Initialization process.

Initialization process.

Source publication
Article
Full-text available
Sensors, actuators, and wireless communication technologies have developed significantly. Consequently, closed-loop systems that can be monitored and controlled by devices in IoT environments, such as farms and factories, have emerged. Such systems are realized by means of cloud-level and edge-level implementations. Among them, with a model that ge...

Citations

... In the context of IoT, sensors acquire information from the physical world and forward it to a sink node for analysis [6]. This acquired information might be used for research purposes or to trigger specific actuators for automated actions [7][8][9][10]. However, despite their capabilities, these sensors often have limited processing and computing abilities, and ensuring their extended lifespan remains challenging [11]. ...
Article
Full-text available
The paper presents a simplified yet innovative computational framework to enable secure routing for sensors within a vast and dynamic Internet of Things (IoT) environment. In the proposed design methodology, a unique trust evaluation scheme utilizing a modified version of Ant Colony Optimization (ACO) is introduced. This scheme formulates a manifold criterion for secure data transmission, optimizing the sensor's residual energy and trust score. A distinctive pheromone management is devised using trust score and residual energy. Concurrently, several attributes are employed for constraint modeling to determine a secure data transmission path among the IoT sensors. Moreover, the trust model introduces a dual-tiered system of primary and secondary trust evaluations, enhancing reliability towards securing trusted nodes and alleviating trust-based discrepancies. The comprehensive implementation of the proposed integrates mathematical modeling, leveraging a streamlined bioinspired approach of the revised ACO using crowding distance. Quantitative results demonstrate that our approach yields a 35% improvement in throughput, an 89% reduction in delay, a 54% decrease in energy consumption, and a 73% enhancement in processing speed compared to prevailing secure routing protocols. Additionally, the model introduces an efficient asynchronous updating rule for local and global pheromones, ensuring greater trust in secure data propagation in IoT.
... Consequently, the WSNs are being deployed in several environments owing to their capabilities [1]. These characteristics, in combination with the possibility of the nodes being connected to the Internet, constitute the base for the Internet of Things (IoT) paradigm [2,3]. A WSN integrates numerous sensors, nodes, routers, and gateways to communicate data along the network. ...
... Instead, this strategy assumes that the nodes can individually set their transmit power to reach their respective CH. Therefore, each node calculates the optimum transmit power that ensures the correct reception of the message and the CH, according to (3). Consequently, the nodes closer to the CH can use lower transmit powers and reduce their energy consumption. ...
Article
Full-text available
The Internet of Things (IoT) is a key technology to interconnect the real and digital worlds, enabling the development of smart cities and services. The timely collection of data is essential for IoT services. In scenarios such as agriculture, industry, transportation, public safety, and health, wireless sensor networks (WSNs) play a fundamental role in fulfilling this task. However, WSNs are commonly deployed in sensitive and remote environments, thus facing the challenge of jamming attacks. Therefore, these networks need to have the ability to detect such attacks and adopt countermeasures to guarantee connectivity and operation. In this work, we propose a novel clustering-based self-healing strategy to overcome jamming attacks, in which we denominate fairness cooperation with power allocation (FCPA). The proposed strategy, aware of the presence of the jammer, clusters the network and designates a cluster head that acts as a sink node to collect information from its cluster. Then, the most convenient routes to overcome the jamming are identified and the transmit power is adjusted to the minimum value required to guarantee the reliability of each link. Finally, through the weighted use of the relays, the lifetime of each subnetwork is extended. To show the impact of each capability of FCPA, we compare it with multiple benchmarks that only partially possess these capabilities. In the proposal evaluation, we consider a WSN composed of 64 static nodes distributed in a square area. Meanwhile, to assess the impact of the jamming attack, we consider seven different locations of the attacker. All experiments started with each node’s battery full and stopped after one of these batteries was depleted. In these scenarios, FCPA outperforms all other strategies by more than 50% of the information transmitted, due to the efficient use of relay power, through the weighted balance of cooperative routes. On average, FCPA permits 967,961 kb of information transmitted and 63% of residual energy, as energy efficiency, from all the analyzed scenarios. Additionally, the proposed clustering-based self-healing strategy adapts to the change of jammer location, outperforming the rest of the strategies in terms of information transmitted and energy efficiency in all evaluated scenarios.
... As a consequence, significant human and financial resources can be saved [26]. To build a platform based on industrial protocols [27] for monitoring and predicting the operation of power lines and connected equipment, one must first develop a system similar to IoT smart networks [28], then a complex distributed data analysis system, and finally a platform that combines both approaches with machine learning and deployment pipelines [29]. Even when constructed, such complicated systems are difficult to test due to the vast amount of hardware and software development required. ...
Article
Full-text available
To monitor and handle big data obtained from electrical, electronic, electro-mechanical, and other equipment linked to the power grid effectively and efficiently, it is important to monitor them continually to gather information on power line integrity. We propose that data transmission analysis and data collection from tools like digital power meters may be used to undertake predictive maintenance on power lines without the need for specialized hardware like power line modems and synthetic data streams. Neural network models such as deep learning may be used for power line integrity analysis systems effectively, safely, and reliably. We adopt Q-learning based data analysis network for analyzing and monitoring power line integrity. The results of experiments performed over 32 km long power line under different scenarios are presented. The proposed framework may be useful for monitoring traditional power lines as well as alternative energy source parks and large users like industries. We discovered that the quantity of data transferred changes based on the problem and the size of the planned data packet. When all phases were absent from all meters, we noted a significant decrease in the amount of data collected from the power line of interest. This implies that there is a power outage during the monitoring. When even one phase is reconnected, we only obtain a portion of the information and a solution to interpret this was necessary. Our Q-network was able to identify and classify simulated 190 entire power outages and 700 single phase outages. The mean square error (MSE) did not exceed 0.10% of the total number of instances, and the MSE of the smart meters for a complete disturbance was only 0.20%, resulting in an average number of conceivable cases of errors and disturbances of 0.12% for the whole operation.