| Literature DB >> 35336285 |
Khalid Haseeb1, Amjad Rehman2, Tanzila Saba2, Saeed Ali Bahaj3, Jaime Lloret4,5.
Abstract
Wireless networks and the Internet of things (IoT) have proven rapid growth in the development and management of smart environments. These technologies are applied in numerous research fields, such as security surveillance, Internet of vehicles, medical systems, etc. The sensor technologies and IoT devices are cooperative and allow the collection of unpredictable factors from the observing field. However, the constraint resources of distributed battery-powered sensors decrease the energy efficiency of the IoT network and increase the delay in receiving the network data on users' devices. It is observed that many solutions are proposed to overcome the energy deficiency in smart applications; though, due to the mobility of the nodes, lots of communication incurs frequent data discontinuity, compromising the data trust. Therefore, this work introduces a D2D multi-criteria learning algorithm for IoT networks using secured sensors, which aims to improve the data exchange without imposing additional costs and data diverting for mobile sensors. Moreover, it reduces the compromising threats in the presence of anonymous devices and increases the trustworthiness of the IoT-enabled communication system with the support of machine learning. The proposed work was tested and analyzed using broad simulation-based experiments and demonstrated the significantly improved performance of the packet delivery ratio by 17%, packet disturbances by 31%, data delay by 22%, energy consumption by 24%, and computational complexity by 37% for realistic network configurations.Entities:
Keywords: D2D; Internet of things; mobile sensors; technological development; wireless systems
Mesh:
Year: 2022 PMID: 35336285 PMCID: PMC8954068 DOI: 10.3390/s22062115
Source DB: PubMed Journal: Sensors (Basel) ISSN: 1424-8220 Impact factor: 3.576
Summary of related discussion.
| Comparative Approaches | Pros and Cons |
|---|---|
| Existing solutions | Most of the existing solutions have proposed for efficient utilization of energy consumption with constraint devices and improved the performance of data delivery. |
| Proposed D2D multi-criteria learning algorithm using secured sensors technologies | An algorithm is developed for smart cities using reinforcement learning techniques based on devices and packets’ reception information. It supports gathering real-time data by imposing security restrictions for mobile devices against malicious actions. Moreover, mobile devices are verified first, and afterward, they are allowed to be involved in the data-gathering phase. It also supports data encryption with a session-oriented function and leads to lightweight complexity for the mobile network. |
Figure 1Development flow of the proposed algorithm.
Figure 2Route rank using reinforcement learning.
Figure 3Next-hop selection procedure.
Node level information.
| 1 Byte | 1 Byte | 1 Byte | 2 Bytes | 1 Byte | 2 Bytes | 1 Byte |
|
|
|
|
|
|
|
|
Figure 4Flowchart of the proposed algorithm.
Figure 5Message flow between the gateway and the sink node.
Simulation configuration.
| Parameter | Value |
|---|---|
| Simulation area | 300 × 300 m |
| Deployment | Random |
| Propagation Model | Two Ray Ground |
| Node speed | 5 m/s |
| Pause time | 20 s |
| Malicious nodes | 10 |
| Simulations | 10 |
| Regular nodes | 100–500 |
| Initial energy | 5 j |
| Transmission range | 10 m |
| MAC layer | IEEE 802.11 b |
| Mobility model | Random waypoint |
| Simulation rounds | 500–2500 s |
| Data traffic | CBR |
Security attacks and their related procedures.
| Security Attacks | Proposed Procedures |
|---|---|
| Device authentication | Unique ID |
| Session key security | Encryption |
| Verification | Decryption using symmetric key |
| Confidentiality | Ciphered data using the session-oriented encryption |
| Malicious nodes regenerate request packet for session key | ID and session key expire automatically |
| Storage overload | Distributed data chunks and diffusion |
| Connectivity loss | Reinforcement learning |
| Additional resources’ consumption | Computing route rank |
| Network load | Distributed forwarding |
| Data originality | MAC, Digital hashes |
Figure 6The performance evaluation of the proposed algorithm compared to QL-MAC and CTEER for packet delivery ratio.
Figure 7The performance evaluation of the proposed algorithm compared to QL-MAC and CTEER for packet disturbance.
Figure 8The performance evaluation of the proposed algorithm compared to QL-MAC and CTEER for data delay.
Figure 9The performance evaluation of the proposed algorithm compared to QL-MAC and CTEER for average energy consumption.
Figure 10The performance evaluation of the proposed algorithm compared to QL-MAC and CTEER for computational complexity.