Design and Development of Robust and Secure Cluster Routing Algorithm for Manet Based IOT

  IJCTT-book-cover
 
         
 
© 2021 by IJCTT Journal
Volume-69 Issue-8
Year of Publication : 2021
Authors : Revathi B, Arulanandam K
DOI :  10.14445/22312803/IJCTT-V69I8P104

How to Cite?

Revathi B, Arulanandam K, "Design and Development of Robust and Secure Cluster Routing Algorithm for Manet Based IOT," International Journal of Computer Trends and Technology, vol. 69, no. 8, pp. 15-19, 2021. Crossref, https://doi.org/10.14445/22312803/IJCTT-V69I8P104

Abstract
Internet of Things (IoT) is the future of technology for intelligent communication between resources. IoT enables digital interaction between the physical stuff using communication and heterogeneous networks. IoT is the common platform for various sensor devices for emitting data. IoT is the most economical and successful technology for collecting and sharing physical devices in modern days. Mobile ad - hoc network (MANET) with IoT is the technological phenomenon for communicating worldwide frameworks through the internet. This advanced combination facilities communication with greater mobility and minimum costs.But achieving energy efficiency is still an open challenge in the networking environment. In this paper, we proposed MIOTCR (MANET-IOT Clustering Routing Algorithm) for achieving energy-efficient utilization. To prove the efficiency of the proposed system, comparison work is carried with MANET-WSN [11]. The obtained result shows the performance dominance of the proposed MIOTCR in terms of energy consumption and packet delivery ratio than the MANET-WSN.

Keywords
IOT, MANET, Cluster & Energy-efficient routing.

Reference

[1] (IOT): A vision, architectural elements, and future directions, Future Generation Computer Systems, 29(7) (2013) 1645–1660.
[2] ITU-T/Recommendation Y.2060, Overview of the Internet of Things, available at: https://www.itu.int/rec/T-REC-Y.2060201206-I, 2013
[3] M. B. M. Kamel, I. Alameri, A. N. Onaizah, STAODV: A Secure and Trust based Approach to Mitigate Blackhole Attack on AODV based MANET, IEEE 2nd Advanced Information Technology, Electronic and Automation Control Conference, (2017) 1278-1282.
[4] Z. Hussain, R. Balakrishna, A survey on Manets?Types, Characteristics, Applications and Protocols used, National Conference on Frontiers and Advances in Information Science and Technology, (2013).
[5] Kumar, S. Kumar, Study of MANET: Characteristics, Challenges, Application and Security Attacks, International Journal of Advanced Research in Computer Science and Software Engineering, 3(5) (2013) 252-257.
[6] S. Agrawal, M. Lal Das, Internet of Things — A Paradigm Shift of Future Internet Applications, Nirma University International Conference on Engineering; (2011) 1–7.
[7] P. Suresh, J. Vijay Daniel, V. Parthasarathy, R. H. Aswathy, A State of the Art Review on the Internet of Things (IoT) History, Technology and Fields of Deployment, International Conference on Science Engineering and Management Research, (2014) 1–8.
[8] P. Bellavista, G. Cardone, A. Corradi, L. Foschini, Convergence of MANET and WSN in IoT Urban Scenarios, IEEE Sensors Journal, 13(10) (2013) 3558-3567.
[9] G. S. Yovanof, G. N. Hazapis, An Architectural Framework and Enabling Wireless Technologies for Digital Cities & Intelligent Urban Environments, Wireless Personal Communications, 49(3m) (2009) 445-463.
[10] N. Bessis, F. Xhafa, D. Varvarigou, R. Hill, M. Li, (eds), Internet of Things and Intercooperative Computational Technologies for Collective Intelligence, Springer?Verlag, (2013).
[11] S I. A. Alameri, MANETS and Internet of Things: The Development of a Data Routing Algorithm, Engineering, Technology & Applied Science Research, 8(1) (2018) 2604-2608
[12] Yalda Akbari &Shayesteh Tabatabaei, A New Method to Find a High Reliable Route in IoT by Using Reinforcement Learning and Fuzzy Logic, Springer Science +Business Media, LLC, part of Springer Nature 2020,https://doi.org/10.1007/s11277-020-07086-8
[13] Li, G., Zhang, D., Zheng, K., Ming, X., Pan, Z., & Jiang, K. A kind of new multicast routing algorithm for application of Internet of Things. Journal of Applied Research and Technology, 11 (2013) 578–585.
[14] Qiu, T., Lv, Y., Xia, F., Chen, N., Wan, J., &Tolba, A. ERGID: An efficient routing protocol for emergency response Internet of Things. Journal of Network and Computer Applications, 72 (2016) 104–112
[15] Surendiran,R., Similarity Matrix Approach in Web Clustering. Journal of Applied Science and Computations (JASC),5(1) (2018) 267-272. DOI:16.10089.JASC.2018.V5I1.140146.22858
[16] Surendiran, R., Rajan, K.P. and Sathish Kumar, M., Study on the Customer targeting using Association Rule Mining. International Journal on Computer Science and Engineering, 2(7) (2010) 24832484.puter Applications, 72, 104–112 [1]