Computer Science Research Articles
Single Platform to Read Collections of Research Articles
Design of Maintaining Data Security on IoT Data Transferred Through IoT Gateway System to Cloud Storage
S. Alexander Suresh, R. Jemima Priyadarsini
Abstract - IoT is a smart-device environment; it acts smarter and gives higher quality to enhance the user experience. IoT is an open network environment. However, IoT's security challenges are more vulnerable because the devices are openly accessible to all in the network. IoT communication can be formed in different ways, where the device generates the data is communicated to other devices or gateway or cloud. Therefore, security challenges are in everywhere IoT environment. IoT Communication considered in this paper is gateway communication. Data generated from the IoT environment are directed to the cloud over a gateway system. Hence, the data essentials to be protected from the IoT devices to the gateway system and the gateway system to the cloud storage. The cloud is a public environment that makes security is a challenge to keep data secure. Therefore, securing IoT data to the cloud environment is the most significant focus. This paper focuses on securing the data from the gateway system to the cloud storage. The paper proposes an enhanced modern symmetrical encryption to secure data to ensure data security in the travel and storage of IoT data to the cloud. The proposed Enhanced Modern Symmetric Data Encryption (EMSDE) is a block cipher encryption technique. It encrypts data by 64-bit block. Proposed encryption is tested according to time and level of security. Thingspeak stores the IoT data sent from the IoT gateway system for implementation and testing. Based on the testing, the proposed EMSDE produces better results, and it is tailored to secure data stored in the cloud from IoT devices.
Published: 2022Read / Download
A Review on Intrusion Detection Systems to Secure IoT Networks
A. Arul Anitha, L. Arockiam
Abstract - The Internet of Things (IoT) and its rapid advancements will lead to everything being connected in the near future. The number of devices connected to the global network is increasing every day. IoT security challenges arise as a result of the large-scale incorporation of smart devices. Security issues on the Internet of Things have been the most focused area of research over the last decade. As IoT devices have less memory, processing capacity, and power consumption, the traditional security mechanisms are not suitable for IoT. A security mechanism called an Intrusion Detection System (IDS) has a crucial role in protecting the IoT nodes and networks. The lightweight nature of IoT nodes should be considered while designing IDS for the IoT. In this paper, the types of IDS, the major attacks on IoT, the recent research, and contributions to IDS in IoT networks are discussed, and an analytical survey is given based on the study. Though it is a promising area for research, IDS still needs further refinement to ensure high security for IoT networks and devices. Hence, further research, development, and lightweight mechanisms are required for IDS to provide a higher level of security to the resource-limited IoT network.
Published: 2022Read / Download
Optimized Support Vector Machine Based Congestion Control in Wireless Sensor Network Based Internet of Things
P.T. Kasthuribai
Abstract - As the Wireless sensor network (WSN) has significant part in Internet of Things (IoT), it is utilized in various applications such as sensing environment and transmitting data via the internet. Nevertheless, due to the problem of heavy congestion, WSN based IoT obtains longer delay, higher ratio of packet loss and lower throughput. Although machine learning algorithms have been presented by researchers for detecting the congested data in IoT, detection accuracy is further to be improved. So, to control the congestion in WSN based IoT, artificial flora algorithm (AF) based support vector machine (SVM) is presented in this paper. To improve the performance of SVM, penalty parameter and kernel parameter of SVM is optimized using AF algorithm. In this proposed SVM-AF, the performance factors are given as input such as queue size (que), packet loss (pkt loss), cwnd (congestion window size), and throughput (throu). Based on these input factors, the prediction model SVM-AF predicts the congested data and decides whether to offload each device task to the server. Simulation outcomes show that the proposed SVM-AF outperforms the model such as Genetic Algorithm based SVM (SVM-GA) and SVM based on throughput, energy consumption, delivery ratio, and overhead.
Published: 2021Read / Download
Throughput Optimization - Based Gateways Placement Methods in Wireless Networks
Suvarna Patil, Prasad Gokhale
Abstract - The Internet of Things (IoT) allows interconnected devices for sharing and controlling data among each other as things are connected through the Internet. Communication among these devices that are part of Wireless Sensor Networks (WSNs) and the Internet is eased with the help of Internet Gateway, which is termed IoT gateway. The performance of IoT networks is affected by various network parameters such as the position in the network gateways, heterogenous coordinating devices, link selection and link assignment, link scheduling, and transmission scheduling. To increase the performance of the network, the placement of the gateways should be optimal, which reduces the deployment cost and increases throughput. Furthermore, more than one gateway is placed to reduce congestion within the IoT network, resulting in noise and increasing the cost. Most researchers focused on the placement of internet gateway or mesh routers in the Wireless Mesh Network (WMN). The gateway placement problem needs to focus on IoT networks where heterogeneous wireless technologies are involved for machine-to-machine communication (M2M). It is challenging to deal with different wireless technologies along with gateway placement for the network throughput maximization. In this article, we propose the "Novel Gateway Select Algorithm," which selects the best candidate gateways to achieve throughput maximization during heavy traffic load on coordinating devices or intermediate gateways. The evaluation of the performance of the Novel Gateway Select algorithm is demonstrated by using simulation. The result proved that the proposed system selects the appropriate candidate gateway with high throughput and minimum average load considering the dynamic variance of heavy traffic at each coordinating device or intermediate gateway in the IoT network.
Published: 2021Read / Download
A Survey on Issues and Possible Solutions of Cross-Layer Design in Internet of Things
Sultana Parween, Syed Zeeshan Hussain, Md Asdaque Hussain
Abstract - Last decade has seen the evolution of Internet of Things (IoT) and it has been affiliated with various networking technologies. The study shows that blending various networks like WSN, WBAN, and LoRaWAN with digital devices will revolutionize the current decade. Billions of wireless devices will cooperate and communicate with each other to generate huge data every day. The heterogeneity of devices and communication network technologies are inherent in IoT. Various digital devices are connected and interact with various devices, which have different specifications and run on different platforms. Therefore, the heterogeneity of network architecture, communication technologies, and application requirement intricacy enforce many challenges. Traditional communication technologies which rely heavily on layered approach need an amendment to suit the need of the IoT as various layers (e.g. Transport layer's TCP) fails to address the issues of heterogeneity. This work reviews various cross-layer mechanisms extensively, which have been suggested in past to overcome the issue and challenges which arose due to the heterogeneous nature of IoT. We also identify the main issues such as energy consumption, mobility, interoperability, security, privacy, and scalability, etc. faced when using cross-layer design (CLD) in IoT and suggest available cross-layer solutions for them.
Published: 2021Read / Download
Blockchain-Enabled Consensus Routing Protocol Improving the Security Data Communication in Internet of Things Applications
Monika Parmar, Harsimran Jit Kaur
Abstract - The Internet of Things (IoT) and Blockchain distribution ledger technology as a concept is enchanting facilities and industrial developments with advanced implements in many applications. The IoT and Blockchain market is further expected to develop three times from current development by 2025. Though many IoT applications have major challenges in safest data transaction and scalability issues while increasing the number of IoT devices. Practical Byzantine Fault Tolerance (PBFT) is a widely used form of decentralized consent, however the network node's confidence in PBFT cannot be guaranteed, as well as the mechanism of reaching consensus will consume a large amount of network services. The article suggests the novel consensus process, which is referred to a Hybrid consensus blockchain algorithm and control authentication on Trust. The Internet of Things applications are integrated with a blockchain-based decentralized system that authenticates the IoT devices through distributed control authentication. This hybrid consensus blockchain method provides security for transactions and access to unauthorized devices is restricted. The PBFT algorithm using a decentralized network system using blockchain has no restriction of IoT devices. Even malicious users create the grouping into the network that has been controlled by the distributed control authentication method. Further then malicious users are rejected from the decentralized network. In this paper, we propose the Hybrid consensus blockchain and PBFT algorithm ensure the safest data transaction through blockchain technology and improves the performance of the decentralized network. Finally, we have presented a Hybrid Consensus algorithm to be utilized in the PBFT method which enables the safest data transaction.
Published: 2021Read / Download
Hybrid Approaches to Address Various Challenges in Wireless Sensor Network for IoT Applications: Opportunities and Open Problems
Pallavi Joshi, Ajay Singh Raghuvanshi
Abstract - Since the last decade, wireless sensor network (WSN) and Internet of Things (IoT) has proved itself a versatile technology in many real-time applications. The scalability, cost-effectiveness, and self-configuring nature of WSN make it the fittest technology for many network designs and scenarios. The traditional WSN algorithms are programmed for fixed parameters without any touch of Artificial Intelligence as well as the optimization technique. So, they suffer from a trade-off between various QoS parameters like network lifetime, energy efficiency, and others. To conquer the limitations of traditional WSN algorithms, machine learning has been introduced in wireless technology. But machine learning approaches also cannot solve all the problems in WSN solely. Some of the applications like target tracking, congestion control, and many more, do not give desired results even after applying the machine learning techniques. So, there is a need to introduce optimization in such cases. The paper gives an extensive survey on various optimization methods employed to solve many WSN issues from 2005 till 2020. It also gives a brief description of the usage of various machine learning techniques in WSNs from 2002 till 2020. The paper discusses the advantages, limitations, effects of these methods on various WSN techniques like topology, coverage, localization, network and node connectivity, routing, clustering, cluster head selection, cross-layer issues, intrusion detection, etc. This paper gives a lucid comparison of many state-of-the-art optimization algorithms and descriptive and statistical analysis for discussed issues and algorithms associated with them. It also elucidates some open issues for WSNs/IoT networks that can be solved using these approaches.
Published: 2021Read / Download
Design and Analysis of a Reliable, Prioritized and Cognitive Radio-Controlled Telemedicine Network Architecture for Internet of Healthcare Things
Abhinav Adarsh, Shashwat Pathak , Basant Kumar
Abstract - This paper proposes and evaluates a reliable and efficient wireless telemedicine network architecture using cognitive radio network technology for e-Health applications. The proposed architectural framework is designed, to tackle congestion and inconsistency in network availability using the cognitive radio (CR) and to provide priority-based health services to distant primary health care centers. The proposed architectural framework utilizes the (1) dynamic prioritization scheme of the data, based on patient condition (2) prioritization based channel allocation using novel MAC protocol and (3) efficient utilization multiple wireless communication technologies using cognitive radio network. This paper utilizes the Data Sensitive Adaptive MAC (DSA-MAC) protocol for medical data prioritization and transmission at a body area network level (consist of multiple wireless medical sensors implanted on the single patient) of communication..............
Published: 2021Read / Download
Fractional Gaussian Firefly Algorithm and Darwinian Chicken Swarm Optimization for IoT Multipath Fault-Tolerant Routing
Salem Abdulla Awadh Ba hmaid, V. Vasanthi
Abstract - Wireless Sensor Networks (WSN) based Internet-of-Things (IoT) systems offer high efficient data transmission with enhanced Quality of Service (QoS). A multi-constraint based energy-efficient and fault-tolerant routing algorithm using Fractional Gaussian Firefly Algorithm (FGFA) and Darwinian Chicken Swarm Optimization (DCSO) are presented for performing optimal multipath communication. FGFA is an improved Firefly Algorithm in which the fractional theory and Gaussian function are incorporated to improve the convergence speed with higher efficiency. Likewise, the DCSO is an improved model of CSO based on the survival theory of Darwin to decrease the computation time and improve the convergence by eliminating the local optimal challenges. Initially, the network is clustered and the cluster heads (CH) are chosen optimally by FGFA based on the objective function ..........
Published: 2020Read / DownloadConcepts and Contributions of Edge Computing in Internet of Things (IoT): A Survey
S. Magesh, J. Indumathi , Radha RamMohan. S, Niveditha V. R,P. Shanmuga Prabha
Abstract - Edge has become a growing trend in recent years. Bringing computing and analytics remarkably close to the data where it originated is the leading cause of edge computing. As the data is growing day by day, there arises the bottleneck in computation and network layers. Due to the enormous growth of Internet of Things (IoT) devices with its recent applications, the need for real-time computation has readily driven edge computing. Today data processing is an excellent paradigm for real-time data. In the integration of various IoT devices to solve the computing perplexities, created the emergence of the Edge computing. This paper clarifies concepts and contributions of edge computing associated with IoT devices. The proposed work produces a thumbnail survey on edge computing and its performance management towards IoT devices.........
Published: 2020Read / Download
A Survey on Edge-Based Internet-of-Things
Hushmat Amin Kar, G.M. Rather
Abstract - Internet of Things (IoT) is improving the overall quality of our lives by helping us to connect, measure and control the different parameters of the system in an automated manner. The IoT devices are generating massive volumes of data that needs to be processed and on the basis of the results, decisions are made. The IoT devices have limited resource capabilities, so these devices utilize the services of the cloud servers. The issue in utilizing the services of the cloud is that it fails to provide support for real-time and time-critical applications. In order to reduce the response time of the system, another service layer is added to the architecture i.e. Edge computing. The IoT devices will now send their requests to the edge servers. Utilizing the services of the edge servers will reduce both the network traffic to the cloud and response time of the system. This paper presents a detailed survey of Edge-based IoT taking various parameters like architecture, bandwidth, security, energy, payload, etc. into consideration.
Published: 2019Read / DownloadEvaluation of Optimum NPRACH Performance in NB-IoT Systems
Maha Medhat, Khaled ElShafey, Ali Rashed
Abstract - Narrowband-internet of Things (NB-IoT) is a low power wide area network that contributes strongly to the revolution and expansion of the internet of things (IoT). Here, we aim at improving the performance and reliability of NB-IOT. Given than random access is one of the most influential characteristics of NB-IoT system performance, a detailed study of the NB-IOT random access was conducted, taking into account random access channel (NPRACH) periodicity, number of collisions, number of users, random access preamble repetitions and time taken for all system users to finalize a random access procedure. Simulation results have shown that appropriately choosing NPRACH periodicity values can efficiently achieve uplink channel optimization between its two signals NPRACH and NPUSCH with an acceptable number of collisions and a high number of delivered packets. Short periodicities (40ms and 80ms) show optimal results in ...........................
Published: 2019Read / Download
Virtualization and IoT Resource Management: A Survey
Saniya Zahoor, Roohie Naaz Mir
Abstract - The ubiquitous computing and its applications at different levels of abstraction are possible mainly by virtualization. Most of its applications are becoming pervasive with each passing day and with the growing trend of embedding computational and networking capabilities in everyday objects of use by a common man. Virtualization provides many opportunities for research in IoT since most of the IoT applications are resource constrained. Therefore, there is a need for an approach that shall manage the resources of the IoT ecosystem. Virtualization is one such approach that can play an important role in maximizing resource utilization and managing the resources of IoT applications. This paper presents a survey of Virtualization and the Internet of Things. The paper also discusses the role of virtualization in IoT resource management.
Published: 2018Read / DownloadA Survey on the Internet of Things Solutions for the Elderly and Disabled: Applications, Prospects, and Challenges
Resul Das, Ayse Tuna, Senay Demirel, Meral Kayapinar Yurdakul
Abstract - Advances in technology has not only led to the start of innovative solutions and new business opportunities in different sectors but also reduced manpower needs and operational costs. Furthermore, the quality of provided services has been improved. Therefore, recently, the Internet of Things (IoT) has gained a great momentum as a key enabling technology for a wide range of health care applications, especially for the elderly and disabled. Although, solutions based on IoT technology have started to support the elderly and disabled in many areas of their life and work and the IoT helps improve quality of life for the elderly and disabled, the amount of data collected by the IoT has increased tremendously and surpassed the expectations............................
Published: 2017Read / Download
Exploring IOT Application Using Raspberry Pi
Cheah Wai Zhao, Jayanand Jegatheesan, Son Chee Loon
Abstract - There are thousands of sensors in an industry with different usage, such as, pressure transmitters, flow meter, temperature transmitters, level transmitters, and so on. Wired networks are mainly used to transfer data to base station by connecting sensor. It brings advantage as it provides reliable and stable communication system for instruments and controls. However, the cost of cables necessary is very costly. Therefore, recently low cost wireless networks are strongly required by customers, for example, temporary instrument networks and/or some non-critical permanent sites which require low data rate and longer battery life. In client/server model, file server act as a parent's node which allow multiple child node to connect with it. It is responsible for central storage and data management so that other computers enable to access the file under the same network..........................
Published: 2015Read / Download