scholarly journals A Quality of Service-Aware Secured Communication Scheme for Internet of Things-Based Networks

Sensors ◽  
2019 ◽  
Vol 19 (19) ◽  
pp. 4321 ◽  
Author(s):  
Fazlullah Khan ◽  
Ateeq ur Rehman ◽  
Abid Yahya ◽  
Mian Ahmad Jan ◽  
Joseph Chuma ◽  
...  

The Internet of Things (IoT) is an emerging technology that aims to enable the interconnection of a large number of smart devices and heterogeneous networks. Ad hoc networks play an important role in the designing of IoT-enabled platforms due to their efficient, flexible, low-cost and dynamic infrastructures. These networks utilize the available resources efficiently to maintain the Quality of Service (QoS) in a multi-hop communication. However, in a multi-hop communication, the relay nodes can be malicious, thus requiring a secured and reliable data transmission. In this paper, we propose a QoS-aware secured communication scheme for IoT-based networks (QoS-IoT). In QoS-IoT, a Sybil attack detection mechanism is used for the identification of Sybil nodes and their forged identities in multi-hop communication. After Sybil nodes detection, an optimal contention window (CW) is selected for QoS provisioning, that is, to achieve per-flow fairness and efficient utilization of the available bandwidth. In a multi-hop communication, the medium access control (MAC) layer protocols do not perform well in terms of fairness and throughput, especially when the nodes generate a large amount of data. It is because the MAC layer has no capability of providing QoS to prioritized or forwarding flows. We evaluate the performance of QoS-IoT in terms of Sybil attack detection, fairness, throughput and buffer utilization. The simulation results show that the proposed scheme outperforms the existing schemes and significantly enhances the performance of the network with a large volume of data. Moreover, the proposed scheme is resilient against Sybil attack.

Author(s):  
Fazlullah Khan ◽  
Ateeq ur Rehman ◽  
Abid Yahya ◽  
Mian Ahmad Jan ◽  
Josef Chuma ◽  
...  

The Internet of Things (IoT) is an emerging technology that aims to enable the interconnection of a large number of smart devices and heterogeneous networks. Ad hoc networks play an important role in the designing of IoT-enabled platforms due to their efficient, flexible, low-cost, and dynamic infrastructures. These networks utilize the available resources efficiently to maintain the Quality of Service (QoS) in a multi-hop communication. However, in a multi-hop communication, the relay nodes can be malicious, thus requiring a secured and reliable data transmission. In this paper, we propose a QoS-aware secured communication scheme for IoT-based networks (QoS-IoT). In QoS-IoT, a Sybil attack detection mechanism is used for the identification of Sybil nodes and their forged identities in multi-hop communication. %by high-power and mobile nodes. After Sybil nodes detection, an optimal contention window (CW) is selected for QoS provisioning, i.e., to achieve per-flow fairness and efficient utilization of the available bandwidth. In a multi-hop communication, the MAC layer protocols do not perform well in terms of fairness and throughput, especially when the nodes generate a large amount of data. It is because the MAC layer has no capability of providing QoS to prioritized or forwarding flows. We evaluate the performance of QoS-IoT in terms of Sybil attack detection, fairness, throughput, and buffer utilization. The simulation results show that the proposed scheme outperforms the existing schemes and significantly enhances the performance of the network with a large volume of data. Moreover, the proposed scheme is resilient against Sybil attack.


WSN stands for Wireless Sensor Network it is an prefect models of the IoT or Internet of Things that gives checking administrations to catastrophic events, for example, volcanoes ejection and seismic tremor which can influence the life of person. All things considered, the QoS or Quality-of-Service it is a significant problem of the basic application so that it is adequate as well as heartiness is guaranteed. Other than this without a doubt administrations and commitments in checking frameworks, WSN's restricted assets can seriously corrupt the Quality-of-Service in the application of Internet of Things. There will be a decrease in the Quality-of-Service because of the blockage in the wireless service network in the application. For these situtations proficient utilization for the rare assets might be critical for guaranteeing consistent tramission of the information. Decreasing pace in the retransmission of the parcel that occurs due to the blockage diminishes sensor hubs power utilization. PDNC also known as Packet Discarding based Node Clustering that is a specific bundle disposing of technique is presented in this research paper. Every hubs conveyed will be bunched to a few gatherings that focuses on the zone and at once selection of a group head will be done. Parcel disposing of procedure will at that point be conveyed at every hub to diminish the quantity of bundles adding to blockage. Reenactment examination utilizing NS-2 demonstrates that the proposed method can lessen blockage along these lines improve the general execution.


Techno Com ◽  
2019 ◽  
Vol 18 (4) ◽  
pp. 348-360 ◽  
Author(s):  
Peby Wahyu Purnawan ◽  
Yuni Rosita

Smart Home System bertujuan memaksimalkan pengawasan, pemantauan, keamanan dan sebagainya. sistem ini terintegrasi dari telekomunikasi dan sistem pengendali dari mikrokontroller, sehingga  tercipta Internet Of Things. Pada Penelitian ini dilakukan perancangan sistem Smart Home, dengan sistem client-server berbasis NodeMCU ESP8266 v3 dengan user interface Telegram Messenger yang melakukan komunikasi data melalui wireless. Tahapan perancangan terdiri dari perancangan server, interface, serta sistem kendali Smart Home nya. Hasil akhir pengujian tersebut dapat disimpulkan Aplikasi Telegram Messenger sangat cocok untuk pengontrol dan monitoring Smart Home  jarak jauh, berdasarkan Jarak yang diukur dari 1,7 km sampai 151 km area beda wilayah didapatkan delay rata-rata 20,66 detik, Pada pengujian kinerja Quality of Service dalam sistem komunikasi data ini, berdasarakan standarisasi paramater hasil pengujian bekerja dengan sangat baik. Pada  pengujian nilai RSSI indoor didapat bahwa  kekuatan  komunikasi  wireless  lebih  baik  dibanding outdoor, sehingga RSSI nya lebih kuat. Nilai RSSI  yang tertinggi berada pada -28 dBm dan yang terkecil pada -88 dBm. Berdasarkan pengujian terhadap obstacle, dengan karakteristik redaman yang berbeda - beda dari tiap obstacle nya menghasilkan pengaruh terhadap RSSI dari sinyal wirelessnya.  Obstacle RSSI terkuat dihasilkan oleh pintu kayu dengan nilai -33dbm dBm , serta RSSI terkecil pada obstacle 2 bangunan rumah dengan nilai -78 dBm.  


Author(s):  
Sandesh Mahamure ◽  
Poonam N. Railkar ◽  
Parikshit N. Mahalle

Now we are in the era of ubiquitous computing. Internet of things (IoT) is getting matured in various parts of the world. In coming few years' billions and trillions of things will be connected to the internet. To deal with these huge number of devices in a network we need to consider Quality of Service (QoS)parameters so that system operations can be performed in a smoother way. Mathematical modelling of these QoS parameters gives an idea about which factors are needs to consider while designing any IoT-enabled system at the same time it will give the performance analysis of the system before implementation. In this paper comprehensive literature survey is done to discuss various issues related to QoS and gap analysis is also done for IoT Enabled systems. This paper proposes general steps to build a mathematical model for a system. It also proposes the mathematical model for QoS parameters like reliability, communication complexities, latency and aggregation of data for IoT. To support proposed mathematical model proof of concept also given.


Information ◽  
2020 ◽  
Vol 11 (4) ◽  
pp. 198
Author(s):  
Junhyeok Yun ◽  
Mihui Kim

Mobile crowdsensing is a data collection system using widespread mobile devices with various sensors. The data processor cannot manage all mobile devices participating in mobile crowdsensing. A malicious user can conduct a Sybil attack (e.g., achieve a significant influence through extortion or the generation of fake IDs) to receive an incentive or destroy a system. A mobile crowdsensing system should, thus, be able to detect and block a Sybil attack. Existing Sybil attack detection mechanisms for wireless sensor networks cannot apply directly to mobile crowdsensing owing to the privacy issues of the participants and detection overhead. In this paper, we propose an effective privacy-preserving Sybil attack detection mechanism that distributes observer role to the users. To demonstrate the performance of our mechanism, we implement a Wi-Fi-connection-based Sybil attack detection model and show its feasibility by evaluating the detection performance.


2017 ◽  
Vol 13 (1) ◽  
pp. 155014771668755 ◽  
Author(s):  
Sungwook Kim

In modern times, it has been observed that Internet of things technology makes it possible for connecting various smart objects together through the Internet. For the effective Internet of things management, it is necessary to design and develop service models that ensure appropriate level of quality-of-service. Therefore, the design of quality-of-service management schemes has been a hot research issue. In this work, we formulate a new quality-of-service management scheme based on the IoT system power control algorithm. Using the emerging and largely unexplored concept of the R-learning algorithm and docitive paradigm, system agents can teach other agents how to adjust their power levels while reducing computation complexity and speeding up the learning process. Therefore, our proposed power control approach can provide the ability to practically respond to current Internet of things system conditions and suitable for real wireless communication operations. Finally, we validate the introduced concept and confirm the effectiveness of the proposed scheme in comparison with the existing schemes through extensive simulation analysis.


Author(s):  
Sungwon Lee ◽  
Young-Jae Song ◽  
Dong-Ho Cho ◽  
Yong-Bae Dhong ◽  
Jung-Won Yang

Sign in / Sign up

Export Citation Format

Share Document