Improving Energy Efficiency in Internet of Things using Artificial Bee Colony Algorithm

Page: [161 - 168] Pages: 8

  • * (Excluding Mailing and Handling)

Abstract

Background: With the advent of IoT, the deployment of batteries with a limited lifetime in remote areas is a major concern. In certain conditions, the network lifetime gets restricted due to limited battery constraints. Subsequently, the collaborative approaches for key facilities to reduce the constraint demands of the current security protocols.

Objective: This work covers and combines a wide range of concepts linked by IoT based on security and energy efficiency. Specifically, this study examines the WSN energy efficiency problem among IoT devices and security for the management of threats in IoT through collaborative approaches and finally outlines the future. The concept of energy-efficient key protocols which clearly cover heterogeneous IoT communications among peers with different resources has been developed. Because of the low capacity of sensor nodes, the energy efficiency in WSNs has been an important concern.

Methods: In this paper, we present an algorithm for Artificial Bee Colony (ABC) which reviews security and energy consumption to discuss their constraints in the IoT scenarios.

Results: The results of a detailed experimental assessment are analyzed in terms of communication cost, energy consumption and security, which prove the relevance of a proposed ABC approach and a key establishment.

Conclusion: The validation of DTLS-ABC consists of designing an inter-node cooperation trust model for the creation of a trusted community of elements that are mutually supportive. Initial attempts to design the key methods for management are appropriate individual IoT devices. This gives the system designers, an option that considers the question of scalability.

Keywords: Energy efficiency, end-to-end security, IoT, artificial bee colony algorithm, collaborative approach, sensor nodes.

Graphical Abstract

[1]
J.P. Walters, Z. Liang, W. Shi, and V. Chaudhary, "Wireless sensor network security: a survey, in Distributed, Grid, and Pervasive Computing", vol. 1. CRC Press. 2007, no. 367, p. 849.
[2]
"IEEE Standard for Low-Rate Wireless Personal Area Networks (LRWPANs)", IEEE Std 802.15.4.(Revision of IEEE Std 802.15.4-2006), 2011.
[3]
"ZigBee Specification Version 1.0", ZigBee Alliance, 2008.
[4]
R. Roman, J. Zhou, and J. Lopez, "On the features and challenges of security and privacy in distributed internet of things", Comput. Netw., vol. 57, no. 10, pp. 2266-2279, 2013.
[http://dx.doi.org/10.1016/j.comnet.2012.12.018]
[5]
J. Gubbi, R. Buyya, S. Marusic, and M. Palaniswami, "Internet of Things (IoT): a vision, architectural elements, and future directions", Future Gener. Comput. Syst., vol. 29, no. 7, pp. 1645-1660, 2013.
[http://dx.doi.org/10.1016/j.future.2013.01.010]
[6]
N. Kushalnagar, G. Montenegro, and C. Schumacher, "IPv6 over Low-Power Wireless Personal Area Networks (6LoWPANs): overview, Assumptions, Problem Statement, and Goals", IETF RFC 4919, 2007.
[7]
J. Arkko, E. Carrara, F. Lindholm, M. Naslund, and K. Norrman, "MIKEY: Multimedia Internet KEYing", IETF RFC 3830, 2004.
[8]
X. Liu, X. Di, J. Li, H. Yang, L. Cong, and J. Zhao, "Cloud Provider’s Response to Multiple Models of Attack Behaviors", Recent Pat. Eng., vol. 13, no. 4, pp. 325-333, 2019.
[http://dx.doi.org/10.2174/1872212112666180918165944]]
[9]
Y. Wu, W. Chen, S. Chen, G. Wang, and C. Li, "A New User-controlled and Efficient Encrypted Data Sharing Model in Cloud Storage", Recent Pat. Eng., vol. 13, no. 4, pp. 356-363, 2019.
[http://dx.doi.org/10.2174/1872212113666190215143537]]
[10]
N. Yuvaraj, N.V. Kousik, S. Jayasri, A. Daniel, and P. Rajakumar, "A Survey on Various Load Balancing Algorithm to Improve the Task Scheduling in Cloud Computing Environment", J. Adv. Res. Dynam. Contr. Sys., vol. 11, no. 8, pp. 2397-2406, 2019.
[11]
L. Bao, and J.C. Zeng, "Comparison and Analysis of the Selection Mechanism in the Artificial Bee Colony Algorithm", Conference on Hybrid Intelligent Systems, 2009, pp. 411-416
[http://dx.doi.org/10.1109/HIS.2009.319]
[12]
N. Yuvaraj, and P. Vivekanandan, "An efficient SVM based tumor classification with symmetry non-negative matrix factorization using gene expression data", Proc.IEEE International Conference on Information Communication and Embedded Systems, 2013, pp. 761-768
[http://dx.doi.org/10.1109/ICICES.2013.6508193]
[13]
F. Zhu, M.W. Mutka, and L.M. Ni, "Private entity authentication for pervasive computing environments", Int. J. Netw. Secur., vol. 14, no. 2, pp. 86-100, 2012.
[14]
S. Shin, T. Shon, H. Yeh, and K. Kim, "An effective authentication mechanism for ubiquitous collaboration in heterogeneous computing environment", Peer-to-Peer Netw. Appl., 2013.
[15]
Y. Liu, J. Li, and M. Guizani, "PKC based broadcast authentication using signature amortization for WSNs", IEEE Trans. Wirel. Commun., vol. 11, no. 6, pp. 2106-2115, 2012.
[http://dx.doi.org/10.1109/TWC.2012.032812.110433]
[16]
S. Shin, T. Shon, H. Yeh, and K. Kim, "An effective authentication mechanism for ubiquitous collaboration in heterogeneous computing environment", Peer-to-Peer Netw. Appl., vol. 7, no. 4, pp. 612-619, 2014.
[http://dx.doi.org/10.1007/s12083-013-0220-8]
[17]
Q. Xu, and M. He, Improved constant storage self-healing key distribution with revocation in wireless sensor network., Info, Secur. Appl. Springer Berlin Heidelberg, 2009, pp. 41-55.
[http://dx.doi.org/10.1007/978-3-642-00306-6_4]
[18]
R. Dutta, Y.D. Wu, and S. Mukhopadhyay, "Constant storage self-healing key distribution with revocation in wireless sensor network", InCommunications, 2007. ICC'07. IEEE International Conference on, 2007pp. 1323-1328
[http://dx.doi.org/10.1109/ICC.2007.223]
[19]
T. Kothmayr, C. Schmitt, W. Hu, M. Brünig, and G. Carle, "DTLS based security and two-way authentication for the Internet of Things", Ad Hoc Netw., vol. 11, no. 8, pp. 2710-2723, 2013.
[http://dx.doi.org/10.1016/j.adhoc.2013.05.003]
[20]
Y.B. Saied, A. Olivereau, D. Zeghlache, and M. Laurent, "Lightweight collaborative key establishment scheme for the Internet of Things", Comput. Netw., vol. 64, pp. 273-295, 2014.
[http://dx.doi.org/10.1016/j.comnet.2014.02.001]
[21]
R. Shilpa, "Litake * and Prachi Mukherji, “Integration of Fuzzy Logic and ABC Algorithm for Optimized Network Selection in Heterogeneous Wireless Environment", Int. J. Sensors Wirel. Commun. Control, vol. 9, p. 1, 2019.
[http://dx.doi.org/10.2174/2210327909666190401205928]
[22]
Samad Najjar-GHABEL Shamim YOUSEFFI, "Leili FARZINVASH, ““ Reliable data gathering in the Internet of Things using artificial bee colony", Turk. J. Electr. Eng. Comput. Sci., pp. 1710-1723, 2018.
[23]
W. Dai, Crypto++ Library 5.6.0...http://www.cryptopp.com
[24]
J. Lacan, V. Roca, and J. Peltotalo, "Reed–Solomon Forward Error Correction (FEC) Schemes", IETF RFC 5510, 2009.