The practical Internet of Things at the current stage still persists in handling an energy minimized network. For a proper network communication an energy consumption of 80\% is indulged only on the communication setup. 6LoWSD (6LoWPAN Software Defined) is an SDN based IoT network protocol developed to minimized the IoT constraints. The SDN’s feature of decoupling the controller plane from the data plane enhances the network efficiency. These target conducts towards data rate, traffic, throughput and duty cycling management. Besides these it also provides a sense of flexibility towards program-ability for the current IoT networks. Efficient power system is a highly Important domain which needed for handling the stability for the whole SDN-IoT system. An effort towards enveloping state transition schedulers for energy optimization has been experimented in this paper.
Authored by Wanbanker Khongbuh, Goutam Saha
The Routing Protocol for Low power and Lossy networks (RPL) has been developed by the Internet Engineering Task Force (IETF) standardization body to serve as a part of the 6LoWPAN (IPv6 over Low-Power Wireless Personal Area Networks) standard, a core communication technology for the Internet of Things (IoT) networks. RPL organizes its network in the form of a tree-like structure where a node is configured as the root of the tree while others integrate themselves into that structure based on their relative distance. A value called the Rank is used to define each node’s relative position and it is used by other nodes to take their routing decisions. A malicious node can illegitimately claim a closer position to the root by advertising a lower rank value trapping other nodes to forward their traffic through that malicious node. In this study, we show how this behavior can have a detrimental side effect on the network via extensive simulations and propose a new secure objective function to prevent such an attack.
Authored by B. Ghaleb, A. Al-Dubai, A. Hussain, J. Ahmad, I. Romdhani, Z. Jaroucheh
IoT will be capable to openly provide entry to selected data groups to enable the building of diverse digitized programs while also clearly and fluidly integrating a large range of different and unsuitable end devices. It is a highly challenging task to develop a common design for IoT due to the large variety of devices, connection layer technologies, and applications that could be incorporated in such a system. Urban Iot applications, while still a sizable segment, are the focus of this investigation. The target application domain of these algorithms sets them apart. Urban IoTs are actually created to support the idea of the "Urban Development," which aims to use the most modern networking technology to allow additional offerings for both the municipal government and the citizens. Thus, this article provides a full survey of technology options, rules and regulations, and building design for simply an urban IoT. This Padova initiative, that serves as a convincing example of an IoT offshore rollout conducted out in cooperation with the municipal administration inside the Italian province of Padova, will be covered in detail along with the methodological techniques and finest standards employed there.
Authored by Kundan Pramanik, Swapnil Parikh
Autonomous and Supported Lifestyle (AAL) has been highlighted as a requirement in today s environment in a number of theories, techniques, and different uses for the Internet of Things. (IoT). Technologies standardization initiatives like Wireless V4.x (Wireless smart), for example, have sparked a meteoric rise in creative relatively brief wireless devices that can provide a variety of services to AAL. Additionally, new potential for major carrier is created by enabling equipment (Sq.m) connectivity between all of these technologies. To support M2M exchanges, telecommunications companies, especially telecom companies, might have to build new infrastructure and rethink their corporate objectives. Simple Square meters or IoT products often need another suitable tool, like a telephone, to serve as a doorway to the World wide web in order to function to their fullest capacity. The unique Concept of Iot examined in this study enables any nearby Innertubes device to serve as an M2M entry point for Internet of things. As a result, the user of a Sensor node no longer has to own a smartphone or other Innertubes equipment in order to access capabilities like internet - based. In this research, an unique IoT architectural prototype system for short-range signal repeaters is described. The test bed s installation, benefits and drawbacks, and sampling analysis using data acquired from a real-world event are discussed, and the findings are positive.
Authored by Saksham Sood
In this research, a power consumption analysis of wireless devices for Internet of Things applications is described. The research analyzes and contrasts a variety of tiny wireless communication techniques and their modules, including ZigBee, Energy Saver Wi-Fi, Six-Low-PAN, and LPWA, all of which aim to conserve energy and lengthen the lifespan of the devices that make up an IoT network. This focuses on the significance of employing small wireless techniques and components in IoT applications. The study s methodology is defined by the individual module used to implement the protocol. According to the degree of communication between sensor nodes, the proposed protocols are categorized. ZigBee, 6LoWPAN, and low power Wi-Fi are the candidate protocols for connectivity over short distances. The LoRaWAN protocol is a possibility for long-distance connectivity. Given the wide variation in power consumption between modules and protocols, the results of this study demonstrate how carefully selecting units for every protocol can greatly affect the duration of its use. Accordingly, protocols are compared with one another in various ways based on the module in question.
Authored by Ramakrishnan Raman, Joel Alanya-Beltran, Shaik Akram, Snehal Trivedi, Shivaji Bothe, Kalyan Chakravarthi
Proposed system, pollution monitoring, the automobile industry, and sports are just a few of the application areas that have grown as a result of ubiquitous sensing and the distinctive features (Sensor systems). As the underlying significantly expanded the number of linked things with realtime communication and data computation, WSNs have grown in importance in recent years. However, owing to the scale and accessibility of IoT, building a complex challenge, and past methodologies established for Iot technologies cannot be implemented directly. In this paper, pairwise clusters models for Iot networks in the Iot paradigm are proposed: I a resource grouping model and (ii) a business clusters model where responsibilities are allocated to individual sensor nodes depending on how well they provide services. The end-to-end latency, and communication bandwidth balancing.
Authored by Lovi Gupta, Al Khalid, Ujjawal Kumar, Sai Mahadevuni, Hayder Al-Chilibi, Malik Alazzam
The resource-constrained IPV6-based low power and lossy network (6LowPAN) is connected through the routing protocol for low power and lossy networks (RPL). This protocol is subject to a routing protocol attack called a rank attack (RA). This paper presents a performance evaluation where leveraging model-free reinforcement-learning (RL) algorithms helps the software-defined network (SDN) controller achieve a cost-efficient solution to prevent the harmful effects of RA. Experimental results demonstrate that the state action reward state action (SARSA) algorithm is more effective than the Q-learning (QL) algorithm, facilitating the implementation of intrusion prevention systems (IPSs) in software-defined 6LowPANs.
Authored by Christian Moreira, Georges Kaddoum
Scientific and technological advancements, particularly in IoT, have greatly enhanced the quality of life in society. Nevertheless, resource constrained IoT devices are now connected to the Internet through IPv6 and 6LoWPAN networks, which are often unreliable and untrusted. Securing these devices with robust security measures poses a significant challenge. Despite implementing encryption and authentication, these devices remain vulnerable to wireless attacks from within the 6LoWPAN network and from the Internet. Researchers have developed various methods to prevent attacks on the RPL protocol within the 6LoWPAN network. However, each method can only detect a limited number of attack types, and there are still several drawbacks that require improvement. This study aims to implement several attack prevention methods, such as Lightweight Heartbeat Protocol, SVELTE, and Contiki IDS. The study will provide an overview of these methods theories and simulate them on Contiki OS using Cooja software to assess their performance. The study s results demonstrate a correlation between the simulated data and the proposed theories. Furthermore, the study identifies and evaluates the strengths and weaknesses of these methods, highlighting areas that can be improved upon.
Authored by Tran Duc, Vo Son
IoT technology establishes a platform for automating services by connecting diverse objects through the Internet backbone. However, the integration of IoT networks also introduces security challenges, rendering IoT infrastructure susceptible to cyber-attacks. Notably, Distributed Denial of Service (DDoS) attacks breach the authorization conditions and these attacks have the potential to disrupt the physical functioning of the IoT infrastructure, leading to significant financial losses and even endangering human lives. Yet, maintaining availability even when networking elements malfunction has not received much attention. This research paper introduces a novel Twin eye Architecture, which includes dual gateway connecting every IoT access network to provide reliability even with the failure or inaccessibility of connected gateway. It includes the module called DDoS Manager that is molded into the gateway to recognize the dangling of the gateway. The effectiveness of the proposed model is evaluated using dataset simulated in NS3 environment. The results highlight the outstanding performance of the proposed model, achieving high accuracy rates. These findings demonstrate the proposed network architecture continues to provide critical authentication services even upon the failure of assigned gateway.
Authored by Manjula L, G Raju
The growing Internet of Things (IoT) has led to an increasing number of interconnected devices across diverse locations. To enable efficient data transmission in resourceconstrained IoT networks, selecting the right communication protocols is crucial. This study compares the performance of 6LoWPAN-CoAP and RPL-CoAP in LoRaWAN networks under limited settings, focusing on Packet Delivery Ratio (PDR) and latency. Tests with simulated LoRaWAN settings were conducted at various scales to evaluate both protocols’ scalability and dependability. The findings demonstrate that RPL-CoAP outperforms 6LoWPAN-CoAP in constrained LoRaWAN scenarios, consistently showing higher PDR and reduced latency. The RPL routing algorithm’s inherent characteristics contribute to this improved performance, effectively constructing routes while considering energy usage and link quality. Additionally, the study highlights LoRaWAN networks’ inherent PDR benefits over conventional networks, making the RPL-CoAP and LoRaWAN combination a powerful option for IoT applications in limited settings. These insights can guide the design of reliable and effective IoT applications in resource-limited environments, maximizing the IoT ecosystem’s potential.
Authored by Vasudha M, Animesh Giri