Improving Multipath Load Balancing Routing With Moth Flame Optimization Approach in Internet of Things Applications

Authors

  • Sukhpal Kaur  Department of CSE, Maharaja Ranjit Singh Punjab Technical University, Bathinda, Punjab, India
  • Dr. Shaveta Rani  Department of CSE, Maharaja Ranjit Singh Punjab Technical University, Bathinda, Punjab, India
  • Dr. Paramjeet Singh  Department of CSE, Maharaja Ranjit Singh Punjab Technical University, Bathinda, Punjab, India

Keywords:

Internet of Things (IoT), Wireless Sensor Network, Multipath load balancing approach, OLSR protocol, Moth Flame Optimization Algorithm

Abstract

In future, billion of wireless devices will communicate with each other in the Internet of things to make more efficient and convenient life style. Internet of things is a network containing multiple wireless devices, also called nodes, which are connected with each other and also share the information through the internet. Every device in an IoT is free to move independently in all the directions. It can change its links to other devices frequently. Nodes are randomly connected with each other using arbitrary topology. They can act as both routers and hosts. This research puts light on one issues related works which will give ideas to give their best to the Internet of Things (IoT) environment.

The existing approach is multipath load balancing which used to handle the Internet of thing traffic on the wireless sensor network for link stability. There are two main designs: layer design and load balance where the information is sent from source to destination with multi-hops. There experiment results are compared with Zigbee’s AODV and AOMDV.

The purpose of this work is to study, understand, analyze and discuss Internet of Things routing protocol for example, OLSR where it is a proactive protocol depending on routing tables which are maintained at each node. In this thesis, Moth Flame Optimization Algorithm is used for routing in an IoT while using MLB protocol.

References

  1. Caimu Tang, and Dapeng Oilver, "An Efficient Mobile Authentication Scheme for Wireless Networks", IEEE, 2011.
  2. W Stallings, "Data Communication", in Data and Computer Communication, 7th Ed., Prentice Hall, 2003, ch.1, pp. 10-14.
  3. B Forouzan, "ICMP", in Data Communication and Networking, Fourth Ed., McGraw-Hill, 2006, ch.21, pp. 621-637.
  4. Jeroen Hoebeke, Ingrid Moerman, Bart Dhoedt, and Piet Demeester, "An overview of Mobile Ad-hoc Networks: Applications and challenges", Sint Pietersnieuwstraat 41, Belgium, 2005.
  5. Padmini Misra (2000). "Routing Protocols for Ad Hoc Mobile Wireless Networks", [online], Available: http://www.cse.wustl.edu/~jain/cis788-99/ftp/adhoc_routing
  6. Sarfraz, M.; Javed, Y.; Anjum, A.; Sohail, S. "Routing optimization strategy using Genetic Algorithm utilizing bandwidth and delay" Computer and Automation Engineering (ICCAE), 2010 The 2nd International Conference on Volume: 4, 26-28 Feb. 2010.
  7. G Fang, L. Yuan, Z. Qingshun, and L. Chunli, "Simulation and analysis for the performance of the mobile ad-hoc network routing protocols," The Eighth International Conference on Electronic Measurement and Instruments, IEEE Xplore, 2007.
  8. A Saeed, L. Khan, N. Shah, and H. Ali, "Performance comparison of two anycast based reactive routing protocols for mobile ad-hoc networks," Computer, 2nd International Conference on Control and Communication, IC4, IEEE Xplore, 2009.
  9. Pengfui Guo, Xuezhi Wang and Yingshi Han (2010), "The Enhanced Genetic Algorithms for the Optimization Design", 3rd International Conference on Biomedical Engineering and Informatics (BMEI 2010), IEEE, pp.2990-2994.
  10. Z. Ye, S. V. Krishnamurthy, S. K. Tripathi, "A Framework for Reliable Routing in Mobile Ad-Hoc Networks, " Proceedings of IEEE INFOCOM 2003, 30 March 30- 3 April 2003, Vol. 1, pp. 270 - 280.
  11. S. Capkun, J. P. Hubaux, and L. Buttyan, "Mobility helps a peer-to-peer security," IEEE Trans. Mobile Computer, Volume: 5, no. 1, pp. 43-51, Jan.2006.
  12. C. Piro, C. Shields, and B. N. Levine, "Detecting the Sybil attack in mobile ad hoc networks," in Proc. Secure communication Workshops, pp.1-11, 2006.
  13. V. Frias-Martinez, S. J. Stolfo, and A. D. Keromytis, "BARTER: Behavior profile exchange for behavior-based admission and access control in IoT," presented at the Proc. 5th Int. Conf. Information Systems Security, Kolkata, India, pp. 193-207, 2009.
  14. D. B. Jagannadha Rao(et.al), "A Study on Dynamic Source Routing Protocol for Wireless Ad-Hoc Networks", International Journal of Advanced Research in Computer and Communication Engineering, Vol. 1, Issue 8, PP.522-529, October 2012
  15. Rajesh war Singh (et.al), "Performance Evaluation of DSR and DSDV Routing Protocols for Wireless Ad-Hoc Networks", Int. J. Advanced Networking and Applications 732 Volume: 02, Issue: 04, Pages: 732-737, 2011.
  16. Smarti (et.al), "IMPLEMENTATION OF DYNAMIC SOURCE ROUTING (DSR) IN MOBILE AD HOC NETWORK (IOT)", International Journal of Research in Engineering and Technology, Volume: 02 Issue: 11, pp.339-345, Nov-2013.
  17. Po-Wah Yau and Chris J. Mitchell, "Reputation Methods for Routing Security for Mobile Ad-Hoc Networks".
  18. James Newsome, Elaine Shi, Dawn Song and Adrian Perrig, "The Sybil Attack in Sensor Networks: Analysis and Defenses" IPSN?04, April 26-27, 2004, Berkeley, California, USA.
  19. Scott M.Thede, "An Introduction to Genetic Algorithm" IN 46135, JCSC 20, 1 October 2004.
  20. BinTian; China Inf. Technol. Security Evaluation Center, Beijing, China; Yizhan Yao; LeiShi; Shuai Shao in " A Novel Sybil Attack Detection Scheme In WSN".
  21. Hadlee, N.A.; Dept. of Comput. Sci. & Eng., Anna Univ., Chennai, India; Kayalvizhi, S. In"Increasing Sybil attack detection probability in open access distributed system".
  22. Sinha, S.; Fac. of Computer. Sci., Pacific Acad. of Higher Educ. & Res. Univ., Udaipur, India; Paul, A. in "Sybil attack in IOT : detection and prevention"
  23. Sujatha, K.S.; Dept. of Electron & Communication Eng., Anna Univ. of Technol., Chennai, India; Dharmar, V.; Bhuvaneswaran, R.S in "design of the genetic algorithm for IoT"
  24. Istikmal; Sch. of Eng., Telkom Univ., Bandung, Indonesia; Leanna, V.Y.; Rahmat, B. in "comparison of proactive and reactive protocol in IoT"
  25. Anup Goyal and Chetan Kumar, "GA-NIDS: A Genetic Algorithm based Intrusion Detection System", 2010.
  26. Ahmed Sherif, Maha Elsabrouty. Amin Shoukry, "A Novel Taxonomy of Black-Hole Attack Detection Techniques in the Internet of Things Network (IoT)", IEEE, pp: 346-352, 2013.
  27. K.S. Sujatha, V. Dharmar, R.S. Bhuvaneswaran, "Design of genetic algorithm based IDS for IoT", Conference: Recent Trends in Information Technology (ICRTIT), IEEE, pp.28-33, 2012.

Downloads

Published

2018-07-30

Issue

Section

Research Articles

How to Cite

[1]
Sukhpal Kaur, Dr. Shaveta Rani, Dr. Paramjeet Singh, " Improving Multipath Load Balancing Routing With Moth Flame Optimization Approach in Internet of Things Applications , IInternational Journal of Scientific Research in Computer Science, Engineering and Information Technology(IJSRCSEIT), ISSN : 2456-3307, Volume 3, Issue 6, pp.472-478, July-August-2018.