkels, 2010). Along these lines, smart objects (e.g., tiny sensors or actuators with a network interface) are interconnected in order to make an IoT, based mainly on open standards and where every device has its own IP address. The IoT will permit gathering any helpful information about the physical world using the smart objects for utilizing it in various applications during the objects' life cycle. The web enablement of these smart objects will conveys more flexibility and customization possibilities for the Future Internet. For instance, following the trend of Web mashups (Zang, Rosson and Nasser, 2008), end users can create applications mixing real-world devices such as home appliances with virtual services on the Web. This sort of utilizations is frequently alluded to as physical mashups (Kovatsch, Weiss and Guinard, 2010).

The prominent enabling technologies of IoT such as WSN provide capabilities that are valuable for continuous remote monitoring, as research into military and environmental systems attest (Younis et al, 2002; Wood et al, 2008). One aspect of sensor networks that complicates the design of a secure routing protocol is in-network aggregation (Karlof and Wagner, 2003). Transmission of video and imaging data requires both energy and QoS aware routing in order to ensure efficient usage of the sensors and effective access to the gathered measurements (Akkaya and Younis, 2003). A method for estimating unknown node positions in a sensor network based exclusively on connectivity-induced constraints is described. Known peer-to-peer communication in the network is modeled as a set of geometric constraints on the node positions. The global solution of a feasibility problem for these constraints yields estimates for the unknown positions of the nodes in the network (Doherty, Pister & El Ghaoui, 2001). Routing protocols have two modes: greedy mode (when the forwarding node is able to advance the message toward the destination) and recovery mode (applied until return to greedy mode is possible) (Stojmenovic, 2002).

Complete Article List

Search this Journal:
Reset
Volume 9: 1 Issue (2025): Forthcoming, Available for Pre-Order
Volume 8: 1 Issue (2024): Forthcoming, Available for Pre-Order
Volume 7: 4 Issues (2021): 1 Released, 3 Forthcoming
Volume 6: 3 Issues (2019)
Volume 5: 4 Issues (2018)
Volume 4: 4 Issues (2017)
Volume 3: 4 Issues (2016)
Volume 2: 2 Issues (2015)
Volume 1: 2 Issues (2014)
View Complete Journal Contents Listing