Springer Paper Template ---In MANET
Springer Paper Template ---In MANET
Springer Paper Template ---In MANET
NedumaranArappali1 1 1
, Daniel Getachew Tadesse , Abdulkerim Seid Endris , and
* 2
P.Karthika
1
Department of Electrical and Computer Engineering, Wollo University,
Kombolcha Institute of Technology, Ethiopia
1*
maran.van@gmail.com, danielgetachew@kiot.edu.et/
danielgetachew@gmail.com, abdlkerimseid@kiot.edu.et/
kerimsha@gmail.com
2
Adepartment of Computer Applications, Kalasalingam Academy of Research
and Education, Krishnankoil, india
2
karthikasivamr@gmail.com
Fig. 1. MANETStructure
IoT presents various Quality of Service (QoS) requirements which does not exist
in conventional homogeneous wireless and wired networks[10]. A built-in QoS
guarantees are required to provide a reliable end-to-end intelligent system that
meets the requirement of a complete acquisition broadcast interpretation action
loop. Therefore, different network mechanisms and protocols need to be
developed for IoT. QoS is considered as one of the most critical networking issues
that have obtained researchers substantial attention for both wired and wireless
networks [11]. QoS is one of the leading research concerns in the field of IoT
networks. However, the restriction of resources of IoT devices is considered as
one of the main obstacles against developing a reliable QoS handling mechanism
[12]. Interactions and data exchange between IoT devices can provide a reliable
trust model where the QoS approach can be built upon [13].
Different approaches have been proposed to design the trust model most of these
3
proposed mechanisms mainly provide security for IoT networks [14]. Based on
state of the art, there is a lack of study for build trust model by considering QoS
trust and energy consumption. However, the trust model can be built to focus on
QoS parameters, including throughput, delay, packet loss, and energy
consumption. Scalability is also one of the main problems present in IoT networks
that consist of a high number of devices [15]. The chiefinfluence of this paper is
the design of an energy aware QoS trust model for IoT healthcare devices that
considers energy and QoS in building trust relation and reduce the energy
consumption significantly, when updating the trust values between network
members. Furthermore, this study could be effective for researchers who
interested in developing IoT devices in the healthcare system.
2 Related works
Gu et al. [16] the loT is decomposed into three layers: application layer, a core
layer, and sensor layer, from sides of the network structure of loT. Trust
management for a special purpose for each layer is controlled accordingly, and
these purposes include self-organized, effective routing and multi-service one by
one. The proposed mechanism introduced a high computation overhead in
different layers to build and support the trust model, where IoT limited node
resources can be exhausted. In this case, QoS is also not considered where all data
are handled similarly.
Chen et al. [17] extends this model by adding comprehensive simulation
effectiveness, assess state-of-the-art related work. In light of this, a more advanced
attacker model for analysing the flexibility alongsidethese attacks arranges smart
storage management planning for the ability to limit IoT devices. It is due to
scalability with a comprehensive evaluation, addressing the better route to merge
social parallel metrics to evaluate rates for application performance maximization.
The proposed mechanism targets social networks and services. Also, data priority
was not included in the trust management, where all data are handled similarly.
Asiri and Miri [18] employ distributed probabilistic neural networks (PNNs) to
cluster trustworthy IoT devices from malicious nodes. In addition, it outfits the
problem of the cold start in IoT networks by expecting ratings for newly joined
nodes depending on their characteristics and information collected over time. The
processing task is wholly distributed. Proposed model trying to conquer
limitations of other trust models by training the eventuality neural network and
adapt its weights count on 'nodes' resemblance and the quality of data which is
sent.
Saied et al. [19] the approach clarification aims to manage collaboration in a
nonhomogeneous IoT structure encompass nodes with various resource abilities.
To create an association, support, and practicability of trusted elements in a group
of cooperating services. A single point of failure approach has been used where
4
trust manager failure can result in network trust model failure. Also, higher
communication overhead and long computation are assumed in the bootstrapping
period. QoS is also not considered in building the trust model.
Chen et al. [20] a generalized and unified mechanism was introduced to handle the
issue of trust and reputation by utilizing the development of sensor nodes
community in the Wireless Sensors Network(WSN) of IoT in Cyber-Physical
Systems. Furthermore, the proposed mechanism has been introduced for Cyber-
Physical Systems (CPS) an authentication mechanism is also included. However,
QoS approach is not considered where the primary purpose is to deliver secure
data delivery for all types of data in the same manner where high and low priority
are handled in the same way.
Bao and Chen [21] proposed a scalable trust organisation protocol for IoT. It
emphasizes mainly on the social relationships between nodes. Multiple trust
possessions are considered, with community-interest to account, cooperativeness,
and honesty for social interaction. The proposed mechanism depends on social
relationships where power consumption is not included in trust parameters. All
traffic is handled in the same manner with low and high priority exchanged
similarly.
3 Proposed System
Based on the state of art trust models and control approaches, most of these
approaches are designed for a specific purpose environment. The emphasis is
made more on Security issues about applying a reliable trust model to prevent
attacks. Other than that, approaches introducing higher communication and
processing overhead to building the trust model and exchange trust parameters
reliant on a specific environment are discussed. However, there is an identifiable
gap in the studies for QoS, and different priority traffic handling approaches, that
are not introduced as required metrics in building a trust model. Moreover, energy
consumption needs to be considered in term of trust model designing for IoT
devices as a fundamental factor due to its potentialities of effecting on the
efficiency of these devices.
The goal of energy-saving routing protocols is to find a secure energy route from
the Source Node to the BS for the appropriate period of the network lifetime and
functionality. The network's main purpose is to align energy use (EC) using
various techniques and approaches with the purpose of enlarging the functionality
and NL. This paper introduces SFLA Optimized K-means clustering and AODV
routing. SFLA is used to optimize the K-means procedure with this Hybrid-K-
means SFLA-AODV method. The eight key steps in this hybrid-K-means-SFLA-
AODV method include: 1) IoT Mobile Node Growth, 2) SFLA-based cluster
selection, 3) CH weight-based router estimate, 4) AODV router estimate, 5) CH-
received data and 7) data receiving successfully. Figure 1 below shows the flux
5
Initializing the particles, calculating fitness features and ultimately updating the
speed and location in SFLA-based clustering algorithms. SFLA is an optimal
iteration-based procedure and the structure is prepared by modernizing the
generations with a population of random decisions and optimal search. The
particle changes its current position and discovers the best result through
reiteration, combining local and global knowledge in the search phase of SFLA,
based on its own historical and linked information on the neighboring particles. In
each reiteration, the first finest rate is gotten by the qualification function, and the
second most excellent value is obtained by the application of SFLA within the
population. Elements are modified by each element. The best local value is
determined using topological neighbours' particles. After the finest double
standards are discovered, the particle modernizes its speed and position with
following formulas.
X id = X id + V id (2 )
6
SFLA improves the grouping inspired by the characteristics of the ants of nature
and the related area of SFLA, which identifies the problem in transportation
systems for the quickest directions. SFLA is a calculation that streamlines the
creation and operation of fluffy animals. A swarm molecule is a population of
moving items, which can be pulled into better positions through the space of
pursuit. Each winged creature refers to it as a "molecule," flying with a certain
speed and moving to the best location worldwide. SFLA is a global search that has
a strong ability to identify hopeful global results. The meeting ended with
MANET's use of SFLA. Fig.3 provides basic SN clustering techniques. Burden
adjustment aims to amplify the system throughput, limit the time of reaction and
steer overhead. The survey network searched a wide range of sensor hubs to
7
In the picture 3. The SNs are organized into various cluster networks. The CH is
chosen on the basis of the minimum grade value for each cluster network. The
clusterhead is responsible for assembling data from its neighboring nodes and for
transmitting it to another CH in various networks. The CHs transmit a
confirmation message which contains a time slot plan for their cluster members to
be used during the stage of communication.
Given the adjustments, adjustments and topographic transmission of CH
transmitters and recipients, groups are formed. Each hub knows when the ball can
be transmitted, according to the availability schedule. The CHs collect messages
from all of their groups, supply them and send the results to the BS.
Cluster Head – A head node among the same member of the cluster and other
CHs is called CH.
Cluster Members– In the same cluster networks, cluster members share the same
CH information.
convergence requirements are met. [23]. The SFLA can be briefly described thru
the following steps:
fixed iteration sum has reached. Move to stage (2) otherwise and
repeat.
The routing protocol would be used in the ad hoc network by mobile nodes. The
AODV is intended to reduce overhead and traffic dissemination. The AODV
Routing Protocol covers two route discovery and route maintenance features. The
Route Discovery role decides on the identification of the fresh route and Route
Maintenance determines the detection of connection breakings and repair of an
established route. The reactive protocol does not keep the route table permanently.
AODV can easily analyze network topology changes.
By using the 2017 MATLAB software tool (for simulation purposes), the AODV-
K-means-SFLA device has introduced i5 PC with 8 GB of RAM memory space.In
that proposed method, SFLA used for energy efficient of load balancing and the
routing is carried out by the AODV protocol. The following Table 1
demonstrations the simulation parameters which is used in the AODV-K-means-
SFLA methodology. For knowing the better performance of this AODV-K-means-
SFLA method, it is compared with the only AODV method.
10
Parameter Value
Initial energy of sensor nodes 0.5 J
Area 250*250 m2
Sensor nodes 200
Sum of simulation iterations Length(msg)
Communication range of each 50 nm
node
ET 0.2 PJ/bit/ m2
ER 0.1 PJ/bit/ m2
Packet size 4000 bits
Message size 200 bits
Alive nodes
Living nodes are called the node which has sufficient energy to transmit the
information (chip text). A more efficient data transmission in MANET needs more
live nodes.
Dead nodes
The nodes with no energy for information transmission are called dead nodes. It
degrades the whole network's efficiency and should reduce dead nodes to prevent
the packet loss.
Energy consumption
The total energy needed for each node to provide the message through the path
extracted in the AODV routing (Cipher text).
Ec =E−( E T −E R ) (3)
Throughput
11
From the results itself, it is clearly stated that the proposed protocol along with
SFLA optimization technique achieved better results than AODV protocol. The
energy consumption is high, while implementing AODV-K-means protocol
without optimization. In addition, the dead nodes are less and alive nodes are high
in the proposed AODV-K-means protocol with optimization technique (SFLA).
However, the AODV protocol without optimization has high dead nodes and low
alive nodes, where the throughput is also less in existing AODVprotocol.
13
5 Conclusion
References