Energy conservation is a major challenge in the Internet of Things (IoT) as the number of resource‐constrained devices is connected to the network. Routing plays a vital role in IoT to extend the lifespan of the network. Routing protocol for low‐power and lossy networks (RPL) is a standard routing protocol in IoT. The parent selection is a crucial role in the routing process to exchange the data. In RPL, the researchers have introduced a single metric, composite metric, and multiobjective optimization algorithm for parent selection. However, the improper parent selection causes the packet losses, congestion among the network nodes, depletes more energy, and increases the convergence time. To overcome these issues, this article proposes energy efficient optimal parent selection in RPL (EEOPS‐RPL) using firefly optimization algorithm to extend the lifespan of the IoT network. In EEOPS‐RPL, each node in the network is considered to be firefly and also calculates the current location of firefly, attraction of the fireflies, random function, velocity, and the global best values in the network. Residual energy and expected transmission count are attractiveness parameters and distance is a movement parameter to choose the optimum parent in the destination‐oriented directed acyclic graph for data transmission. The simulation is conducted using COOJA. The EEOPS‐RPL provides better performance in comparison to the efficient parent selection for RPL (EPC‐RPL) and the E‐RPL. The EEOPS‐RPL improves the packet transmission ratio and lifespan of the network by 2% to 5%, and 5% to 10%, respectively, compared with EPC‐RPL and E‐RPL.
In EEOPS‐RPL, each participant node applies the firefly algorithm over the parent node information such as distance, residual energy, and expected transmission count through DODAG information object control message to pick the best parent node in the DODAG. The firefly algorithm provides the fast convergence that able to choose the optimal parent quickly. Thus, it avoids the packet loss during the route establishment in network. Thus, EEOPS‐RPL extends the lifespan of the network and reduces the convergence time.
In today’s sensor network research, numerous technologies are used for the enhancement of earlier studies that focused on cost-effectiveness in addition to time-saving and novel approaches. This survey presents complete details about those earlier models and their research gaps. In general, clustering is focused on managing the energy factors in wireless sensor networks (WSNs). In this study, we primarily concentrated on multihop routing in a clustering environment. Our study was classified according to cluster-related parameters and properties and is subdivided into three approach categories: (1) parameter-based, (2) optimization-based, and (3) methodology-based. In the entire category, several techniques were identified, and the concept, parameters, advantages, and disadvantages are elaborated. Based on this attempt, we provide useful information to the audience to be used while they investigate their research ideas and to develop a novel model in order to overcome the drawbacks that are present in the WSN-based clustering models.
In broad, three machine learning classification algorithms are used to discover correlations, hidden patterns, and other useful information from different data sets known as big data. Today, Twitter, Facebook, Instagram, and many other social media networks are used to collect the unstructured data. The conversion of unstructured data into structured data or meaningful information is a very tedious task. The different machine learning classification algorithms are used to convert unstructured data into structured data. In this paper, the authors first collect the unstructured research data from a frequently used social media network (i.e., Twitter) by using a Twitter application program interface (API) stream. Secondly, they implement different machine classification algorithms (supervised, unsupervised, and reinforcement) like decision trees (DT), neural networks (NN), support vector machines (SVM), naive Bayes (NB), linear regression (LR), and k-nearest neighbor (K-NN) from the collected research data set. The comparison of different machine learning classification algorithms is concluded.
Present day world have evolved from traditional environment to smart industries using IoT scheme which in turn forms Industrial Internet of Things (IIoT), which significantly elaborated by providing enhance integration using smart communication through IoT based sensors. IIoT has been providing cost reduction and enhancement in technology by bringing availability, flexibility and data sharing through real time scenario. Despite being unsecure environment of cloud, the privacy of data transfer and information confidentiality is guaranteed. In this context, this work presents a Public Key Encryption with Equality Test based on DLP with double decomposition problems over near-ring. Computation Diffie-Hellman is utilized in algebraic structure which involves DLP with Double Decomposition problem for proposing a Public Key Encryption withEquality Test which provides more security to the scheme. The proposed method is highly secure and it solves the problem of quantum algorithm attacks in IIoT systems. Further, the suggested system is significantly secure and it prevents the chosen-ciphertext attack in type-I rival and it is indistinguishable against the random oracle model for the type-II rival. The recommended scheme is highly secure and the security analysis measures are comparatively stronger than existing techniques. Search time of the proposed scheme is 150 milliseconds for which the number of attributes is 50 and when comparing to the decryption time of the proposed model which is lower when compared to other existing scheme for 50 attributes.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.