4.7 Article

Bio Inspired Routing Algorithm and Efficient Communications within IoT

期刊

IEEE NETWORK
卷 31, 期 5, 页码 74-79

出版社

IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC
DOI: 10.1109/MNET.2017.1600282

关键词

-

向作者/读者索取更多资源

IoT does not stop integrating and connecting more complex objects with different architectures, resources and constraints. This is why the conventional communication architectures and protocols designed for the existing wireless networks become ineffective in the context of IoT. Indeed, IoT communications parameters and constraints must be taken into account by all the important mechanisms that intervene in the communication process, such as routing. This article surveys a number of proposed routing algorithms for efficient communications within wireless networks and IoT. Based on the limitations of these works, a novel routing algorithm, called EICAntS (Efficient IoT Communications based on Ant System), is proposed to improve the route selection mechanism by exploiting the advantages of an ant colony system. The evaluation results of EICAntS recorded an improvement in delay, throughput, lifetime and conservation of energy.

作者

我是这篇论文的作者
点击您的名字以认领此论文并将其添加到您的个人资料中。

评论

主要评分

4.7
评分不足

次要评分

新颖性
-
重要性
-
科学严谨性
-
评价这篇论文

推荐

Article Engineering, Electrical & Electronic

Cross-layered energy optimization with MAC protocol based routing protocol in clustered wireless sensor network in internet of things applications

Nader Ajmi, Amina Msolli, Abdelhamid Helali, Pascal Lorenz, Ridha Mghaieth

Summary: This paper introduces a novel CEO-MAC protocol to address the issues of energy consumption and network monitoring in smart environments, which is simulated using NS2 software and compared with existing models like TDL, CMISO, and PCL-IDA protocols.

INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS (2022)

Article Computer Science, Hardware & Architecture

Private blockchain-envisioned drones-assisted authentication scheme in IoT-enabled agricultural environment

Basudeb Bera, Anusha Vangala, Ashok Kumar Das, Pascal Lorenz, Muhammad Khurram Khan

Summary: In Intelligent Precision Agriculture, IoT devices and drones are used for monitoring agricultural environment but face security vulnerabilities due to insecure communication. A new authentication and key management scheme called AKMS-AgriIoT has been proposed with private blockchain solution for better security and functionality, supported by a detailed security analysis and comparative study.

COMPUTER STANDARDS & INTERFACES (2022)

Article Engineering, Mechanical

Securing information using a proposed reliable chaos-based stream cipher: with real-time FPGA-based wireless connection implementation

Merah Lahcene, Chaib Noureddine, Pascal Lorenz, Ali-Pacha Adda

Summary: This paper proposes a robust chaos-based stream cipher (CBSC) that addresses the challenges in chaos-based cryptography. The CBSC includes modules such as a synchronization circuit, a perturbation block, an encryption scheme, and a control parameters' generator, providing efficient encryption and statistical properties, as well as good security features.

NONLINEAR DYNAMICS (2023)

Article Computer Science, Information Systems

Cross-Layer Approach for Self-Organizing and Self-Configuring Communications Within IoT

Sofiane Hamrioui, Jaime Lloret, Pascal Lorenz, Joel J. P. C. Rodrigues

Summary: The Internet of Things (IoT) is essential for communication in various sectors, but it faces challenges in terms of autonomy and self-configuration. In this article, a new cross-layer approach, 2SAEC-IoT, is proposed to improve data communication in IoT applications by considering different communication parameters and tolerating failures.

IEEE INTERNET OF THINGS JOURNAL (2022)

Article Computer Science, Hardware & Architecture

Complete outlier detection and classification framework for WSNs based on OPTICS

Mustafa Al Samara, Ismail Bennis, Abdelhafid Abouaissa, Pascal Lorenz

Summary: This paper proposes a centralised outlier detection and classification approach for Wireless Sensor Networks (WSNs), which can distinguish between errors due to a faulty sensor and those due to an event. The approach considers the spatial-temporal correlation between neighbouring sensor nodes and sensors' data values. Through a comparison study with two works from the literature, simulation results show that the proposed approach outperforms the studied techniques in terms of several metrics such as Detection Rate (DR), False Alarm Rate (FAR), Accuracy rate (ACC), F1_score and Area Under the Curve (AUC).

JOURNAL OF NETWORK AND COMPUTER APPLICATIONS (2023)

Article Telecommunications

An Efficient Certificateless Forward-Secure Signature Scheme for Secure Deployments of the Internet of Things

Tahir Ali Shah, Insaf Ullah, Muhammad Asghar Khan, Pascal Lorenz, Nisreen Innab

Summary: Wireless communication networks have greatly improved users' productivity at work and in their daily lives by overcoming the constraints of wired networks and reducing wire maintenance costs. Combining wireless communication with the Internet of Things (IoT) enables applications in smart cities, traffic, farming, drones, etc. However, unauthorized users can cause serious damage through open communication in wireless networks, making authentication through digital signatures crucial.

JOURNAL OF SENSOR AND ACTUATOR NETWORKS (2023)

Article Computer Science, Software Engineering

A new lightweight decentralized mitigation solution against Version Number Attacks for IoT Networks

Mehdi Rouissat, Mohammed Belkheir, Hicham Sid Ahmed Belkhira, Sofiane Boukli Hacene, Pascal Lorenz, Merahi Bouziani

Summary: The present work proposes a new technique to mitigate version number attacks targeting RPL-based IoT networks. The technique effectively reduces control overhead, improves energy efficiency, packet delivery ratio, and latency. The proposed solution has been implemented and simulated, showing significant improvements compared to the network under attack.

JOURNAL OF UNIVERSAL COMPUTER SCIENCE (2023)

Article Engineering, Electrical & Electronic

Public Blockchain-Envisioned Security Scheme Using Post Quantum Lattice-Based Aggregate Signature for Internet of Drones Applications

Prithwi Bagchi, Raj Maheshwari, Basudeb Bera, Ashok Kumar Das, Youngho Park, Pascal Lorenz, David K. Y. Yau

Summary: This paper introduces a lattice-based aggregate signature scheme that ensures security based on the difficulty of the Ring Learning-with-Error problem. It then applies this scheme to secure and transparent data storage in Internet of Drones applications using blockchain technology. Detailed security analysis and comparative study demonstrate the superior security and efficiency of the proposed scheme compared to existing approaches. Testbed experimental results and blockchain simulation show the applicability of the proposed scheme in real-life drone applications.

IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY (2023)

Article Computer Science, Information Systems

An Optimal Authentication Scheme through Dual Signature for the Internet of Medical Things

Zainab Jamroz, Insaf Ullah, Bilal Hassan, Noor Ul Amin, Muhammad Asghar Khan, Pascal Lorenz, Nisreen Innab

Summary: The Internet of Medical Things (IoMT) improves the traditional healthcare system by enabling remote administration, efficient resource utilization, and mobility of medical devices. It simplifies the review of the patient's cloud-based medical history and allows close monitoring of the patient's condition. However, secure communication is crucial due to the privacy of patient medical records.

FUTURE INTERNET (2023)

Proceedings Paper Telecommunications

Group-based WSN with the use of LoRa for long-range communications

Jose Luis Garcia-Navas, Laura Garcia, Jaime Lloret, Oscar Romero, Pascal Lorenz

Summary: This paper proposes a Wireless Sensor Network (WSN) with multiple wireless technologies, and defines a network discovery system and a routing protocol to enable communication and topology construction among devices with different wireless technologies. The study shows that SF 7 achieves the best coverage results for both 433 MHz and 868 MHz devices in Europe, and the use of low-cost devices is not recommended for distances above 1 km.

IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC 2022) (2022)

Proceedings Paper Telecommunications

FIRP: Firefly Inspired Routing Protocol for Future Internet of Things

Abdelhak Zier, Abdelhafid Abouaissa, Pascal Lorenz

Summary: The Internet of Things (IoT) has attracted attention from academia, industry, and government researchers, but it faces many challenges. The Future Internet of Things (FIoT) has been discussed as a solution to these challenges. In particular, the routing Quality of Service (QoS) is a critical issue in this type of network. In this paper, the authors propose a new bio-inspired routing protocol called FIRP, which is designed for FIoT environments using the Simple Additive Weight (SAW) Multi-Criteria Decision Making (MCDM) method. Simulation and statistical tests show that this routing algorithm improves energy consumption, routing overhead, and minimizes end-to-end delay.

IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC 2022) (2022)

Article Engineering, Civil

Detecting Compromised IoT Devices Through XGBoost

Mauro A. A. da Cruz, Lucas R. Abbade, Pascal Lorenz, Samuel B. Mafra, Joel J. P. C. Rodrigues

Summary: The rapid development and widespread adoption of IoT have resulted in an increase in attacks targeting IoT environments. This paper proposes a solution to detect replication attacks in IoT by analyzing abnormal network traffic through machine learning.

IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS (2022)

Article Computer Science, Information Systems

Lightweight Blockchain-Based Scheme to Secure Wireless M2M Area Networks

Karam Eddine Bilami, Pascal Lorenz

Summary: This paper discusses the architectures deployed for M2M communications and security challenges, presents a lightweight design based on a private blockchain to secure wireless M2M communications, and the evaluation shows that the proposed scheme performs better in terms of key parameters compared to other protocols.

FUTURE INTERNET (2022)

Review Telecommunications

A Survey of Outlier Detection Techniques in IoT: Review and Classification

Mustafa Al Samara, Ismail Bennis, Abdelhafid Abouaissa, Pascal Lorenz

Summary: This paper presents a comprehensive literature review of outlier detection techniques used in the context of the Internet of Things (IoT). It discusses the fundamentals of outlier detection, existing approaches, evaluation methods, and challenges in designing these techniques. The paper also compares and discusses recent outlier detection techniques, categorizing them into seven main categories. Each category is discussed in terms of available techniques, highlighting their advantages and disadvantages, and presenting related works. A comparative study of these techniques is provided.

JOURNAL OF SENSOR AND ACTUATOR NETWORKS (2022)

暂无数据