ArticlePDF Available

6. Design of an Optimized Multicast Routing Algorithm for Internet of Things

Authors:

Abstract and Figures

Internet of Things (IoT) is a fast-growing technology in ongoing research field that includes wireless sensor networks, cloud computing, big data analytics, ubiquitous computing, distributed decentralized systems, pervasive computing, embedded systems, mobile computing, machine learning etc. The above mentioned fields are mainly connected with IoT smart portable devices such as smartphones, home appliances, healthcare device, smart vehicle devices automation industry devices, etc. Though IoT enabled devices has been increased in many fields, the industries still faces many problem with connectivity issues because of several factors like mobility nature of devices; limited processing power and resource availability which includes energy, bandwidth constraints, routing cost and end to end delay; communication between node to node via intermediate mobile nodes towards destination may also fail links frequently, there by affecting the network performance. These limitations of existing topology based on reactive tree and mesh based routing protocols create challenging task while designing an optimized stable routing algorithm for IoT. In such a situation, resource optimization is an essential task to be performed by the IoT networks. In the proposed work resource optimization was done by Designed Optimized Multicast Routing Algorithm (DOMRA) for IoT. The DOMR algorithm implemented has route discovery process with nodes positions, directions of nodes, velocities of nodes, and then the path stability bases to overcome the connectivity issues. The proposed algorithm focusing to deploy various real time IoT enabled applications such as smart home automation, smart cites, smart agriculture, automation industry etc. To finalize the simulation results shows maximized system throughput, goodput, packet delivery ratio, network lifetime, network routing performance and reduced control overheads. The proposed algorithm hence produced better routing performance when compared with other existing algorithm in wireless networks. Index Terms: Internet of things, stabile path, optimal route, improve network life time.
Content may be subject to copyright.
International Journal of Recent Technology and Engineering (IJRTE)
ISSN: 2277-3878, Volume-8 Issue-2, July 2019
4048
Published By:
Blue Eyes Intelligence Engineering
& Sciences Publication
Retrieval Number: B3372078219/19©BEIESP
DOI: 10.35940/ijrte.B3372.078219
Abstract: Internet of Things (IoT) is a fast- growing technology
in on-going research field that includes wireless sensor networks,
cloud computing, big data analytics, ubiquitous computing,
distributed decentralized systems, pervasive computing, embedded
systems, mobile computing, machine learning etc. The above
mentioned fields are mainly connected with IoT smart portable
devices such as smartphones, home appliances, healthcare device,
smart vehicle devices automation industry devices, etc. Though
IoT enabled devices has been increased in many fields, the
industries still faces many problem with connectivity issues
because of several factors like mobility nature of devices; limited
processing power and resource availability which includes energy,
bandwidth constraints, routing cost and end to end delay;
communication between node to node via intermediate mobile
nodes towards destination may also fail links frequently, there by
affecting the network performance. These limitations of existing
topology based on reactive tree and mesh based routing protocols
create challenging task while designing an optimized stable
routing algorithm for IoT. In such a situation, resource
optimization is an essential task to be performed by the IoT
networks. In the proposed work resource optimization was done by
Designed Optimized Multicast Routing Algorithm (DOMRA) for
IoT. The DOMR algorithm implemented has route discovery
process with nodes positions, directions of nodes, velocities of
nodes, and then the path stability bases to overcome the
connectivity issues. The proposed algorithm focusing to deploy
various real time IoT enabled applications such as smart home
automation, smart cites, smart agriculture, automation industry
etc. To finalize the simulation results shows maximized system
throughput, goodput, packet delivery ratio, network lifetime,
network routing performance and reduced control overheads. The
proposed algorithm hence produced better routing performance
when compared with other existing algorithm in wireless
networks.
Index Terms: Internet of things, stabile path, optimal route,
improve network life time.
I. INTRODUCTION
Internet of things is a wireless and wired network
composed of mobile nodes or non-mobile nodes operated in
absence of infrastructure or infrastructure based networks
dependents on the environment [1]. There are no dedicated
routers, servers, access points, and cables.
Because of its speedy and convenient deployment;
robustness and low cost, an IoT can find its applications in
the following areas [2].
Revised Manuscript Received on July 15, 2019.
D. Kothandaraman1*, Department CSE, S R Engineering College,
Warangal, India.
M. Sheshikala2, Department CSE, S R Engineering College, Warangal,
India.
K. Seena Naik3, Department CSE, S R Engineering College, Warangal,
India.
Y. Chanti4, Department CSE, S R Engineering College, Warangal, India.
B. Vijaykumar5, Department CSE, S R Engineering College, Warangal,
India.
Smart agriculture
Home automation
Smart cities
Military use (e.g. a network in the battlefield)
Investigation and rescue.
Vehicle-to-vehicle communication in intelligent
transportation.
Momentary networks in urgent business meeting, etc.
Personal area networks connecting mobile phones, laptops,
smart watches, and other portable computers etc.,
In the present Design of an Optimized Multicast Routing
Algorithm (DOMRA) for the Internet of Things, routing
algorithm focus only wireless mobile nodes. If two nodes are
within in the transmission range, it can communicate with
each other directly; otherwise, the nodes select the alternate
path have to forward the packets. In such a case, every IoT
enabled mobile node has to function as a router to forward the
packets for others in the networks [18-19].
Traditional routing protocols used in hardwired or wireless
networks, such as distance vector protocols (e.g. Routing
Information Protocols) and link state protocols (e.g., Open
Shortest Path First) etc., cannot be applied in the IoT directly
for the following reasons:
There may be uni-directional links between nodes.
There is no more than one eligible path between two
nodes.
The consumption of bandwidth and energy incurred by
periodic routing information updates.
The routing topology change rapidly.
Most of the research effort has been put in the routing
protocols for IoT [3]-[4]. Topology-based routing protocols
can be divided into the following categories [5]:
1. Star based routing (Proactive routing)
2. Mesh based routing (Reactive routing)
In a review, each and every routing protocol has its strengths,
weakness, and aims at a specific application. As a result, the
prospective standard for the design to optimize multicast
routing algorithm in IoT is very likely to combine with some
other techniques. Also it gives better routing performance
when compared with the other routing algorithms [15].
II. RELATED WORKS
Existing various routing protocols in IoT, are compared as
follows: 1. Depth-First Forwarding (DFF) protocols (Packet
Delivery Ratio (PDR) is increased, End to End Delay (EED)
is average and Energy Consumption (EC) is average), 2.
Multipath Lossy and Low powered protocol (PDR is
increased, EED is Less and
EC is Average) [6], 3.
Energy Efficient Probabilistic
Routing Algorithm (EEPR)
Design of an Optimized Multicast Routing
Algorithm for Internet of Things
D. Kothandaraman, M. Sheshikala, K. Seena Naik, Y. Chanti, B. Vijaykumar
Design of an Optimized Multicast Routing Algorithm for Internet of Things
4049
Published By:
Blue Eyes Intelligence Engineering
& Sciences Publication
Retrieval Number: B3372078219/19©BEIESP
DOI: 10.35940/ijrte.B3372.078219
(PDR is average and EC is decreased), 4. Avoidance
Multipath Routing Protocol (CA-RPL) (PDR is increased,
EED is decreased and EC is average), 5. Movement-Aided
Energy Balance (MAEB) (PDR is increased and EC is
decreased), 6. Least Path Interference Beaconing (LIBP)
(PDR is increased and EC is decreased), 6. Cognitive
machine-to-Machine RPL Protocol (CoRPL) (PDR is
increased, EED is Average and EC is average) [16-17],
[20-21].
In existing multicast routing protocols, wireless networks
concentrate for both independence and dependences
applications. Whereas in the present algorithm, focus is only
on the independence application based multicast routing
algorithm [9]. Mesh based routing approach is used to modify
the proposed algorithm and its main intention is to minimize
the control overhead, increase network lifetime, especially
battery enabled IoT mobile nodes [7]-[8].
An energy efficient routing protocol for wireless IoT
sensor networks has been implemented by clustering
mechanism which forms cluster head inside so that least
energy expensive path and efficient computation in real-time
routing has been created. Still path selection in IoT networks
cannot assure adequate network of lifetimes and sustained
sensing coverage [13], [16, 14].
Wireless routing protocols for IoT is a survey design
intercommunication protocol for different devices and it
dynamically support cloud computing environment for big
data. Performance measures used are transparency,
availability and privacy of big data [17]. Routing algorithm
design for supporting IoT network architecture using fog
computing is responsible for reducing the amount of data sent
to the cloud. This algorithm yields lower installation cost and
delays constraints unicast traffic under delay constraints
which is a severe problem [18].
Multicast Ad-hoc On-demand Distance Vector
(MAODV) protocols in each node maintains its routing table;
tree structure can be constructed more quickly and
efficiently, in the group leader then floods the hello,
messages to intermediates nodes toward the destination [10].
Ad-hoc multicast routing algorithm are channels created
continuously between pairs of group numbers then multicast
distribution tree which is constructed periodically on the
mesh links available, also it communicates using unicast
routing protocol approach [11]-[12].
Differential Destination Multicast (DDM) is unicast
routing protocol for forwarding the packets from source to
destinations with reduced control overhead on the multicast
routing structure which maintains the multicast routing
information by the intermediate nodes [19].
Tree Based Multicast Ad-hoc On-demand Distance
Vector (MAODV) routing protocols for working
mechanisms such as single path between the source to
destination and uses join tree messages to construct a tree and
created by each source as many numbers of trees as a source
[4].
Multicast Ad hoc On-Demand Distance Vector Routing
Protocol (MAODV) discovers multicast route on demand
based routing involves different stage such as Multicast
Route Discovery (RREQ packets), Reverse Path Setup
(RREQ packets), Forward Path Setup (RREP packets),
Multicast Route Activation (MACT packets), Group Hello
Messages (GRPH messages), and Mesh-Based Protocols
(ODMRP)[4].
Mesh based On Demand Multicast Routing Protocol
(ODMRP) floods join query packets once received
destination node then it join reply packets establish multicast
routes towards source node. Different stages for ODMRP
working mesh creation, join query process, and join reply
process [14].
While comparing MAODV with ODMRP: ODMRP has a
better packet delivery ratio than MAODV, ODMRP is more
robust than MAODV due to its minimal packet loss and
availability of multiple routes, ODMRP is less scalable
compared to MAODV as the number of senders or multicast
group size is increased and finally MAODV has minimal
control overhead as compared with ODMRP. In that both
protocols advantage and disadvantages are discussed. To
overcome the drawbacks in this case optimized multicast
routing algorithm in IoT has been proposed here.
III. PROPOSED APPROACH
The proposed algorithm is to design an optimal multicast
routing with stable path and shortest distance through
destination node as well as increased goodput, throughput,
reduced control overhead compared with other existing
routing protocols in wireless ad-hoc networks and IoT as
shown in fig. 1. In the proposed algorithm source node
initiate the route discovery process with nodes positions,
directions, and velocities of nodes, and then the path stability
continuously maintains the route discovery up to reach the
destination node. Otherwise, it is select to an alternate path to
reach the destination node which is optimal with a stable path
towards the destination node in the IoT networks.
Figure 1: Block diagram of optimized route discovery
process using IoT network
A. Algorithm for Optimal Route Selection in IoT
In the proposed DOMR algorithm is to detect the optimal
stable path using origin and destination matrix techniques as
shown in fig. 2.
International Journal of Recent Technology and Engineering (IJRTE)
ISSN: 2277-3878, Volume-8 Issue-2, July 2019
4050
Published By:
Blue Eyes Intelligence Engineering
& Sciences Publication
Retrieval Number: B3372078219/19©BEIESP
DOI: 10.35940/ijrte.B3372.078219
Figure 2: Origin and Destination (OD) matrix
Routing objective function is to minimize the routing cost Eq.
(1):
11
mn
ij ij
ij
Minimize d c


(1)
Constraints for optimal stable routing in IoT, Eq. (2) is An ith
nodes, Eq. (3) is jth nodes and in Eq. (4) dij is the shortest
distance in terms of routing cost for M*N matrix format in
the network:
1/ / ,( 1,2,.... )
m
ij i i i
id S IN D i m

(2)
1/ / ,( 1,2,.... )
n
ij j j j
jd S IN D j n

(3)
0;( 1,2,.... );( 1,2,.... )
ij
d i m j n 
(4)
Where:
dij distance between ith and jth nodes
Cij Time taken between ith and jth nodes
Si / Sj = (ith, jth ) or Sm /Sn= (m, n) = Source nodes
INi / INj = ( ith, jth ) or INm/INn = (m, n) = Intermediate
nodes
Di /Dj = (ith, jth ) or Dm/Dn = (m, n)= Destination nodes
B. Routing Formulation using OD Matrix
Step 1: Sm/INm/Dm mth positions of the nodes
S1,S2, …., Sm, Source nodes
IN1, IN2,.....,INm Intermediate nodes
D1, D2,...., Dm Destinations nodes
Step 2: Sn/INn/Dn nth position of the nodes
S1,S2,......,Sn Source nodes
IN1,IN2,......INn Intermediate nodes
D1,D2,…..,Dn Destinations nodes
Let be ai 0; i=1,2, ….m Time available at the
S1/IN1/D1,....,ith nodes.
Let be bj0; j=1,2,….n Time available at the
S1/IN1/D1,......, jth nodes.
Step 3: Route Request transmitter nodes || Route Request
receiver nodes and Route Reply transmitter nodes || Route
Reply receiver nodes.
S1 / S2 or Si / Sj = (ith, jth ) or Sm /Sn= (m, n) = Source
nodes
IN1 /IN2 or INi / INj = ( ith, jth ) or INm/INn = (m, n) =
Intermediate Nodes
D1 /D2 or Di /Dj = (ith, jth ) or Dm/Dn = (m, n) Destination
nodes
Step 4: Distances b/w: Source node || Intermediate node ||
Destination node.
d11,d12,d21,d22 = Single Transmitter and receiver node
di1,di2= ith, or dm= m =Transmitter node
d1j,d2j=jth, or dn= n = Receiver node
dij= ith , jth or dmn= m, n =Transmitter and receiver nodes
Step 5: Routing cost b/w: Total no. of Transmitter and
Receiver in the network.
Cost has considered = Routing time taken between nodes
C11,C12,C21,d22 = Single Transmitter and receiver node
Ci1,Ci2= ith or Cm= m = Transmitter node
C1j,C2j=jth or Cn= n= Receiver node
Cij= ith , jth or Cmn= m, n, =Transmitter and receiver nodes
Step 6: dij distance between node i and j, ∆vij velocity of
node i and j.
Where:
dij=di dj
vij=(Vi cosθ – Vj cosθ)
Assumptions:
All the vertices in the Graph (G) = [V, E] are labeled as [1, 2,
…..,M] and [1,2,……,N] and the graph is represented by
adjacency matrix of order M*N.
Vertices[V] = Nodes in MxN routing environment
Edges[E] = Paths in M*N nodes.
Time complexity T= O(d-1), d=No. of hops in between
Source to Destination nodes.
Length [1,2,…….M, and1,2,……………N]=array of
distances.
Path [1,2,………M, and 1,2,…………….N]=array of
vertices.
Set [1,2,…………M, and1,2,………….N]=array of
boolean tags.
Rij = Route discovery between source to destination nodes.
In the Rij 1 is path available from ith nodes to jth nodes the
network, otherwise 0.
C. Algorithm for Detecting Optimal Routes Between
Sources to Destination Nodes
Input:
DatasetsAdjacency_matrix.txtmth rows and nth columns
&& Node_coordinator.txt N is the No. of nodes in IoT
networks.
Output:
Route stability level: VeryLow(L), Low(L), Medium(M),
Average(A), High(H),Very High(VH).
Step 1: Route discovery process:
If (S1/IN1/D1 ==1 ith nodes & mth rows) && (S1/IN1/D1
==1 jth nodes &nth columns)
{
Stable path b/w node i and j
if(S1/IN1/D1==0ith nodes & mth
rows)&&(S1/IN1/D1 ==0 jth nodes & nth columns)
{
Route discovery process has
fails, then to find the alternate
path b/w node i and j.
S1/IN1/D1S2/IN2/D2Sn/INn/Dn
S1/IN1/D1d11 d12 d1n a1
S2/IN2/D2d21 d22 d2n a2
S/IN/
D….-- -- -- a...
di1 di2 dij --
Sm/INm/Dmdm1 dm2
--
dmn am
Sb/INb/Dbb1b2
-- --
bn
Sj/INj/Dj
d1j
d2j
Sa/INa/Da
Si/INi/Di
-- --
--
--
--
--
-- a...
--
--
--
--
--
--
--
b... bjb...
--
ai
SOUTH
WEST
C11
Cij
C2n
C1nC1j
C21
C12
C22
Ci2
C2j
Ci1
CmnCm2Cm1
S/IN/D…. S/IN/D….
S/IN/D….--
--
--
--
-- --
--
-- -- --
--
------
--
-- --
-- --
-- --
--
NORTHEAST
SOUTHEAST
SOUTHWEST
NORTHWEST
NORTH
EAST
Design of an Optimized Multicast Routing Algorithm for Internet of Things
4051
Published By:
Blue Eyes Intelligence Engineering
& Sciences Publication
Retrieval Number: B3372078219/19©BEIESP
DOI: 10.35940/ijrte.B3372.078219
}
}
Step 2: Route link stability selection:
if(∆d==low && ∆V==negative)||(∆d==low &&
∆V==Zero)||(∆d==low&&
∆V==positive)||(∆d==medium&&∆v==zero)||(∆d==medium
&& v==positive) || (∆d==high&& ∆v==zero)||(∆d==high
&& ∆v==positive)
{
if(Link_stability==(medium)||(very
high)||(low)||(high)||(average) ||(very low)
{
Link stable paths to forward the packets
}
}
Step 3: Packet forwarding:
/*Detect the optimal paths*/
/*Balanced Stable Path (BSP)*/
if (Sm/INm/Dm+Sn/INn/Dn-1)
{
Balanced_Route(Sm/INm/Dm+Sn/INn/Dn-1= Cmn)
Choose the most positive value in BSP
}
else if
{
Unbalanced route, and then continue the process until when
BSP occurred.
After found new BSP has obtained, then perform to find BSP,
otherwise repeat the step: 3.
}
/*Unstable Path*/
elseif(∆d==medium&& v==negative)||(∆d==high&&
v==negative)
{
if (Link_stability==(low)||(very low)
{
Unstable path to choose an alternate path
}
}
Step 4: Finally, calculating the path expiry time Eq (5).
Position of ith node and jth node at Time t given by (xi,yi)
and (xj,yj) [10].
Let vi and vj is the velocity of node(θi ,θj ) is the direction
of ith node and jth node.
Transmission range of of ith node and jth node r
Path Expiration Time Dt
 
2 2 2 2
22
( ) ( )
t
D ab cd a c r ad bc
ac
    
(5)
Where:
a= vi cosθi - vj cosθj
b= xi-xj
c=visin θi -vjsin θj
d=yi-yj
/* Paths has valid only within the transmission range of
nodes, otherwise go to Step 4*/
IV. RESULT AND ANALYSIS
The experimental work was carried out using the Network
Simulator (NS3) which is a discrete event network simulator.
Present algorithm has been evaluated and tested with random
waypoint mobility models as shown in fig. 3 and following
parameters are used to evaluate the algorithm in Table 1. So
the proposed algorithm shows a better result when compared
with existing protocols (MAODV and ODMRP).
A. Performance Metrics
(i) Packet Delivery Ratio (PDR)
PDR= ∑[No. of packet received at destination node]
∑[No. of packet send by source node]
(ii) Throughput (T) and Goodput(G)
T= No. of received packets *packet size * 8
Total simulation time
G= Max No. of packets received by the Rx in sequence
Total No. of packets sent sender Tx
(iii)Control overheads (CO)
(i)Average queue length (E(N))=[Arrival rate(λ)*E(W)]
(ii)Average packet delay (E(W))
CO =∑ [(No. of slot time for each successful packet
transmission)]
[Total no. of slot time for each successful transmission
packet)]
Figure 3: Implemented by DOMRA screen shot
B. Performance Comparison of DOMRA, ODMRP and
MAODV
Fig. 4 shows the graphical representation of data between
the varying constant velocity of nodes (m/s) and the packet
delivery ratio in case of both the proposed DOMR algorithm
which is represented in green color line, existing MAODV
which is in black color line and ODMRP algorithm which is
in red color. When the velocity increases from 2 to 10m/s, the
PDR was observed to be 89% in the case of DOMR based
algorithm, while the same was observed to be 77% in the case
of ODMRP and 66% for MAODV algorithm.
International Journal of Recent Technology and Engineering (IJRTE)
ISSN: 2277-3878, Volume-8 Issue-2, July 2019
4052
Published By:
Blue Eyes Intelligence Engineering
& Sciences Publication
Retrieval Number: B3372078219/19©BEIESP
DOI: 10.35940/ijrte.B3372.078219
Table 1: Simulation Parameters
Fig. 5 shows the graphical representation of data between
the varying number of nodes and the throughput. In case of
the proposed DOMR algorithm, it is represented in blue color
line, existing MAODV is in black color line and ODMRP is
with red color. When the number of nodes increases from 0 to
100, the throughput was observed to be 80% in the case of
DOMR based algorithm, while the same was observed to be
68% and 55% in the case of ODMRP and MAODV
respectively.
2 3 4 5 6 7 8 9 10
0.40.4
0.5
0.50.5
0.6
0.60.6
0.7
0.70.7
0.8
0.80.8
0.8
0.90.9
0.9
1.01.0
Packet Delivery Ratio
Constant Velocity(m/s)
Figure 4: Number of Nodes Vs Packet Delivery Ratio
0 5 10 15 20 25 30 35 40 45 50 55 60 65 70 75 80 85 90 95100
0
10000
20000
30000
40000
50000
60000
70000
80000
Throughput(bps)
Number of Nodes
Figure 5: Number of Nodes Vs Throughput
Fig. 6 shows the graphical representation of data between the
varying number of nodes and the goodput. In case of the
proposed DOMR algorithm it is represented in blue color
line, the existing MAODV is in black color line and ODMRP
is with red color line. When the number of nodes increases
from 0 to 100, the goodput was observed to be 85% in the
case of DOMR based algorithm, while the same was
observed to be 75% and 54% in the case of ODMRP and
MAODV respectively.
0 5 10 15 20 25 30 35 40 45 50 55 60 65 70 75 80 85 90 95100
0
10000
20000
30000
40000
50000
60000
70000
80000
90000
Goodput(bps)
Number of Nodes
Figure 6: Number of Nodes Vs Goodput
Fig. 7 shows the graphical representation of data between the
varying number of nodes and the control overhead. In case of
proposed DOMR algorithm it is represented in green color
line, the existing MAODV is in black color line and ODMRP
is with the red color line mentioned in the graph. When the
number of nodes increases from 0 to 100, the control
overhead is reduced and was observed to be 65% in the case
of DOMR algorithm, while the same was observed to be 80%
and 85% in the case of ODMRP and MAODV respectively.
10 20 30 40 50 60 70 80 90 100
300
400400
500
600600
700
800800
900
10001000
1100
12001200
Control Overhead
Number of Nodes
Figure 7: Number of Nodes Vs Control Overheads
V. CONCLUSIONS
Designed optimized multicast routing algorithm is used to
improve the network lifetime, throughput, goodput, and to
reduce the end to end delay along with control overhead. The
present algorithm focused on mesh based multicasting
routing techniques and are used to enhance the routing
performances, lower energy consumption, efficient
bandwidth utilization, minimize control overheads, and
minimize routing cost with the help of DOMRA. The
simulation result shows that the proposed DOMRA can
considerably improve the
performances over the
existing MAODV and
ODMRP. The PDR was
Parameter
Value
Simulator
Number of Nodes
NS-3
100
Simulation Range
200x200m
Simulation Time
50ms
Transmission
Range
255m
Bandwidth
10mbps
Traffic Type
CBR
Data payload
1000 bytes
Design of an Optimized Multicast Routing Algorithm for Internet of Things
4053
Published By:
Blue Eyes Intelligence Engineering
& Sciences Publication
Retrieval Number: B3372078219/19©BEIESP
DOI: 10.35940/ijrte.B3372.078219
Author-3
Photo
Author-3
Photo
observed to be 89% for DOMR algorithm than compared
with existing ODMRP which is 77% and for MAODV it is
66%. Throughput was observed to be 80% for DOMR
algorithm when compared with existing ODMRP which is
68% and for MAODV it is 55%. Goodput was observed to be
85% for DOMR based algorithm, than compared with
existing ODMRP which is 75% and for MAODV it is 54%.
Control overhead is reduced and was observed to be 65% for
DOMR algorithm compared with existing ODMRP which is
to be 80% and for MAODV it is 85%.
ACKNOWLEDGMENT
The authors thank to S R Engineering College
(Autonomous) management for providing the facility
regarding research works.
REFERENCES
1. D. Kothandaraman And C. Chellappan, “Human Activity Detection
System Using Internet Of Things, International Journal On Computer
Science And Engineering”, vol. 9, no.11. 2017, pp. 657-665.
2. V. Thirupathi, K. Sagar, Implementation of Home Automation System
using MQTT Protocol and ESP32, International Journal of Engineering
and Advanced Technology, vol.8, no2C2, 2018, pp. 111-113
3. D. G. Reina, S. L. Toral,, P. Jonhson, and F. Barrero, " Hybrid Flooding
Scheme for Mobile Ad Hoc Networks, IEEE Communications Letters,
vol. 17, no. 3, 2013.
4. Gaurav Sachan, D. K. Sharma, Karishma Tyagi, Abhimanyu Prasad,"
Enhanced Energy Aware Geographic Routing Protocol in MANET: A
Review", International Journal of Modern Engineering Research
(IJMER), vol.3, issue.2, 2013.
5. Rajneesh Gujral, Sanjeev Rana, Amrita Chaudhary, "Study and
Comparison of Mesh and Tree- Based Multicast Routing Protocols for
MANETs”, International Journal of Latest Trends in Engineering and
Technology (IJLTET), 2012.
6. José V. V. Sobral, Joel J. P. C. Rodrigues, Ricardo A. L. Rabêlo , Jalal
Al-Muhtadi 5 and Valery Korotaev, Routing Protocols for Low Power
and Lossy Networks in Internet of Things Applications, sensors, vol. 19.
No.11, 2019 pp.1-40.
7. Nehan Mumtaz, Parul Yadav, "Bandwidth Efficient And Scalable
Tree-Based Multicast Routing Protocol For Mobile Ad Hoc Networks",
International Journal of Engineering Research & Technology (IJERT),
ISSN: 2278-0181, vol. 1 issue 8, 2012.
8. Alex Fridman, Steven Weber, Charles Graff, David E. Breen, Kapil R.
Dandekar, and Moshe Kam, “OMAN: A Mobile Ad Hoc Network
Design System, IEEE Transactions on Mobile Computing, vol. 11, no. 7,
2012.
9. Jogendra Kumar, "Application-Independent Based Multicast Routing
Protocols in Mobile Ad hoc Network (MANET)", Network and
Complex Systems, vol 2, no.1, 2012.
10. D. G. Reina, S. L. Toral,, P. Jonhson,and F. Barrero, “A Reliable Route
Selection Scheme Based on Caution Zone and Nodes’ Arrival Angle”,
IEEE Communications Letters, vol. 15, no. 11, 2011.
11. Luo Junhai, Ye Danxia, Xue Liu and Mingyu, “A Survey of Multicast
Routing Protocols for Mobile Ad-Hoc Networks”, IEEE
Communications Surveys & Tutorials, vol. 11 No. 1,2009.
12. Luo Junhai, Ye Danxia, Xue Liu and Mingyu, “A Survey of Multicast
Routing Protocols for Mobile Ad-Hoc Networks”, IEEE
Communications Surveys & Tutorials, vol. 11, no. 1, 2009.
13. NAravindhan Venkateswaran, Venkatesh Sarangan, Natarajan Gautam,
Raj Acharya," Impact of Mobility Prediction on the Temporal Stability
of MANET Clustering Algorithms", PE-WASUN'05, October 1013,
2005, Montreal, Quebec, Canada.
14. Kumar Viswanath, Katia Obraczka, Member, IEEE, and Gene Tsudik,
Exploring Mesh and Tree-Based Multicast Routing Protocols for
Manets, IEE Transactions On Mobile Computing, vol. 5, no. 1, 2006.
15. Sridevi Chitti V. Thirupathi, Banala Saritha, Constrained Application
Protocol of Internet of Things”, International Journal of Engineering &
Technology, vol.7, no.18, pp. 244-246
16. Sallauddinmohmmad, Shabana, Ranganath Kanakam, “Provisioning
Elasticity On Iot's Data In Shared-Nothingnodes”, International Journal
Of Pure And Applied Mathematics”, Vol. 117, No. 7, 2017, pp. 165-173
17. Vidushi Vashishthz, Anshuman Chhabrayx, Anirudh Khannay, Deepak
Kumar Sharmaz, Jyotsna Singh, “An energy efficient routing protocol
for wireless Internet-of-Things sensor networks”,
https://arxiv.org/pdf/1808.01039.
18. Anna Triantafyllou, Panagiotis Sarigiannidis and Thomas D. Lagkas,
“Network Protocols, Schemes, and Mechanisms for Internet of Things
(IoT): Features, Open Challenges, and Trends”, Wireless
Communications and Mobile Computing, vol. 18, pp. 24, 2018
19. Annop Monsakul, “SRAD: Smart Routing Algorithm Design for
Supporting IoT Network Architecture”, International Journal of
Communication Networks and Information Security, vol. 10, no. 1,
2018.
20. N.N. Srinidhi, S.M. Dilip Kumar, K.R. Venugopal, “Network
optimizations in the Internet of Things: A review”, Engineering Science
and Technology, an International Journal vol. 22, pp. 1-21.
21. Vidya Rao1, Vallabh Mahale1, G G Sivasankari1, Venugopal K R2,
Wireless Routing Protocols for Internet-of-Things (IoT)-A Survey,
International Journal of Latest Engineering and Management Research
(IJLEMR), vol 02, no. 04, 2017, pp. 25-37.
AUTHORS PROFILE
Dr. D. Kothandaraman received his B.E. (CSE) from
Dr. Pauls Engineering College (Anna University),
M.Tech.,(CSE-IS) from Pondicherry Engineering
College(Pondicherry University(Govt. of India)) and
Ph.D. (CSE) from College of Engineering, Guindy,
Anna University(Govt. of Tamil Nadu). To his credit,
he has 8 years of teaching and research experience.
His area of research interest is computer networks, Wireless Sensor
Networks (WSN), Mobile Ad-hoc Networks (MANETs) and Internet of
Things (IoT). He has published various papers in International Journals and
in conferences. Currently, he is working as Associate Professor in
Department of Computer Science and Engineering at S R Engineering
College, Warangal, TS, India.
Dr. M.Sheshikala, completed her Ph.D from K L
Educational Foundation in Computer Science and
Engineering, Andhra Pradesh in March 2018. She is
an Associate professor in the department of CSE at S
R Engineering College. Her research interests are
related to Data Mining, Machine Learning. She had
published 28 publications in various national and international journals,
conferences and proceedings. Her total teaching experience is 14 years.
Dr. Seena Naik Korra received his Ph.D, in Computer
Science and Technology in 2016 from Sri
Krishnadevaraya University, India. He received his
M.Tech., in 2008 from the Department of CSE, JNTU,
Anantapur, India. He received MCA in 2006 from Sri
Krishnadevaraya University, India. He received his
BCA degree in 2003 from Sri Krishnadevaraya University, India. His
research interest includes Computer Networks, Wireless Sensor Networks,
Big Data Analytics, IoT, and Image Processing. He has the teaching
experience of 13 years. Currently, he is working as Associate Professor in
Computer Science and Engineering Department at S R Engineering College,
Warangal.
Yerrolla Chanti received M.Tech in Computer Science
and Engineering in 2016 from Jawaharlal Nehru
Technological University, Hyderabad, India. He has
the teaching experience of 3 years. Currently, he is
working as Assistant Professor in Department of
Computer Science and Engineering at S R Engineering
College, Warangal, India. His research areas include Networking, Big Data
Analytics.
Vijay Kumar Bura received his B.Tech., in Computer
Science Information Technology from JNTUH in 2006
and M.Tech in Software Engineering form JNTUH,
Telangana, India in 2011. He worked as Software
Engineer at ITP Software India Private Limited,
Hyderabad for 2 years. He developed various web
applications for different clients. He worked as Asst. Prof. in the Dept. of
IT, SVS Institute of Technology, Warangal for 2 years. Presently he is
working as Assistant Professor in the Department of CSE in S R Engineering
College, Warangal, Telangana, India.
... In the development of this project we used different methods which are regression [20,33], Decision tree [21,34], Random Forest [22,35], KNN [23,36], logistic Regression [24,37] and so on. There are many similar projects in the market what makes our project different from the existing is that we are integrating python with machine learning so the we are reduce the lines of code and production cost too and we can get accurate result with this project. ...
Conference Paper
Full-text available
Farming is the major work which is considered as a culture instead like job and farming is the back bone of our economy as farming is the means which carried forth human advancement. India is nation which shows more interest towards farming and also grows all types of crops and its economy generally dependent on harvest profitability. Subsequently we can say that agriculture is major support for all business in our nation. Choosing of each harvest is significant in the choosing as each and every state in India grow various crop and the climate also varies from state to state. The choice of crop will depend on the various factors like, value of the crop, price given by the government, weather conditions and the price given by the private market buyers. Numerous progressions are needed in the field of agriculture to improve the benefit to Indian economy. We can improve agriculture by implementing AI mechanisms which can be same are defficiently on various cultivating areas. With all the advancements in the areas of machines and their improvements we can use them in cultivating the valuable and detailed data concerning various issues in addition to assuming the critical part in it. This paper helps use to getting an idea towards executing all the harvest based strategy with the ambitious techniques that helps in enchanting the maintenance of numerous agriculture and agriculture field issues. This helps the farmers to choose a best crop which helps them getting profit and also helps to increase our nation’s economy.
Chapter
Saline is provided to patients in hospitals to help them rehydrate and so improve their health. In accordance with current medical procedures, a nurse or other caregiver should continuously deliver saline to each patient. Nearly altogether the hospitals, a nurse instead a caretaker is in control of observation the extent of saline endlessly with no interruptions. The Brobdingnagian kind of patient’s unit of measurement is created inside the hospitals due to the inattentiveness and neglect over the saline completion by the nurses or caretakers of the patient and lack of personnel with comfy abilities in hospitals and their related task. So, the surveillance system unit was established to prevent the patient from getting a contusion and to protect their life while being exposed to saline. This designed system is effectively employed in both households and hospitals.
Chapter
Generally, communication with people in our daily life is by speaking with voice but some communications can be possible with body language, facial expressions, and hand signs. We can also communicate with others without voice. Apart from that, hand gestures are playing very important role in communication. Here, we developed a gesture identification system which interprets the American Sign Language. This system helps the people who are deaf and dumb. This system leads them to understand and communicate as like normal people. Lot of proposals are introduced on gestures specified with their languages like ASL, ISL, etc. Here, we are introducing new static gestures using MATLAB on bases of existing systems. Our input is captured from camera; then, system applies the pre-processing on captured image. The set of features are retrieved using PCA. Comparison of the features is done using Euclidean distance with the help of training sets. Finally, optimal gestures identify and produce the output inwards of text or voice.KeywordsStatic gesture recognitionPCAEuclidean distanceMATLAB software
Conference Paper
In case of a crime scene or any other investigating task, the recorded surveillance video footage plays a very prominent role in studying the situation. It is a very challenging duty for the surveillant officer to look after many such videos without missing the important details. Thereby, the officer has to be assisted with an efficient tool to ensure grabbing clear and unambiguous information from the video footage. The foremost step is to detect people and other objects distinctly as well as accurately. Along with the detection pointing out the detected objects has to be done by drawing bounding boxes around them. For this to happen the Machine has to be trained very well that in such a way that it should be able to detect all the objects in the video footage accurately. It is a challenging task to identify a moving object in public places. Set of regulations and restrictions are to be followed to put an association or commonality cautiously. This project is aimed to support and assist the surveillant officers in their investigations.
Conference Paper
Full-text available
IoT based Fog Computing become major needy technology integration for innovative engineering. In the IoT based technologies the Fog nodes communicate with network edge node and creates easy interaction with Cloud data centers. The data which generated from the origin points transmit to destination in the network of different devices. In each device to process and execute the task needs some energy consumption. In this paper we proposed a Cost Function for Energy (CFE) which evaluate the total energy consumption during in transmission of data from source to destination based on the task. The total energy consumption depended on the total delay of task execution which presents amount of time for execution of a task. The CFE calculated for every tasks execution at local and other nodes of network. In our proposal we have included the greedy heuristic approach for evaluate the total delay accordingly the energy consumption.
Conference Paper
Full-text available
The recommendation systems become very important aspect in all areas like products ,movies , socials media and etc. Recommendation suggested from more overloaded information and analyze has to be done on massive amount of data. Apart from that media product like movie recommendation needs more process on previous and current data to suggest the user choice. In this paper we proposed a movie recommendation system based on the content and history based approach. This model starts the process by implementing of user similarity matrix. On the matrix results we applied the KNN to maps the user data to movie data based on the use choice. We also implemented the cosine similarity function between user choice to item data to find similarity and non similarity data outputs. This approach of movie recommendation system will do the process on history and content and produces the optimal results.
Conference Paper
In the present era heart disease is considered to be one of the major diseases and many people are suffering due to this disease and the foremost challenge is identification and prediction before it causes any consequences or deaths. There are some techniques available for prognosticate heart disease since this disease is increasing rapidly throughout the universe, this prediction process may save life. Time and efficient play important role in identifying heart disease in healthcare industry particularly in the field of cardiology. In this paper we developed a dynamic and accurate system for heart disease prediction using machine learning techniques. There are two phases which can identify and predict heart disease: 1) Feature selection 2) classification stage. Feature selection is one of the methods for selecting attributes and feature subset as it eliminates unwanted data and apply classification algorithms and dataset comprises of patient's attributes like age, gender, blood pressure, glucose level, blood sugar etc… by processing these attributes we can predict the chance of occurring heart disease. This paper proposes a optimization techniques like Grey wolf optimization, Particle swarm optimization combined with Ant colony optimization for performing supervised classification algorithms.PSO is for finding optimum solutions and ACO is for finding good paths and the mixed proposed algorithm is applied and result are estimated to identify the efficiency and robustness.
Conference Paper
One of the research emergence as per studied problem on the image processing based computer vision is that object detection in a image with bounding boxes. This complicated processing has to be done with help of machine leaning based algorithms only. In the recent years research has done with machine leaning algorithms like CNN,RCNN, Fast RCNN,FasterRCNN,Yolo algorithm and etc .These algorithms have achieved the proposed concept in different levels. In this paper we presented the comparative study of each algorithm and provided efficiency and weakness contexts.
Article
Full-text available
Constrained Application Protocol (CoAP) is an application layer protocol of Internet of Things (IoT) protocol stack. It allows tiny devices to communicate with other tiny devices or constrained devices which uses similar protocols. CoAP is mainly developed for devices like low power and constrained lossy networks. These tiny devices may built using 8 bit microcontrollers with limited Random Access Memory (RAM) , Read only memory (ROM) and constrained networks like 6LoWPANs (IPV6 low power wireless personal area networks). This paper explains constrained application protocol and its applications.
Article
Full-text available
In the era of Internet of Things (IOT) and digital technology automation of everything has become more popular. People are very smart, they want to control and monitor everything from working places. This paper explains a cloud-based home automation system using the MQTT protocol. It enables users to control and monitor home appliances using a mobile app or a web page. Using cloud technologies became cost-effective because most cloud developers are offering their services freely
Article
Full-text available
A hybrid broadcast scheme for mobile wireless networks is proposed in this letter. The main objective is to combine different flooding schemes in order to solve the broadcast storm issue encountered by the simple flooding scheme. For this purpose, the density of nodes is taken into account using a density metric called expansion metric. In addition, in order to reduce the broken links due to mobility of nodes and increasing dissimilarity among the intermediate nodes, a forwarding zone criterion is included in the proposed schemes. The proposed approaches have been implemented and compared with pure probabilistic flooding, and simple flooding schemes.
Article
Full-text available
We present a software library that aids in the design of mobile ad hoc networks (MANET). The OMAN design engine works by taking a specification of network requirements and objectives, and allocates resources which satisfy the input constraints and maximize the communication performance objective. The tool is used to explore networking design options and challenges, including: power control, adaptive modulation, flow control, scheduling, mobility, uncertainty in channel models, and cross-layer design. The unaddressed niche which OMAN seeks to fill is the general framework for optimization of any network resource, under arbitrary constraints, and with any selection of multiple objectives. While simulation is an important part of measuring the effectiveness of implemented optimization techniques, the novelty and focus of OMAN is on proposing novel network design algorithms, aggregating existing approaches, and providing a general framework for a network designer to test out new proposed resource allocation methods. In this paper, we present a high-level view of the OMAN architecture, review specific mathematical models used in the network representation, and show how OMAN is used to evaluate tradeoffs in MANET design. Specifically, we cover three case studies of optimization. The first case is robust power control under uncertain channel information for a single physical layer snapshot. The second case is scheduling with the availability of directional radiation patterns. The third case is optimizing topology through movement planning of relay nodes.
Article
Full-text available
A route selection scheme based on RSS is proposed to improve the reliability of MANETs in terms of packet delivery ratio and the usage of routing packets. The proposed approach estimates the node's arrival angle using RSS variations to obtain route's lifetime and to decide about the convenience of a neigh boring node. Obtained results outperform other approaches using RSS, which does not take into consideration nodes' mobility.
Conference Paper
Full-text available
Scalability issues for routing in mobile ad hoc networks (MANETs) have been typically addressed using hybrid routing schemes operating in a hierarchical network architecture. Several clustering schemes have been proposed to dynamically identify and maintain hierarchy in MANETs. To achieve significant performance gains, it is important that the underlying clustering scheme is able to identify stable clusters such that the cost associated with maintaining the clustered architecture is minimized. In this paper, we study the impact of mobility prediction schemes on the temporal stability of the clusters obtained using a mobility-aware clustering framework. We investigate the performance of the prediction schemes with respect to Gauss-Markov, Random Waypoint, and Reference Point Group mobility models under varying network and mobility conditions. Our results indicate that while mobility prediction significantly improves temporal stability of the clusters, an accurate mobility tracking algorithm need not always lead to an accurate mobility prediction scheme.
Article
The smart things require applications and services such as high-speed wireless, high-definition IP video cameras, and high-bandwidth connectivity. Therefore, Fog computing is responsible reducing the amount of data sent to the cloud with smart router over the core network. The IP/MPLS network design to support unicast traffic under delay constraints is a severe problem. To realize such design, especially for communication networks that can be represented by M/M/1 model, this paper develops an algorithm based on Mesh Network Topological Optimization and Routing (MENTOR)-II was called "Smart MENTOR-II". The simulation results show that, in almost all test cases, the proposed algorithm yields lower installation cost and delay constraints than the ordinary MENTOR-II.
Article
Multicasting is an efficient communication service for supporting multipoint applications. The main goal of most ad hoc multicast protocols is to build and maintain a multicast tree or mesh in the face of a mobile environment, with fast reactions to network changes so that the packet loss is minimized. The topology of a wireless mobile network can be very dynamic, and hence the maintenance of a connected multicast routing tree may cause large overhead. To avoid this, a different approach based on meshes has been proposed. Meshes are more suitable for dynamic environments because they support more connectivity than trees; thus they support multicast trees. In multicast routing protocols many type of risk are involve like rushing, black hole, jellyfish attacks. Many features improve the performance of multicast routing protocol robustness, efficiency, control overhead .in this article mainly focus on application independent based multicast routing protocols, features, and comparison of multicast routing protocols.
Article
Recently, it became apparent that group-oriented services are one of the primary application classes targeted by MANETs. As a result, several MANET-specific multicast routing protocols have been proposed. Although these protocols perform well under specific mobility scenarios, traffic loads, and network conditions, no single protocol has been shown to be optimal in all scenarios. The goal of this paper is to characterize the performance of multicast protocols over a wide range of MANET scenarios. To this end, we evaluate the performance of mesh and tree-based multicast routing schemes relative to flooding and recommend protocols most suitable for specific MANET scenarios. Based on the analysis and simulation results, we also propose two variations of flooding, scoped flooding and hyper flooding, as a means to reduce overhead and increase reliability, respectively. Another contribution of the paper is a simulation-based comparative study of the proposed flooding variations against plain flooding, mesh, and tree-based MANET routing. In our simulations, in addition to "synthetic" scenarios, we also used more realistic MANET settings, such as conferencing and emergency response.