2021
DOI: 10.1002/jnm.2858
|View full text |Cite
|
Sign up to set email alerts
|

Trust and energy aware routing algorithm for Internet of Things networks

Abstract: The expansion in the Internet of Things (IoT) has led to a shift towards smart technologies. IoT focuses on integrating networks to facilitate smooth services to humans. The interface between the mobility patterns and the routing protocols is considered to increase the performance of the network. However, incorporating security in the IoT network has been a major issue that continues to nurture with increasing IoT devices. This article addresses this issue by developing a novel technique, namely energy harvest… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
8
0

Year Published

2021
2021
2023
2023

Publication Types

Select...
5
1

Relationship

0
6

Authors

Journals

citations
Cited by 7 publications
(8 citation statements)
references
References 38 publications
(48 reference statements)
0
8
0
Order By: Relevance
“…DBN is a basic DNN technique that contains distinct layers such as restricted Boltzmann machine (RBM) and multilayer perceptron (MLP). The RBM has visible and hidden units that are connected on the fundamental of weighted connection [19]. MLP is altered as feed-forward network which comprises output, input, and hidden layers.…”
Section: Design Of Dbn Based Predictive Modelmentioning
confidence: 99%
See 1 more Smart Citation
“…DBN is a basic DNN technique that contains distinct layers such as restricted Boltzmann machine (RBM) and multilayer perceptron (MLP). The RBM has visible and hidden units that are connected on the fundamental of weighted connection [19]. MLP is altered as feed-forward network which comprises output, input, and hidden layers.…”
Section: Design Of Dbn Based Predictive Modelmentioning
confidence: 99%
“…The MFO technique employs 3 functions for initializing the arbitrary places of moths (I), moving the moth from the searching space (P), and ending the searching state (T) based on Eq. ( 19): MFO = (I, P, T) (19) where I demonstrates the function which initializing the primary population of moths as illustrated in Eq. (20).…”
Section: Design Of Comfo Based Hyperparameter Tuning Processmentioning
confidence: 99%
“…Trustworthiness is measured only based on the trust value. Considering energy and security as prime aspects, S. M. Mujeeb et al [23] proposed an "energy harvesting trust aware routing algorithm (EHTARA)". For the determination of the best path, a cost metric is introduced by combining trust, distance, and energy.…”
Section: Literature Surveymentioning
confidence: 99%
“…Following the development of edge computing, cloud computing, and 5G networks, the most recent focus includes migration methods and scheduling certain tasks from local devices to remote cloud processing [38,39], energy management systems focused on security [40], task allocation algorithms in multi-cloud networks [41], and energy-aware video streaming for mobile devices [42,43]. Increasingly more works are also related to energy saving in the context of Internet of Things networks, e.g., [44][45][46].…”
Section: Related Workmentioning
confidence: 99%