ArticlePDF Available

Energy-efficient fog computing in Internet of Things based on Routing Protocol for Low-Power and Lossy Network with Contiki

Authors:
  • Galgotias College Of Engineering & Technology
  • Maharishi Markandeshwar Deemed to be University, Mullana

Abstract and Figures

The traditional centralized cloud computing (CC) model faces a range of problems with the exponential growth of the Internet of Things (IoT) applications, like high latency, reduced bandwidth, and network instability. Fog computing (FC) takes the cloud closer to IoT computers to overcome these problems. Rather than moving them to the cloud, the FC provides local IoT data processing and storage on IoT computers. This paper focuses on the Routing Protocol for Low-Power and Lossy Network (RPL), a universally routing protocol for a static environment that is used for reducing energy consumption, delay, and packet loss with data aggregation at the border router using a fog simulation model in Contiki Cooja. The objective function (OF) choice has an impact on network topology, as each node selects a set of potential parents to send to the destination. However, no systematic analysis of the effects of OF behavior in the RPL environment has been undertaken. Here, three different OFs, Objective Function Zero (OF0), Advanced Objective Function Zero (AOF0), and Minimum Rank with Hysteresis Objective Function (MRHOF) for RPL in the static environment for different node numbers, have been compared. The findings demonstrate that altering all three OFs has a significant impact on RPL. The energy consumption is reduced in the case of the AOF0 in the fog node by 50.86%, which is less than the case of the OF0 and MRHOF function. Extensive simulations show that AOF0 outperforms the existing OFs.
This content is subject to copyright. Terms and conditions apply.
RESEARCH ARTICLE
Energy-efficient fog computing in Internet of Things based
on Routing Protocol for Low-Power and Lossy Network
with Contiki
Arun Kumar
1
| Sharad Sharma
1
| Nitin Goyal
2
| Sachin Kumar Gupta
3
|
Saru Kumari
4
| Sachin Kumar
5
1
Department of Electronics and
Communication Engineering, Maharishi
Markandeshwar (Deemed to be
University), Mullana, Haryana, India
2
Chitkara University Institute of
Engineering and Technology, Chitkara
University, Rajpura, Punjab, India
3
School of Electronics and
Communication Engineering, Shri Mata
Vaishno Devi University, Katra, India
4
Department of Mathematics, Chaudhary
Charan Singh University, Meerut, India
5
Department of Computer Science and
Engineering, Ajay Kumar Garg
Engineering College, Ghaziabad, India
Correspondence
Sachin Kumar Gupta, School of
Electronics and Communication
Engineering, Shri Mata Vaishno Devi
University, Katra, Jammu and Kashmir
182320, India.
Email: sachin.gupta@smvdu.ac.in
Summary
The traditional centralized cloud computing (CC) model faces a range of prob-
lems with the exponential growth of the Internet of Things (IoT) applications,
like high latency, reduced bandwidth, and network instability. Fog computing
(FC) takes the cloud closer to IoT computers to overcome these problems.
Rather than moving them to the cloud, the FC provides local IoT data
processing and storage on IoT computers. This paper focuses on the Routing
Protocol for Low-Power and Lossy Network (RPL), a universally routing proto-
col for a static environment that is used for reducing energy consumption,
delay, and packet loss with data aggregation at the border router using a fog
simulation model in Contiki Cooja. The objective function (OF) choice has an
impact on network topology, as each node selects a set of potential parents to
send to the destination. However, no systematic analysis of the effects of OF
behavior in the RPL environment has been undertaken. Here, three different
OFs, Objective Function Zero (OF0), Advanced Objective Function Zero
(AOF0), and Minimum Rank with Hysteresis Objective Function (MRHOF)
for RPL in the static environment for different node numbers, have been com-
pared. The findings demonstrate that altering all three OFs has a significant
impact on RPL. The energy consumption is reduced in the case of the AOF0 in
the fog node by 50.86%, which is less than the case of the OF0 and MRHOF
function. Extensive simulations show that AOF0 outperforms the existing OFs.
KEYWORDS
AOF0, cloud computing, Contiki, destination-oriented directed acyclic graph (DODAG),
edge computing, energy conservation, fog computing, IoT, RPL
1|INTRODUCTION
The emergence of Internet of Things (IoT) associates millions of computers and sensors, creating large quantities of
data within themselves. However, due to problems with latency, bandwidth, and power, computational models near
the edge is needed to measure and quantify the output.
1
Fog computing (FC) is an extended form of cloud computing
(CC), extending its features to the end-user level. The volume of mobile traffic demands stability and a broad regional
Received: 30 November 2020 Revised: 10 June 2021 Accepted: 2 November 2021
DOI: 10.1002/dac.5049
Int J Commun Syst. 2021;e5049. wileyonlinelibrary.com/journal/dac © 2021 John Wiley & Sons Ltd. 1of21
https://doi.org/10.1002/dac.5049
range that FC supports. In this paper, an innovative arrangement of IoT application engineering with fog is seen to
entrance numerous components of IoT at the application level. In this manner, the correspondence between IoT gad-
gets and IoT assets ought to be improved. By setting a cloud server in the middle of edge gadgets and cloud layers, it
can boost IoT benefits methodically. But it was the result of a need to tackle two problems, real-time operation, and
incoming data intervention, and resource constraints such as bandwidth and processing capacity, another aspect that
benefits FC. The improved computing capability that vendors integrate into their edge routers and switches allows this
upgrade to the data-path hierarchy. IoT is one of the technologies at the forefront that has the power to offer endless
advantages to our culture. The creation of the IoT is about to enter a point where several of the artifacts around us will
be able to interact with each other via the Internet with no interference by humans.
2
Included as fogging, FC spreads from a centralized cloud to the virtual edge layer for mobile devices, data, and ser-
vices. The fog networking architecture focuses on improving Internet backbone connectivity, deployment, and service
rather than primarily network gateway connectivity and swapping of those embedded in the Long-Term Evolution
(LTE) network. FC architecture is a strongly visualized computing system that offers hierarchical processing facilities
utilizing the edge application nodes. There is, though, a slight contrast between these two definitions. Fog and edge
computing also entail moving the communication and perception capacities down to the vicinity where the knowledge
originates. The main difference between the two systems is merely where computation and information management
are focused. Data from both devices, such as pumps, relays, motors, and sensors, are sent from the same sources or
physical objects. These two machines carry out physical activities in this world, for example, electric communications,
power transfer, swapping, or awareness of the events affecting them.
3
In recent years, the main approach has been to build the biggest data center system, defined as a cloud hosting net-
work (e.g., Google, AWS, IBM, and Microsoft Azure), which offers consolidated storage facilities. The cloud has been
supplied with all the details which produce a kind of knowledge that may, among others, be saved in some log files or
video files. Thus, the transition of data management, database resources, control structures, and data storage to the con-
solidated cloud became a common practice before the FC architecture.
4
After users entered the modern era, which is
recognized as the future of communication, we have connected billions of IoT devices. Over time, IoT applications have
also proliferated by connecting tangible objects and functional components with exponential development.
5
Data stor-
age themselves can get overwhelmed, so there's going to be a huge problem. Although the cloud platform is efficient, it
is not feasible to enable time-consuming or nonoperable processes if Internet connectivity is weak. Integrating IoT fog
into computing offers several IoT implementations with different benefits.
6
Fog makes it possible to reduce latency
between IoT devices in real time, particularly for IoT applications that are time sensitive. Also, fossil computing tech-
nology for large-scale sensor networks will be one of the main features, as the number of IoT sensors is soon going to
hit billions.
7
For particular IoT applications, FC may provide several advantages, as seen in Figure 1.
The definition of IoT must be made transparent. IoT is regarded as a transition time created in the world by con-
nected devices.
8
IoT network comprises digital machines linked to one another and installed in industrial surveillance,
defense, and domains such as automated energy meters, utilities, smart homes, and health care.
9
FC's integration into
IoT creates a new chance for Fog as a Service (FaaS), in which a provider forms a range of sensor nodes of fog through
their geographic location. Each fog node can calculate, network, and store locally.
10
FaaS would facilitate the distribu-
tion of services to consumers in new business models. Unlike clouds, operated largely by large organizations capable of
constructing and managing large data centers, FaaS can allow large and small enterprises to deliver and run private or
public computing, storage, and control systems at different levels serving the customer need of a range of people.
11
The
analysis discussed in this article presents the incorporation of FC with the IoT; this requires an analysis of the state-of-
the-art, functions, and advantages of the fog.
12
For performance evaluation of Routing Protocol for Low-Power and Lossy Network (RPL) border routing protocol
for FC-based IoT system by using some fixed number of nodes and transmission range in terms of end-to-end delay,
throughput, and hop count (HC) against size, RPL has been evaluated and analyzed for IoT-based systems. RPL routing
protocol has also been tested by moving the fog router to the center of a town, which is an important criterion for
achieving maximum network efficiency with efficient power analysis and distribution for varying transmission ranges.
The entire test was carried out on the Contiki OS using the Cooja Network Simulator. The destination-oriented directed
acyclic graph (DODAG) is built by RPL using OF. OF is also used to specify a node's rank, which is its distance from
the DODAG root node. RPL determines the overall topology by constructing DODAGs within instances, each of which
is linked to a specific objective function (OF). Our AOF0 was compared to MRHOF and OF0. Our AOF0 improves net-
work lifetime and energy balancing significantly, according to experimental results.
2of21 KUMAR ET AL.
1.1 |Problem statement
The OF is used by RPL to optimize or select the best route for nodes to reach their destination. The OF is used by the
user's or application's requirements. The standardized OFs (OF0 and MRHOF) choose the path in different ways, but
they both employ the same metric: HC and ETX, respectively. Although using these OFs has several benefits, such as
the optimum parent choice and routing table organization, it also has certain drawbacks. Indeed, a single metric
approach can improve some performance while deteriorating others, implying that the single measure method does not
meet all application needs. Here, a new RPL OF of AOF0 that is congestion aware and based on the Quality of Service
(QoS) is proposed. Extensive simulations show that AOF0 outperforms existing OFs in terms of satisfying real-time
applications under QoS and network congestion. RPL can avoid congestion using the proposed AOF0 while
maintaining network feasibility in terms of time and energy. This QCOF is implemented using linear programming to
maximize packet transmission rate based on priority while using the fewest DODAG roots possible.
1.2 |Motivation and contribution
Congestion avoidance to improve the QoS in RPL-based network such as IoT is an essential requirement. The OF in
RPL is in charge of finding routing paths, allowing you to choose the best route based on predefined criteria to improve
QoS and avoiding congestion in IoT networks. This route was chosen after meeting the recommended link metrics for
use in Low-Power and Lossy Networks (LLNs).
13,14
The OF OF0 in RPL, on the other hand, is based on a single metric,
which is rank (node positions). Despite the existing RPL extensions, RPL remains open in research and requires further
improvement, motivating us to create a new RPL extension known as AOF0 to overcome the limitations of the existing
RPL extensions. This paper's contribution can be summarized as follows:
OFs OF0, AOF0, and MRHOF for RPL in the static environment for different node numbers have been verified.
AOF0 performs better in terms of reduced overhead, successful delay reduction, and less energy consumption.
Investigating convergence of FC with numerous IoT applications and suggestions to overcome these issues.
During the link estimation, RPL implementation issues in the Contiki system are tested and discovered ways to
reduce these unnecessary implementation issues.
FIGURE 1 FC supports many IoT applications
KUMAR ET AL.3of21
Datagram Transport Layer Security (DTLS) is also proposed in the FC-based IoT scenario after verifying the improve-
ment in performance through test simulation.
1.3 |Scope of the study
RPL is the first mainstream LLN routing protocol in the IoT field with FC. However, there was little interest in deter-
mining its efficiency. Thus, the evaluation and understanding of RPL conduct are necessary to differentiate between
requirements and requirements, allowing it to be enhanced, in various situations and environments for future IoT sys-
tems with enhanced fog systems. Thus, the scope of this study is to show the performance of new routing algorithms
RPL in the proposed scenario for a successful power and delay reduction as well as providing less packet loss in the
IoT-based FC model.
The rest of the article is organized as follows: In Section 2, the literature survey is addressed based on CC and
FC. Section 3 highlights the system architecture based on the CC layer, fog layer, and physical layer. Section 4 talks
about the proposed methodology that presents the materials and methods employed. Further, the result and discussion
are discussed in Section 5. The article is eventually summarized in Section 6. Moreover, the outline of the paper has
been illustrated in Figure 2.
2|LITERATURE SURVEY
This section discusses papers that deal with the FC convergence of IoT. Provided that fog computation is only a new
area of study, this computational model does not have any clear solutions. In this section, review over the work
addressing FC integration with IoT in different applications is conducted.
Oueis et al.
15
have incorporated FC into the load-balancing process to increase network performance for users. It
does, however, lengthen the network convergence time. Alharbi et al.
16
have discussed the determinants of technology
use in Saudi Healthcare Organizations, as well as the synthesis of IoT and heterogeneous frameworks, which prompt a
match or blending issue for the utility in the healthcare sector, but the framework does not address security issues.
Mongiello et al.
17
discussed run-time architectural simulation for future Internet implementations to maintain the IoT
security protection parameter. However, the network overhead has not been reflected in this work. Sanjeevi et al.
18
discussed ontology that allowed the Internet to deter post-harvest losses from smart agriculture, and they defined a
numerical cloud arrange model and the significantly related boundaries for clarifying the deferral in haze engineering
figuring and correspondence. But security issues are not resolved by the framework.
FIGURE 2 The outline of the paper
4of21 KUMAR ET AL.
Gomathi et al.
19
discussed open access to services and maintenance of smart city stuff for user-centered future Inter-
net and concentrated anxious center (fog) and core (cloud) collaboration and participation. Their involvement increases
energy consumption and an end-to-end delay. It does, however, lengthen the network convergence time. Sarkar and
Misra
20
performed numerical simulations of the FC method and investigated the latency and energy consumption of
the program within the IoT. The proposed technique improves the life of the network, while it increases the overhead.
Thus, Ningning et al.
21
suggested an FC approach that would turn physical nodes into virtual machine nodes at differ-
ent speeds. Both the minimal approach and the maxmin strategy are found in multiple automated process scheduling
systems as criteria for calculating the success of other scheduling techniques discussed. He et al.
22
discussed the role of
the principle of entity virtualization in developing personalized IoT-based educational apps for end-users, but security
issues are not resolved by the framework.
Mishra et al.
23
discussed research centered on Contiki OS using the Cooja simulator, which measures wireless sen-
sor node temperature and light with the help of IoT. In the global cloud-centric environment, Gubbi et al.
24
have intro-
duced IoT. They discussed different technologies in the future that drive IoT research. Anneka has been used to
interacting between private clouds and public clouds. Premsankar et al.
25
funded ambitious IoT edge computing tech-
nologies to improve immersive apps. The findings demonstrate the significance of edge computing in raising the latency
of applications in their experimental assessment. Ning and Hu
26
also made use of increasingly evolving technology,
such as fog, cloud, and IoT, to implement instruction in universities. Two frameworks were suggested for the future of
IoT, that is, creation, classification, and further design of IoT devices for a modern education program. However, the
network overhead is not reflected in this work.
Yang et al.
27
have established an overall energy output model involving utilizing loops, calculation, and
offloading in homogenous fog grids. The research focused only on overall energy and did not recognize energy
transfers through both the fog and the terminal layers. In multiuser fog radio access networks (F-RANs), Pang
et al.
28
proposed a latency-driven cooperative task computing that characterizes the communicationcomputing rela-
tionship through multiple F-RAN nodes. However, the security issues are not resolved by the framework. Ogawa
et al.
29
presented a use case regarding RPL and Collection Tree Protocol (CTP) energy usage indicators and
proposed measurements for a variety of cases. Utilizing both RPL and CTP, the developers did not find the robust
routing protocol to be successful.
Felici-Castell et al.
30
concentrated on examining the different methods for collecting knowledge from multiple data
sources. Experimental assessment of trade-offs between submit alland local bufferapproaches took account of
power consumption, lifespan, performance, and reliability. No attention was given to the efficiency of the sink
node(s). Elleuchi et al.
31
suggested a routing scheme for the security protocol that expands the RPL to the Internet.
The symmetric key distribution between the AES128 (Advanced Encryption Standard) and SHA256 (Secure Hash
Algorithm) communications nodes relies on identification-based cryptography to calculate message authentication
codes. Boualam and Ezzouhairi
32
discussed the proposed work that was tested by implementing the Cooja simulator
with Contiki OS. The results of the simulation show that, relative to the default RPL, the proposed work offers a
higher packet delivery ratio (PDR), lower latency, and greater throughput but security issues are not resolved by the
framework.
Bhandari and Cho
33
suggested a new FO aimed at enhancing the consistency of chosen routes by utilizing both
composite measures and fuzzy logic. The findings obtained indicate that, in terms of reliability, energy usage, and
packet distribution, our solution performs better than the typical RPL. Mahmud et al.
34
presented a taxonomy of
FC. They researched the configuration of the fog server, network modules, and different fog processing metrics. They
have been studying the virtualization of network services to gain the flexibility of network service distribution. Li
et al.
35
developed a virtual fog device that could be used to test and execute objective investigations. To reduce the
wired-free front carriage costs of the cloud system, Peng et al.
36
suggested an economic spectral efficiency (ESE) frame-
work, and they articulate the power consumption while transmitting data. Also, they introduced a simulated fog system
that could be used to validate and perform quantitative research in the future. Raj and Kumar
37
concentrated in this
paper on the data protection problems found in CC. They discovered a viable solution and a proprietary cloud realm in
addition to this, but the security issue was not resolved by the framework. Garg et al.
38
suggested two metrics of study
assessment that are effective citation and better understanding of influence factor.
Zaminkar et al.
39
proposed an effective hybrid method, which includes encryption, as an efficient approach for
resolving the RPL protocol concerns, ensuring that the devices are securely connected. Giannakoulias
40
addressed regu-
latory ramifications, compliance with laws and requirements, new attack vectors arising from virtualization technology
flaws, problems of data privacy such as encryption and access permissions, and security tests to be carried out on
KUMAR ET AL.5of21
TABLE 1 A description of the research works related to FC convergence with the IoT
Reference Year Focus Privacy Security Reliability Performance Energy
Oueis et al.
15
2015 Discussed incorporated FC into the load-
balancing process to increase network
performance for users.
✓✓
Alharbi et al.
16
2016 Proposed technology use in Saudi
Healthcare Organizations
determinants.
✓✓
Sanjeevi et al.
18
2020 Discussed ontology allowed the Internet
to deter post-harvest losses from smart
agriculture.
✓✓
Ningning
et al.
21
2016 Suggested an FC approach that would
turn physical nodes into virtual
machine nodes at different speeds.
✓✓
He et al.
22
2003 Discussed the role of the principle of
entity virtualization in developing
personalized IoT-based educational
apps for end-users.
✓✓
Mishra et al.
23
2017 Discussed research cantered on and
Contiki OS using the Cooja simulator,
which measures wireless sensor node
temperature and light with the help of
IoT.
Gubbi et al.
24
2013 Discussed different technologies in the
future that drive IoT research and
Anneka has been used to interact
between private clouds and public
clouds.
✓✓ ✓
Premsankar
et al.
25
2018 Discussed ambitious IoT technologies
edge computing to improve immersive
apps.
✓✓
Yang et al.
27
2018 Analyzed overall energy output model
involving utilizing loops, calculation,
and offloading in homogenous fog
grids.
Pang et al.
28
2017 Proposed a latency-driven cooperative
task computing that characterizes the
communicationcomputing
relationship through multiple F-RAN
nodes.
✓✓ ✓
Mahmud
et al.
34
2018 Presented taxonomy of FC. ✓✓
Peng et al.
36
2017 Provided an ESE framework and they
articulate the power consumption
while transmitting data.
✓✓
Raj and
Kumar
37
2020 Discussed CC security strategies and
issues.
Garg et al.
38
2020 Suggested two metrics of study
assessment that are effective citation
and effective better understanding
influence factor.
Zaminkar
et al.
39
2021 Proposed an effective hybrid method,
which includes encryption, as an
efficient approach for resolving the
✓✓
6of21 KUMAR ET AL.
networks before their move to the cloud. Lamaazi and Benamar
41
proposed a new OF that was based on a combination
of metrics and fuzzy logic (OF-EC). The proposed OF-EC considers both the link and node metrics, namely, the
expected transmission count (ETX), HC, and energy consumption, to overcome the limitations of using a single metric
(EC). But still, the security of IoT nodes is not covered in this paper by the author. Yu et al.
42
presented the logic analy-
sis scheme for BurrowsAbadiNeedham. The suggested scheme can withstand multiple attacks and provide safe
shared authentication and anonymity by using secret criteria and biometrics.
Lamaazi and Benamar
43
proposed a new method for evaluating RPL effectiveness based on the OF and trickle
algorithm. They compared the RPL-EC (RPL-based combined ETX and energy consumption) to the RPL-FL (RPL
based on the flexible trickle algorithm). But that work was only limited to the energy consumption approach, not pro-
vide high security. Chen et al.
44
addressed the lower energy offloading scheme. The goal is to reduce energy consump-
tion when computational activities are performed within the optimal overhead and delay of energy. It takes a
thorough look at the components of the fog node's energy usage, including the local computing, distributing, and
waiting for state energy consumption. Computational results show that the planned form of offloading is superior to
local computer systems and total energy consumption and completion time offload schemes. Onwuegbuzie et al.
45
investigated the performance of RPL concerning its two OFs: OF0 and MRHOF. MRHOF function performs well;
however, the network overhead has not been reflected in this work. Table 1 summarizes the difference between the
proposed method and related works to FC convergence with the RPL, underlining the contribution of each
manuscript.
Table 1 summarizes the related work with the following parameters like privacy, security, energy, performance, and
reliability. However, the related research work comparison shows that limited research work has security and privacy
features, and some has features related to energy, performance, and reliability. Therefore, our goal in this paper is to
introduce the DTLS protocol in a fog network with higher security and an OF that not only extends the life of the net-
work but also includes a simple method for lowering network overhead.
TABLE 1 (Continued)
Reference Year Focus Privacy Security Reliability Performance Energy
RPL protocol concerns, ensuring that
the devices are securely connected.
Giannakoulias
40
2019 Addressed regulatory ramifications,
compliance with laws, and
requirements.
Lamaazi and
Benamar
41
2018 Proposed a new OF that was based on a
combination of metrics and fuzzy logic
(OF-EC).
✓✓ ✓
Yu et al.
42
2019 Presented the logic analysis scheme for
BurrowsAbadiNeedham.
Lamaazi and
Benamar
43
2019 Proposed a new method for evaluating
RPL effectiveness based on the
objective function (OF) and trickle
algorithm.
✓✓ ✓
Chen et al.
44
2019 Addressed the lower energy offloading
scheme.
✓✓
Onwuegbuzie
et al.
45
2019 Investigated the performance of RPL
concerning its two OFs; OF0 and
MRHOF.
✓✓
Our proposed
work
Energy-efficient fog computing in
Internet of Things based on Routing
Protocol for Low-Power and Lossy
Network with Contiki
✓✓ ✓
KUMAR ET AL.7of21
3|SYSTEM ARCHITECTURE
FC architecture enables fog nodes, cloud, and IoT to be moved dynamically through processing, networking, and stor-
age services. Fog interfaces, however, may allow the versatility and complex movement of devices, storage, and control
roles between these various organizations, to communicate with the server, other fogs, and staff or users. This has facili-
tated well-located FC consumer evaluation and has also allowed accurate and successful control of QoS. FC acts as a
cloud-to-end gateway that enables end-users to access data, storage, and network resources. The nodes of fog are
referred to as such units. It can be mounted anywhere with a network connection. Figure 3, based upon the optimiza-
tion of QoS parameters and the proposed model, illustrates the smart city technology architecture of the new plat-
form.
46
The function of the different layers is explained in this figure.
3.1 |Cloud layer
At the cloud layer in heterogeneous IoT, the compilation and execution of information obtained from other layers
depends on the CC layer. Cloud storage with a wide variety of heterogeneous IoT will accommodate the enormous
amount of knowledge immediately in a specific way. This is feasible since cloud systems have the power to monitor
hierarchical computation. Cloud services often have the potential to make choices depending on the knowledge
received, in addition to computing space. Also, cloud providers will take swift action on some essential heterogeneous
IoT systems based on emergency event-aware frameworks.
3.2 |Fog layer
This layer is managed by the logical fog manager who analyzes and classifies the request according to the specificity of
the moment. The fog handler is the key component for optimizing the QoS and usage of the tools on fog layers.
FIGURE 3 The system architecture of IoT with FC
8of21 KUMAR ET AL.
3.3 |Sensor or physical layer
Specific sensors in IoT's physical layer gather data from various locations, and the cloud resources are then supplied for
decision making. A large number of sensors are mounted in a particular region, and topology is generated for transmit-
ting these data. There are sink nodes, sensor nodes, and control nodes in a typical network. A lower node collects sen-
sor node data and transforms it into a multihop communication model.
The FC architecture facilitates a dynamic transition to the fog node, the cloud, and the IoT continuum
47
for
transmission, networking, and stocking services. However, fog interfaces to connect to the cloud, other fogs, and
information or users must make mobility simpler with this different computing, storage, or control roles and com-
plicated transfer. The FC end-user appraisal was well placed, and QoS management was professional and success-
ful. Promoting server and cloud to fog communication with back-to-back facilities from the fog to the cloud
interface should be made mandatory. The data and services that can be distributed through the fog and cloud
must be sought. The exactness and accuracy of these details and data will determine how the fog or cloud
responds. Fog nodes need to have the features of pool resources to facilitate processing with each other. For
example, all used fog nodes will share their data storage, computation, and processing resources with one or more
user apps using a priority node functionality scheme. Also, several fog nodes will work with each other's backup
resources.
48
FC offers a globally distributed IoT device structure with differential recognition in a resource-effi-
cient, user-friendly environment. Fog services simply provide IoT access via fog to IoT interface or fog to the user
interface. The building blocks of the cloud are considered to be FC, and the FC features can be defined as
follows:
FC promotes knowledge of locations in which fog nodes can be installed in various locations. Moreover, because the
fog is closer to the end devices when processing the end device data, it provides lower latency.
There are large-scale networks of sensors that track the world around them.
The fog offers distributed tools of computation and storage that can work with such large-scale end devices.
Fog components can communicate with various domains and through different service providers and work with
them.
Fog nodes or end devices are built of various types by various manufacturers to be deployed depending on the
platforms.
4|PROPOSED METHODOLOGY
Contiki is a broadly utilized IoT-empowered working framework that is free and open source. Contiki is a low-power
IoT computer operating system. In Table 2, the simulation parameters are given.
To uphold and incorporate higher degrees of security, there is a need to actualize IPv6 for IoT-based FC scenarios,
with dynamic crossover cryptography in key age and verification. The IPv6based methodology can be empowered by
being completely sure about calculations that are not powerless against capture. Border Router 1, working as an FC
node (highlighted in green color), helps in connecting one network to another (see Figure 4). FC node is used in this
case to route data between an RPL network and an external network. So far, only the RPL network has been developed.
The situation in which the RPL network (having 15 sensor motes highlighted in yellow color) is attached to an external
network now needs to be simulated. The IoT convention based on IPv6 is RPL. For 6LoWPAN, it is used. So, for effi-
cient power distribution using IoT technologies and a 6LoWPAN network, we evaluated the RPL routing protocol in
real time for a small area using an FC node as the 6LoWPAN gateway with the help of a powerful simulator. Contiki
Cooja.
The system was tested in a real-time power distribution network situation with varying transmission ranges and
node counts. IPsec protection is guided by the IPv6 display information, which allows IPv6 group authorization and
payload encryption through extension headers methods. However, IPsec is not updated; it must be arranged and used
with a trade key in the security. It operates with DODAG dynamic output and has unidirectional and bidirectional cor-
respondence. It has specific occurrences with higher growth, with restricted behavior.
KUMAR ET AL.9of21
4.1 |DA process
RPL empowers each node in the system to select whether to submit packages up to their root or down to their child
nodes. With the growing usage of IoT in various fields, it is necessary to figure out IoT's protection pieces by ensuring
that the assured packages are directed to avoid interruptions and ensuring that all communications can be completely
assured. In the wake of the directing convention, we will talk about how information is collected in the system with a
mathematical model (see Figure 5). The sum of data packets received at node jover time tis known as reinforcement
signal (RS).
TABLE 2 Simulation parameters
Parameter Value
Operating system Contiki 2.7
Simulator Cooja
Computer RAM 8 GB, i5 processor
Transmission range 50 m
Interference range 55 m
Initial energy 1500 mA
Simulation time 110 min
Routing protocol RPL
Number of nodes 16
Node type Sky mote
Topology Random
MAC layer 802.15.4
Network area 300 m 300 m
FIGURE 4 Cooja simulator software setup with RPL network with 6LoWPAN gateways (FC node)
10 of 21 KUMAR ET AL.
Rateipj¼PAN þPAM :ð1Þ
PAN is used to represent throughout the routing the number of data packets that the previous nodes aggregated, and
Rateipjis the rate of input packets. PAM is used to represent throughout the routing the number of packets of data that
are not aggregated from previous nodes.
RS ¼11
Rateipj
:ð2Þ
If S> Threshold δ, then node jis rewarded. Otherwise, the node is given a penalty. If a reward is received by the
node, PA
gg
(probability of aggregated by IoT nodes) varies as
PAgg ¼PAgg þα1PAgg

,ð3Þ
where αis the action of automata, and if a bonus is received by the node, PA
gg
will be as
PAgg ¼1β1RðÞðÞPAgg:ð4Þ
Here, penalty coefficient is β(input set of automata), the compensation is the penalty ratio, and the effect of the
coefficients on the total number of (plain or aggregated) packets obtained in node jover the time tis
NAPackj¼Xi¼1degree NPKi,ð5Þ
where NAPackjis the number of aggregated data packets by node jand NPK iis the number of aggregated data packets in
ifor node j, and the impact of coefficients (reward/penalty T)isas
T¼11
NAPj
:ð6Þ
The aggregation of data is an integral wireless routing method for the processing of data from different network
sources. It aggregates data from the sensor, which eliminates the redundancy of the data and decreases the transmitted
data. Thus, it saves the strength of the IoT sensor nodes. Data aggregation (DA) clubs the data of the sensor and
FIGURE 5 Data aggregation flow with a mathematical model
KUMAR ET AL.11 of 21
removes the noise from different sources. Finally, for data transmission, it produces precise data. Basic DA work (MAX,
MIN, AVE, and so forth.) can be utilized to join information things, identifying with a similar occasion
(e.g., temperature readings of some sensor nodes). Thus, DA procedure is very useful for our proposed scenario to
improve results during the simulation (see Figure 6).
4.2 |AOF0 implementation
To choose the most feasible path, AOF0 uses a combination of routing metrics and constraints, including real-time
constraints, energy constraints, packet priority, and congestion metrics. In RPL, each node chooses its preferred
parent using the OF, which is then used to transfer data to the DODAG root. As a result, each node uses AOF0
to find its way to the DODAG root. For constructing DODAG, RPL has control message types: (1) DODAG
Information Object (DIO) used to create a path from upward routing; (2) Destination Advertisement Object (DAO)
used to create a path from downward routing, also to propagate destination information to the upward nodes;
(3) DODAG Information Solicitation (DIS) used to solicit or request a DIO from the RPL node, also to search
neighborhood; and (4) Destination Advertisement Object Acknowledgment (DAO-ACK) in response to unicast
DAO message.
Let Nbe the set of sensor nodes and nibe a sensor node from N, which has Mj
s, a set of new periodic messages to
send through channel jover a link, and MOj
sj(resp. Mj
r), a set of old periodic messages that are transmitted (resp.
received) through channel j; node nihas higher priority (Pi) than node nk; and a sensor node has a set of channels C
over one link. The OF of AOF0 is to maximize packet transmission rate according to their priority, which is subjected
to five constraints:
Maximize XjCj
j¼1XMj
s
i¼1αi,jPi:ð7Þ
For data, the sum αi,jits coefficients must equal 1 to ensure that the transmission is not repeated (Equation 12).
1. For each channel between node niand its parent nj, the channel's utilization over their link F
ni
,jmust not exceed
the predefined threshold.
Subject to njFni,j,¥cjC:
XjMj
sj
i¼1
αi,jWCTT i,j
Ti
þXjMOj
sj
i¼1
WCTT i,j
Ti
þXjMj
sj
k¼1
WCRTk,j
Tk
þThreshold, ð8Þ
FIGURE 6 Max function data aggregation process
12 of 21 KUMAR ET AL.
where WCRTk,jis the worst-case reception time of message kfrom node nk (response transmission time of message
ifrom node ni) over channel j,Ti(response Ti) refers to the period of message k(response message i), and WCTTi,jis
the worst-case transmission time of message iover channel j.
2. For each node, the output data (transmitting data) must be greater than the input data (receiving data).
XjMj
rj
k¼1
WCRTk,j
Tk
XMj
s
jj
i¼1
αi,jWCTT i,j
Ti
þXMOj
s
jj
i¼1
WCTT i,j
Ti
:ð9Þ
3. For each channel, the consumed energy must not exceed the available energy for a node.
XjCj
j¼1Ejt1,t2
½ðÞ<CBt1
ðÞþEHt1,t2
½ðÞ,ð10Þ
where Ejt1,t2
½ðÞis the consumed energy by channel jin the time interval EHt1,t2
½ðÞ.CBt1
ðÞis the remaining energy in
the battery at t1, and EHt1,t2
½ðÞis the harvested energy.
4. For data, the coefficient value must be between one and zero to determine whether or not the data will be sent.
¥miMs,0αi,j1:ð11Þ
5. For data, the sum αi,jits coefficients must equal 1.
¥miMs,XC
jj
j¼1αi,j¼1:ð12Þ
Thus, in the proposed AOF0, the optimal feasible path is chosen after verifying the following constraints:
meets real-time constraints (time feasibility),
meets energy constraints (energy feasibility),
respects link capacity and total input/output data (congestion aware), and
sends data according to their priority.
5|RESULT AND DISCUSSION
We consider a directed acyclic graph (DAG) with up to 100 nodes that are randomly distributed to form a connected
network to evaluate the impact of the proposed RPL's OF AOF0 on QoS and congestion. Five hundred new random
packets must be sent to the DODAG root by these nodes. We compared AOF0 to the OFs OF0 and MRHOF, which are
simulated in Contiki, an open-source IoT operating system, to show how AOF0 can provide good performance
concerning real-time application requirements. Then, we assess five performance indicators while ensuring that the
network is both time and energy efficient. To start with, we will build a stand-alone network with no connectivity to
outside networks. The next tutorial will show how to add Internet connectivity with a border router. RPL
fundamentally perceives our mesh network as a tree topology, called a DAG or DODAG. The network is instantiated
(constructed) by the tree's root (DAG or DODAG root). RPL supports different directions of traffic; first, upward
routing: from any node to a root; second, downward routing: from the root to any node; and third, any-to-any routing:
where traffic flows between arbitrary pairs of nodes in the DODAG by routing upwards to their closest common
ancestor (or the root in nonstoring mode) in the DODAG and then down to the destination node. An event can take
place everywhere in the field of the sensor.
49
KUMAR ET AL.13 of 21
The sink node with the lowest PDR is then reduced in the proposed optimization process in its sub-DODAG
measurements when the mean span of the event zone nodes approaches one half of the full sub-DODAG duration.
In this case, the sink nodes reduced their sub-DODAG size at a large distance from the current sink node; thus,
raising the hop distance from this new sink would usually result in improved network efficiency. PDR is known
only when there are no mobility disks inside the network, as described in the network optimization algorithm and
seen in the network Algorithm 1. Sink nodes are preparing to reduce their network resources dependent on PDR.
Because the PDR of close sub-DODAG sink nodes is given for each sink, the lower PDR value lowers its network
size below the application threshold defined. This decision is expected to decrease PDR in general if the nodes can-
not successfully send their data back to the destination. The network topology in an FC network is complex. There
will be new nodes joining and leaving the network. The problem of confidence is one of the most urgent issues of
FC. The level of confidence that an entity can behave satisfactorily is referred to as trust. RPL gives only rudimen-
tary protection against routing and other kinds of threats. Due to the resource limitations of fog nodes, heavyweight
cryptographic algorithms cannot be used to achieve safe communication. To protect fog-IoT networks, a lightweight
mechanism is required.
Further, RPL is connected to UDP and optionally to DTLS, offering a high degree of security in communications.
Based on established Internet standards, particularly the DTLS protocol, we are implementing the first fully
implemented two-way authentication protection framework for IoT security and privacy. The proposed protection
framework is based on the most commonly used cryptography of the public key RivestShamirAdleman (RSA) and
operates on top of regular stacks of low-power communication. We assume that current implementations, engineering
techniques, and security infrastructure can be reused by relying on a proven standard, allowing for easy security
uptake. RPL sets out four protection modes: (1) NoSec, with DTLS, deactivated; (2) PreShared Key, with activated
DTLS; (3) Raw Public Key, with activated DTLS; and (4) Certificate, with compatible DTLS. Confirmable (CON) is the
durability of signing a letter. A confirmable message is retransmitted by law, and exponential back-off between broad-
casts, to the receiver, sends the message acknowledgment (ACK) with the same message ID (in that example is
0x7d34) from the appropriate endpoint (see Figure 7). If a receiver cannot process a confirmable signal at all (i.e., not
even able to provide an acceptable answer to an error), it replies with a reset message (RST) instead of a greeting.
Figure 7 shows the authentication feature between the client and server to protect the server against Denial-of-Service
(DoS) attacks.
FIGURE 7 Reliable message transmission
14 of 21 KUMAR ET AL.
FIGURE 8 Comparison of energy consumption with the proposed method
In Algorithm 1, C
pkt
counter is the cumulative amount of packets the sink node receives. The cumulative number of
packets received by source nodes was C
pkt
received. Min PDR N is the lowest PDR between the two sinks. Max Rank
Rest is the Total Level Rest. NCI denotes network counter indicator.
LLN is a network that restricts all routers and their interconnections. LLN routers operate with restrictions such as
power, resources, memory, and their interconnections. LLN operates from a few hundred to 1000 routers with a high
error rate, low data rate, and volatility. LLN also has traffic flows such as P2P, P2M, and M2P.
50
To function indepen-
dently from the routing goal across a wide variety of LLN programs, RPL packet processing and forwarding. This goal
minimizes energy and latency. RPL is based on a distance vector, a constructive protocol that produces a DAG that is
used to exchange data between nodes. To measure the node rank, the AOF0 is used to compute the right path; it works
on a combination of metrics and constraints. In RPL, OF is used to pick the optimal path in a network towards the
DODAG root.
The optimization seen in this work is to increase the overall network performance and extend the network's life-
time. IoT nodes typically use batteries; the energy supply of these nodes is thus an important element in their continu-
ous life and operation in the network environment. In this regard, the energy consumption of the network is measured
in a way, namely, real energy consumption, and the estimation method for the energy consumption rate is modeled on
a millijoule scale is
Energy mJðÞ¼
Tx19:5mAþRx21:8mAþCPU 1:8mAþLMP 0:0545Þ3V
4096 8:ð13Þ
The energy consumption (Equation 13) is determined using the AOF0 on the fog node to boost network efficiency
and is also used in the proposed scenario. Figure 8 shows the new system with various cycles for data generation versus
the per-bit energy usage of the fogging process. The proposed method's AOF0 energy consumption is slightly better
than the OF0 and MRHOF functions. When the packet frequency is high, the data rate is strong, and the AOF0 fog
node does not drop several packets, resulting in low energy usage per bit as opposed to lower packet generation periods.
Consequently, the energy usage is smaller than the conventional system.
It can be seen that conventional device schemes' packet drop ratio is greater than the current solution since latency
becomes more severe and the amount of packets falling becomes higher. Figure 9 shows the delay from end to end for
both methods. This latency is high as sky motes or nodes use very low service cycles in the simulation. Therefore, nodes
use their sleep mostly compared with the active node. Both methods are very late. The delay of conventional methods
is noticeable in the first place, similar to the propagated method. The data are constantly sent to a sink node; thus,
KUMAR ET AL.15 of 21
congestion grows steadily and continues. This raises the latency in traditional techniques. After low PDRs have been
observed in every sink node, network synchronization begins to optimize the network. The speed of the transmission
phase decreases with network setup in the network. Although the end-to-end latency of the AOF0 stabilizes and
becomes significantly better than the OF0 and MRHOF with continuous data collection.
FIGURE 9 Delay count comparison with the proposed method
FIGURE 10 Average power consumption versus number of hop
16 of 21 KUMAR ET AL.
Hop is an IoT networking term that refers to the number of nodes a packet (a portion of data) passes through from
its source to its destination, as shown in Figure 10. Sometimes, a hop is counted when a packet passes through other
nodes on a network. This is not always the case, and it depends on what role those devices play on the network and
how they are configured. The traditional method does not depend on any routing metrics for data-path selection,
FIGURE 11 Average transmit duty cycle versus number of hop
FIGURE 12 Average power consumption in the motes
KUMAR ET AL.17 of 21
whereas the proposed method selects the path with RPL routing based on minimum node rank value. So the power
consumption for the OF0 and MRHOF is higher than the AOF0.
Task period implies a percentage of the time that a node is filled. With less overhead routing and retransmission of
connection layers in our proposed function AOF0, RPL decreases the duty cycle relative to the conventional approach
as seen in Figure 11. If a single node transmits 2-time units per 10-time units on a line, this node has a 20% duty cycle.
But if we regard channels as well, things become a bit more complicated. If we have a system that transmits instead of
one on three networks, each specific channel is always occupied per 10-time units for 2-time units (so 20%). However,
the system now transmits every 10-time units to 6-time units, granting it a 60% duty cycle. In the proposed work,
16 nodes are used to track the amount of energy consumed, with the network becoming denser as more energy is con-
sumed. This increase in power consumption is due to the node sending more transmissions. Figure 12 shows the total
absolute power consumption over time, with the transceiver power accounting for the majority of the total power con-
sumption and the other power sources being minor. As a result, we ignored the low-power mode and CPU consumption
in our research. Then, we concentrate on calculating the percent radio on time, which is a measure of energy consump-
tion. The higher the network traffic, the higher the energy consumption, and vice versa. There are a vast number of
parameters that need to be looked at during the IoT simulation, including low-power management (LPM), central
processing unit (CPU), radio listens, and radio transmit. The findings are compatible with the above-described graph,
and the low-power mode is in honesty mode. Furthermore, the parameter for radio listening is also consistent. For the
FIGURE 13 Temperature evaluation in Celsius at the motes
18 of 21 KUMAR ET AL.
processing computation, the LPM, CPU, radio listens and the radio transmits are separate parameters, and these param-
eters are utilised to calculate the average power of our network motes.
Power mWðÞ¼
Energy mJ
ðÞ
Time sðÞ :ð14Þ
To contribute, the level of power consumption (in mW/h units) in the proposed network motes shall be determined
by Equation 14. With the network graph tab in the Cooja collect view, the researcher can view the dynamic topology
and sensor node connections. The calculation of the temperature in Celsius of all motes is shown in Figure 13.
To provide a clear understanding, a comparative research description is specified in the form of Table 3 between
conventional approaches and the proposed approach.
6|CONCLUSION
This paper integrates IoT with FC and suggests an IoT-based FC model. The quality tests have been carried out using
Cooja on Contiki. The paper concludes that the proposed scenario with FC is highly beneficial because packets from
similar directions are added to the network root using learning automats, and data exchange rates are used to manage
time consumption. As a result, this strategy culminated in better network graph creation and more efficient load
balancing inside the network in the proposed simulation. In this paper, we propose a new AOF0 for selecting the nodes'
preferred parent. Energy consumption, ETX, and NOCS metrics were used in our OF. Furthermore, the weights of met-
rics in our AOF0 are adaptive and can change over the network's lifespan. To demonstrate the effectiveness of the pro-
posed process, we compared it to OF0 and MRHOF. After comparing AOF0 to existing OFs that use only one, two, or
three metrics that are insufficient to meet application requirements, we discovered that AOF0 is more appropriate for
respecting real-time application requirements, as it combines five metrics, including node rank, real-time constraints,
energy constraints, link capacity (threshold), and input/output. Extensive simulation experiments show that the pro-
posed OF outperforms previous work by achieving the highest PDR, in particular, PDR according to packet priorities,
and the best throughput when compared to a low average in consumed energy. In the future, rather than moving the
fog router position with an increasing number of nodes each time covering a larger area, an improvement of the exis-
ting RPL routing protocol should be developed to provide better network efficiency.
TABLE 3 Comparative study between the conventional approaches and the proposed scheme
Reference Conventional techniques Scope of improvement Proposed scheme merits
Yu et al.
42
Secure reciprocal authentication using logic
analysis from BurrowsAbadiNeedham.
Not provide two-way
security and limited to
cloud-based IoT
applications.
Two-way authentication security scheme
and best for IoT with FC.
Lamaazi and
Benamar
43
Proposed and compared the RPL-EC (RPL-
based combined ETX and energy
consumption) to the RPL-FL (RPL based
on the flexible trickle algorithm).
Only limited to the
energy consumption
applications, not
provide high security.
Our test simulation results show that the
RPL-AOF0 provides the best values in
terms of overhead, successful delay
reduction, and less energy consumption
and provides high DTLS security for
network life.
Chen et al.
44
The proposed offloading scheme is superior
in reliability and energy consumption.
Due to the lack of
security, the
authentication process
is not done.
The proposed protection framework is
based on the most commonly used
cryptography of the public key (RSA)
and operates on top of regular stacks of
low-power communication.
Onwuegbuzie
et al.
45
Proposed and investigated the performance
of RPL concerning its two OFs: OF0 and
MRHOF.
Network overhead has
not been reflected in
this work.
Network overhead problem resolve by
AOF0 in proposed work
KUMAR ET AL.19 of 21
DATA AVAILABILITY STATEMENT
The data that support the findings of this study are available from the corresponding author upon reasonable request.
ORCID
Sachin Kumar Gupta https://orcid.org/0000-0001-8270-5853
Saru Kumari https://orcid.org/0000-0003-4929-5383
REFERENCES
1. Janjua K, Shah MA, Almogren A, Khattak HA, Maple C, Din IU. Proactive forensics in IoT: privacy-aware log-preservation architecture
in fog-enabled-cloud using holochain and containerization technologies. Electronics. 2020;9(7):1172.
2. Mahmud R, Srirama SN, Ramamohanarao K, Buyya R. Profit-aware application placement for integrated FogCloud computing envi-
ronments. J Parallel Distrib Comput. 2020;135:177-190.
3. Aburukba RO, AliKarrar M, Landolsi T, El-Fakih K. Scheduling Internet of Things requests to minimize latency in hybrid fog
cloudcomputing. Future Gener Comput Syst. 2020;111:539-551.
4. Hassan HO, Azizi S, Shojafar M. Priority, network and energy-aware placement of IoT-based application services in fog-cloud environ-
ments. IET Commun. 2020;14(13):2117-2129.
5. Singh KD, Sood SK. 5G ready optical fog-assisted cyber-physical system for IoT applications. IET Cyber-Phys Syst: Theor Appl. 2020;5(2):
137-144.
6. Nashaat H, Ahmed E, Rizk R. IoT application placement algorithm based on multi-dimensional QoE prioritization model in fog comput-
ing environment. IEEE Access. 2020;8:111253-111264.
7. Kesavan R, Arumugam S. Adaptive deep convolutional neural network-based secure integration of fog to cloud supported Internet of
Things for health monitoring system. Trans Emerg Telecommun Technol. 2020;31(10):e4104.
8. Tian JF, Wang HN. An efficient and secure data auditing scheme based on fog-to-cloud computing for Internet of things scenarios. Int J
Distrib Sens Netw. 2020;16(5):1550147720916623.
9. Rana AK, Sharma S. Enhanced energy-efficient heterogeneous routing protocols in WSNs for IoT application. Int J Eng Adv Technol.
2019;9(1):1418-1425.
10. Dhingra S, Madda RB, Patan R, Jiao P, Barri K, Alavi AH. Internet of things-based fog and cloud computing technology for smart traffic
monitoring. Internet Things. 2020;14:100175.
11. Rana AK, Krishna R, Dhwan S, Sharma S, Gupta R. Review on artificial intelligence with Internet of Thingsproblems, challenges
and opportunities. IEEE 2nd International Conference on Power Energy, Environment and Intelligent Control, Greater Noida, India.
2019:383-387.
12. Kumar A, Salau AO, Gupta S, Paliwal K. Recent trends in IoT and its requisition with IoT built engineering: a review. In: Advances in
Signal Processing and Communication. Lecture Notes in Electrical Engineering. Vol. 526. Springer; 2019:15-25.
13. Ni J, Zhang K, Lin X, Shen XS. Securing fog computing for Internet of Things applications: challenges and solutions. IEEE Commun
Surv Tutor. 2017;20(1):601-628.
14. Mutlag AA, Abd Ghani MK, Arunkumar NA, Mohammed MA, Mohd O. Enabling technologies for fog computing in healthcare IoT
systems. Future Gener Comput Syst. 2019;90:62-78.
15. Oueis J, Strinati EC, Barbarossa S. The fog balancing: load distribution for small cell cloud computing. IEEE 81st Vehicular Technology
Conference (VTC Spring), Glasgow. 2015:1-6.
16. Alharbi F, Atkins A, Stanier C. Understanding the determinants of Cloud Computing adoption in Saudi healthcare organisations.
Complex Intell Syst. 2016;2(3):155-171.
17. Mongiello M, Colucci S, Vogli E, Grieco LA, Sciancalepore M. Run-time architectural modeling for future internet applications. Complex
Intell Syst. 2016;2(2):111-124.
18. Sanjeevi P, Kumar BS, Prasanna S, Maruthupandi J, Manikandan R, Baseera A. An ontology enabled internet of things framework in
intelligent agriculture for preventing post-harvest losses. Complex Intell Syst. 2020;357:1-17.
19. Gomathi P, Baskar S, Shakeel PM. Concurrent service access and management framework for user-centric future internet of things in
smart cities. Complex Intell Sys. 2021;7(4):1723-1732.
20. Sarkar S, Misra S. Theoretical modelling of fog computing: a green computing paradigm to support IoT applications. IoT Netw. 2016;
5(2):23-29.
21. Ningning S, Chao G, Xingshuo A, Qiang Z. Fog computing dynamic load balancing mechanism based on graph repartitioning. China
Commun. 2016;13(3):156-164.
22. He X, Sun X, Von Laszewski G. QoS guided min-min heuristic for grid task scheduling. J Comput Sci Technol. 2003;18(4):442-451.
23. Mishra S, Singh P, Arora D, Agrawal KK. Analyzing and evaluating the performance of 6L0WPAN and RPL using CONTIKI. IEEE
International Conference on Intelligent Sustainable Systems (ICISS), Palladam, India. 2017:1100-1105.
24. Gubbi J, Buyya R, Marusic S, Palaniswami M. Internet of Things (IoT): a vision, architectural elements, and future directions. Future
Gener Comput Syst. 2013;29(7):1645-1660.
25. Premsankar G, Di Francesco M, Taleb T. Edge computing for the Internet of Things: a case study. IEEE Internet Things J. 2018;5(2):
1275-1284.
20 of 21 KUMAR ET AL.
26. Ning H, Hu S. Technology classification, industry, and education for Future Internet of Things. Int J Commun Syst. 2012;25(9):
1230-1241.
27. Yang Y, Wang K, Zhang G, Chen X, Luo X, Zhou MT. MEETS: maximal energy efficient task scheduling in homogeneous fog networks.
IEEE Internet Things J. 2018;5(5):4076-4087.
28. Pang AC, Chung WH, Chiu TC, Zhang J. Latency-driven cooperative task computing in multi-user fog-radio access networks. 37th IEEE
International Conference on Distributed Computing Systems, Atlanta, United States. 2017:615-624.
29. Ogawa HS, de Oliveira BT, Rodrigues TDJ, Albertini B, Margi CB. Energy consumption and memory footprint evaluation of RPL and
CTP in TinyOS, XXXIV Simp
osio Brasileiro de Telecomunicações e Processamento de Sinais. 2016:50-54.
30. Felici-Castell S, Pérez-Solano JJ, Segura-Garcia J, García-Pineda M, Soriano-Asensi A. Experimental trade-offs between different
strategies for multihop communications evaluated over real deployments of wireless sensor network for environmental monitoring. Int J
Distrib Sens Netw. 2018;14(5):1550147718774465.
31. Elleuchi M, Boujeleben M, Abid M, BenSaleh MS. Securing RPL-based Internet of Things applied for water pipeline monitoring. 25th
International Conference on Software, Telecommunications and Computer Networks (SoftCOM), Split, Croatia. 2017:1-7.
32. Boualam SR, Ezzouhairi A. New objective function for RPL orotocol. In: Embedded Systems and Artificial Intelligence. Vol. 1076.
Springer; 2020:681-690.
33. Bhandari KS, Cho GH. Resource oriented topology construction to ensure high reliability in IoT based smart city networks. Int J Syst
Assur Eng Manag. 2020;11(4):798-805.
34. Mahmud R, Kotagiri R, Buyya R. Fog computing: a taxonomy, survey and future directions. In: Internet of Everything. Vol. 17. Springer;
2018:103-130.
35. Li J, Jin J, Yuan D, Zhang H. Virtual fog: a virtualization enabled fog computing framework for Internet of Things. IEEE Internet Things
J. 2017;5(1):121-131.
36. Peng M, Wang Y, Dang T, Yan Z. Cost-efficient resource allocation in cloud radio access networks with heterogeneous fronthaul expen-
ditures. IEEE Trans Wireless Commun. 2017;16(7):4626-4638.
37. Raj A, Kumar R. An exploration on cloud computing security strategies and issues. In: Inventive Communication and Computational
Technologies. Springer; 2020:549-562.
38. Garg D, Sidhu J, Rani S. A note on cloud computing security. Int J Ad Hoc Ubiquitous Comput. 2020;33(3):133-154.
39. Zaminkar M, Sarkohaki F, Fotohi R. A method based on encryption and node rating for securing the RPL protocol communications in
the IoT ecosystem. Int J Commun Syst. 2021;34(3):e4693.
40. Giannakoulias A. Cloud computing security: protecting cloud-based smart city applications. J Smart Cities. 2019;2(1):41-52.
41. Lamaazi H, Benamar N. OF-EC: a novel energy consumption aware objective function for RPL based on fuzzy logic. J Netw Comput
Appl. 2018;117:42-58.
42. Yu S, Park K, Park Y. A secure lightweight three-factor authentication scheme for IoT in cloud computing environment. Sensors. 2019;
19(16):3598.
43. Lamaazi H, Benamar N. A novel approach for RPL assessment based on the objective function and trickle optimizations. Wireless
Commun Mobile Comput. 2019;2019:1-9.
44. Chen S, Zheng Y, Wang K, Lu W. Delay guaranteed energy-efficient computation offloading for industrial IoT in fog computing. In ICC
2019-2019 IEEE International Conference on Communications (ICC) Shanghai, China. 2019:1-6.
45. Onwuegbuzie I, Ajibade SS, Fele T, Akinwamide S. Performance evaluation of RPL objective function: a case of Contiki operation
system. Preprints. 2020:2020120615. https://doi.org/10.20944/preprints202012.0615.v1
46. Chen CM, Huang Y, Wang KH, Kumari S, Wu ME. A secure authenticated and key exchange scheme for fog computing. Enterp Inf Syst.
2021;15(9):1200-1215.
47. Al-Joboury IM, Al-Hemiary EH. Virtualized fog network with load balancing for IoT based fog-to-cloud. Int J Inform Visualization. 2020;
4(3):123-126.
48. Ahuja SP, Wheeler N. Architecture of fog-enabled and cloud-enhanced Internet of Things applications. Int J Cloud Appl Comput. 2020;
10(1):1-10.
49. Bahramlou A, Javidan R. Adaptive timing model for improving routing and data aggregation in Internet of things networks using RPL.
IET Netw. 2018;7(5):306-312.
50. Mahajan S, Fataniya B. Cloud detection methodologies: Variants and developmenta review. Complex Intell Syst. 2019;6(2):251-261.
How to cite this article: Kumar A, Sharma S, Goyal N, Gupta SK, Kumari S, Kumar S. Energy-efficient fog
computing in Internet of Things based on Routing Protocol for Low-Power and Lossy Network with Contiki. Int
J Commun Syst. 2021;e5049. doi:10.1002/dac.5049
KUMAR ET AL.21 of 21
... GI-RPL [30] latency and improving packet delivery ratios to enhance quality of service (QoS). Researchers achieved this by introducing new OpenFlow (OF) techniques and comparing their performance with traditional OF methods. ...
... In contrast, this study tests both environments for three configurations: QoS parameters (6 parameters) and network scalability (10-220 nodes). In their publication [30], the authors introduced a new routing metric called ARMOR, which takes into account mobility and aims to balance dependability and PDR. However, it is important to emphasize that ARMOR is specifically designed for IoT devices. ...
Article
Full-text available
The extensive utilization of IoT applications leads to the aggregation of a substantial volume of data, presenting a crucial challenge in terms of data routing within these networks. RPL intentionally surpasses the limitations sometimes observed in low-power and lossy networks, which are particularly prevalent in IoT networks. The RPL protocol is designed specifically for static networks that do not involve mobility or topological changes. The RPL protocol guarantees continuous connectivity between nodes and mitigates the risk of data loss in stationary IoT applications that do not involve mobility or alterations in network configuration. The article utilizes a mobility aid technology known as network performance stability using the intelligent routing protocol (nPSIR), which expands upon RPL. The Mobility Support Entity (nPSIR) facilitates the displacement of all nodes, with the exception of the root node, and ensures uninterrupted connection during mobility. Moreover, it deals with the situation where there is a physical barrier between two interconnected nodes in a changing environment. In order to achieve this objective, it employs a dynamic trickle timer that operates within two distinct ranges. Furthermore, it utilizes a neighbor link quality table, a mechanism for selecting the most beneficial parent node in the event of migration, a measure of confidence, the identification of crucial regions, and a blacklist. Multiple simulations validate that nPSIR effectively decreases hand-off delay and improves packet delivery, despite the minor drawbacks of increased signaling costs and power consumption. The delivery ratio decreases the quantity of lost data packets and surpasses both RPL as a responsive protocol and mRPL as a proactive protocol in relation to mobility.
... Further to select the parent node, RPL uses two objective functions, i.e., Objective Function Zero (of0) and Hysteresis Objective Function (MRHOF). For example, when deciding which parent a node prefers, MRHOF utilizes the Expected Transmission Count (ETX), while of0 uses the hop count [14,15]. ...
... For example, sniffing attacks aim to obtain relevant information related to the RPL network [28]. The location of the attacker node is very important since the node closer to the root node may gather maximum traffic and information [15]. ...
Article
Full-text available
Internet-of-things (IoT) networks are distinguished by nodes with limited computational power and storage capacity, making Low Power and Lossy Networks (LLNs) protocols essential for effective communication in resource-constrained environments. One such protocol is the Routing Protocol for Low-Power and Lossy networks (RPL), which establishes and manages routes in RPL-based networks. RPL contributes to optimized routing and reduced network overhead in LLNs. However, the RPL-based protocol is susceptible to various internal and external vulnerabilities that require thorough exploration and mitigation. Experimental results illustrate the impact of several RPL attacks, including the DODAG Information Solicitation (DIS) attack, version number attack, decreased rank attack, and worst parent selection (WPS) attack. For simulation purposes, we employed the Contiki Cooja network simulator. Further, we conduct a comparative analysis of these RPL-based attacks, revealing that the WPS attack has a significant impact on the network performance compared to other attacks mentioned in the paper.
... From the above observation, a cloud Integrated based Secured data dissemination protocol is proposed to provide secured and efficient data dissemination to the smart devices in IoT. Data dissemination in cloud storage is a fundamental process that facilitates the sharing and distribution of stored information across diverse users and systems [36,37]. Cloud storage services offer a centralized and scalable repository for data, allowing users to efficiently disseminate information with collaborators, clients, or other authorized entities. ...
Article
Full-text available
Base station (BS) offers data dissemination as a service to IoT smart devices, enabling efficient reprogramming or reconfiguration for their intended activities in post-deployment. Most of the existing IoT data dissemination schemes rely on flooding, leading to the Redundant Broadcast Storm Problem (RBSP), where multiple sensor nodes repeatedly transmit redundant data to neighbours. RBSP elevates network energy consumption and sender congestion in the network. Given that IoT smart devices communicate through open wireless mediums with the internet as a backbone, they are vulnerable to various malicious threats during data dissemination. Intruders may engage in malicious activities and compromise configuration parameters, leading to device failure to execute intended services. This paper proposes a Secure Cloud-Integrated Data Dissemination Protocol (SCIDP) aimed at ensuring the secure dissemination of data within cloud-integrated environments to mitigate RBSP’s impact and enhances security for performing effective reprogramming of sensor devices in IoT. The proposed protocol is implemented by using NS3 simulator with realistic simulation parameters. Simulation results indicate that the proposed protocol enhances energy efficiency by 12%, dissemination effectiveness by 16%, and network lifespan by 16%. Furthermore, the proposed system decreases communication overhead by 11% and computational costs by 9% compared to alternative existing protocols. From the formal security analysis, the proposed system proves that it can withstand against various kinds of security attacks in the network.
... Other works about IoT [33][34][35][36][37][38] Medium In Reference 4, Fu and He developed an approximate ground truth to accurately detect PU signals using data transmission acknowledgment feedback and used online learning to update weights and identify the best and most reliable secondary users (SUs) to participate in majority. As an alternative approach, Giri and Majumder proposed an extreme learning machine-based strategy to minimize SSDF by malicious users (MUs). ...
Article
Full-text available
To improve spectrum utilization, cognitive radio (CR) enables unauthorized internet of thing (IoT) devices to opportunistically access the channel underutilized by the primary user (PU) in a cognitive IoT (CIoT). To this end, cooperative spectrum sensing (CSS) plays a crucial role in CR technology, which leverages the spatial diversity of corroborative IoT devices to accurately detect the PU signal. However, this open cooperative paradigm may suffer from spectrum sensing data falsification (SSDF) attack in which malicious IoT devices intentionally mislead the fusion center (FC) by providing false sensing results to make an incorrect global decision regarding the PU status. To effectively characterize the attack behavior of malicious IoT devices, we propose a massive SSDF attack model described by the attack cycle and malicious ratio within a sensing period to characterize the malicious behaviors. Additionally, we introduce a delivery evaluation mechanism and propose a dynamic sliding window‐CSS (DSW‐CSS) to mitigate the impact of massive SSDF attack. Moreover, we introduce a sequential reporting mechanism to further reduce the number of samples required by the global decision‐making of the FC. Finally, simulation results show the flexibility and aggressiveness of the proposed attack model and demonstrate the correctness and effectiveness of DSW‐CSS.
... For those who are unfamiliar with Contiki, these examples are especially useful because they can be quickly modified to fit the needs of their projects. As an illustration, the RPL routing protocol is used in conjunction with the UDP protocol at the network layer to create a network of numerous motes [18]. C language syntax is used in the *.c files that make up Contiki applications and programs. ...
Article
Full-text available
The low-power lossy network’s performance is strongly dependent on the battery life of each wireless node. Furthermore, the routing protocol for such a network does not address the energy issue that each node in the network faces. Novel techniques or approaches are necessary to handle the energy problem that nodes encounter in low-power lossy networks in order to extend the overall lifespan of each node in the network. This study focuses on improving the lifespan of energy-constrained nodes in low-power lossy networks by implementing a solar energy harvesting module. The current routing protocols used in such networks adequately address the energy problem faced by nodes. The study uses the Cooja simulator with ETX and OF0 protocols to analyze the energy harvested by nodes with 1% battery life and evaluates the network performance with 25, 50, and 100 nodes. The analysis includes throughput, packet delivery ratio, and network connectivity. The results show that OF0 outperforms ETX in all three scenarios, and performs well in the other parameters. With OF0, the network lasts for 12:50:58, 12:46:58, and 8:12:25 (non-energy harvesting), and 15:59:01, 15:12:07, and 11:18:23 (energy harvesting) for 25, 50, and 100 nodes, respectively. The study suggests that novel techniques, such as energy harvesting, could significantly improve the overall lifespan of nodes in low-power lossy networks.
... Wearable healthcare technologies enabled by the Internet of Things currently assist the user in keeping track of elements unique to their health [2]. Conventional centralized information management, on the other hand, is unsuitable for potential implementation because of the latency and highly involved and the fact that it cannot meet the stringent timing constraints of IoT applications or the stringent emission limits of IoT networks [3]. ...
... Our paradigm maximizes network node computing capabilities and reduces data center processing demand, network transmission overhead, and energy usage. The threshold-based cluster head (CH) selection stable election procedure (SEP) for heterogeneous networks [39] balances cluster members and the level of energy for the selected CH nodes. Sensor nodes are classified as standard, intermediate, or enhanced to balance the network load based on the initial energy supply. ...
Article
Full-text available
Smart technologies are advancing the development of cutting-edge systems by exploring the future network. The Internet of Things (IoT) and many multimedia sensors interact with each other for collecting and transmitting visual data. However, managing enormous amounts of data from numerous network devices is one of the main research challenges. In this context, various IoT systems have been investigated and have provided efficient data retrieval and processing solutions. For multimedia systems, however, controlling inefficient bandwidth utilization and ensuring timely transmission of vital information are key research concerns. Moreover, to transfer multimedia traffic while balancing communication costs for the IoT system, a sustainable solution with intelligence in real-life applications is demanded. Furthermore, trust must be formed for technological advancement to occur; such an approach provides the smart communication paradigm with the incorporation of edge computing. This study proposed a model for optimizing multimedia using a combination of edge computing intelligence and authentic strategies. Mobile edges analyze network states to discover the system's status and minimize communication disruptions. Moreover, direct and indirect authentication determines the reliability of data forwarders and network stability. The proposed authentication approach minimizes the possibility of data compromise and increases trust in multimedia surveillance systems. Using simulation testing, the proposed model outperformed other comparable work in terms of byte delivery, packet overhead, packet delay, and data loss metrics.
Article
Recent developments in wireless sensor networks (WSNs) have generated interest in the area of sensor tracking events. The proposed work aims to decrease energy usage by identifying functional relay nodes utilizing the enhanced energy proficient clustering (EEPC) method. To minimize long-distance interaction between CH and BS, a power-efficient relay chosen technique is proposed using improved Grasshopper Optimization algorithm (IGOA). The network is constructed using both mobile and fixed nodes. Mobile nodes first choose cluster head (CH) among fixed nodes after broadcasting information. Depending on the related positioning and power density, mobile nodes choose their CH. CH receives information from mobile sensor nodes (SNs). Based on the nodes’ velocity and position, the EEPC method computes particle fitness value and chooses the relay nodes. Performance metrics include Throughput, End-to-End Delay, Packet Delivery Ratio (PDR), Quantity of Received Packets, Total Residual Energy, and Total Energy Consumption, network lifetime. The suggested technique enhances network lifetime and reduces energy consumption when compared to other existing protocols. After 200 simulation rounds, the suggested EEPC displays 98.87% PDR. However, during 200 simulation cycles, ANFISRS, ORNS and DTC-ORS show 97.82%, 96.03%, and 89.585% PDR, respectively.
Chapter
The Internet of things (IoT) is mainly an infrastructure in millions of computers and sensors that produce massive amounts of information. Computing paradigms are required near the edge devices due to latency, bandwidth, and storage constraints. Fog computing (FC) is a more sophisticated form of cloud computing, and it gives the end-users access to some of its features. FC offers end-users with processing, storage, and network resources as part of the IoT. One of the primary issues with FC is authentication and safe data access between fog servers and fog nodes, as well as fog nodes and IoT users. This research presents a technique for safe information access and authentication between fog and IoT end-users. Initial encryption is performed using SHA1 and AES algorithms. The homomorphic approach was utilized to provide additional data security in the first phase. Homomorphic encryption is a cryptographic approach that permits computations on encrypted data, avoiding the required to reveal the original message to intermediaries (servers) that are merely providing a service and not a data consumer. In this paper, an effective mutual authentication technique between cloud and fog is proposed. The performance of the proposed system is evaluated in terms of execution time. The technique is suitable for FC in an IoT setting, according to the performance and security studies.
Chapter
Thanks to constantly advancing technology, the world is changing rapidly. One such idea that has contributed to the reality of automation is the Internet of Things (IoT). IoT links various non-living objects to the internet and enables them to communicate with their local network to automate processes and simplify people's lives. The IoT's potential needs to be completely realised despite the enormous efforts of standards, organisations, coalitions, businesses, academics and others. A number of problems remain. The enabling technology, applications and business models, as well as the social and environmental repercussions, should all be taken into consideration while analysing these difficulties. This article's emphasis is on unresolved issues and challenges from a technological perspective. The main objective is to provide a thorough evaluation of IoT in terms of energy and security, as well as unresolved problems and obstacles that need further study. We provide some perspectives on some new concepts to help future research.
Preprint
Full-text available
Wireless Sensor Networks (WSN) is the network of the resource-constrained network which forms the foundation of the Internet of Things (IoT). The Routing Protocol for Low-power and Lossy Networks (RPL) is responsible for generating and managing data routing paths. Nodes implementing RPL uses the mechanics of Objective Function (OF) to select the preferred next-hop node-parent node, and optimal routing path to the destination node. If routing decisions are not efficiently made, this results in increased collision domain, leading to packet losses and packet retransmission which impairs the network operational lifetime. In this study, we present the Contiki Operating System (OS), a state-of-the-art OS for IoTs, ContikiRPL; Contiki variant of RPL. We investigated the performance of RPL with respect to its two OFs; Objective Function Zero (OF0) and the Minimum Rank with Hysteresis Objective Function (MRHOF). The performance of these OFs was evaluated on the following metrics; Packet Delivery Ratio (PDR), Power consumption, and network latency. The result shows that MRHOF outperformed OF0 on all metrics with an overall average PDR of 91.5%, a latency of 44ms, and power consumption of 1.72mW across all nodes. This results in optimal network performance with improved network operational lifetime.
Article
Full-text available
In recent years, the healthcare monitoring system plays a significant role in providing early intervention for the people who are under risk. Several advanced technologies including the Internet of Things (IoT) are becoming accessible nowadays due to its high level and ubiquitous monitoring. The IoT also enables a structured and competent technique in handling the healthcare of the patients based on remote patient monitoring and mobile health. In addition to this, the deep learning approaches are employed in health‐based applications so as to achieve promising and satisfactory performances for a sizeable amount of data. While monitoring the health condition of the patients, there occur delays in data transferring to the cloud. So, to overcome such shortcomings, the proposed approach of this paper utilizes four different phases including data acquisition phase (DAP), fog to cloud phase (FCP), decision‐making phase (DMP), and execution phase (EP) in transferring the data to the cloud via the fog layer. The initial phase or DAP phase comprises of data storage and collection. The second phase or the FCP phase comprises of two different types of layers namely fog layer and the cloud layer along with that, secure integration of FCP is described. The third phase or the DMP phase involves feture extraction and classification. Here, Adaptive Deep Convolution Neural Network along with the Levy Flightbased Grey Wolf Optimization (LFGWO) are employed in the classification process to obtain the best optimal solution. The final phase or the EP phase provides notification or information to the doctor or the practitioner soon after the detection of any abnormality case. The experimental results are made by comparing various approaches with the proposed approach and the analysis reveals that the proposed approach provides better results with high accuracy, efficiency, response time with less computational cost in healthcare monitoring applications.
Article
Full-text available
Internet of Things (IoT) provides the possibility for milliards of devices throughout the world to communicate with each other, and data are collected autonomously. The big data generated by the devices should be managed securely. Due to security challenges, like malicious nodes, many approaches cannot respond to these concerns. In this paper, a robust hybrid method, including encryption, is used as an efficient approach for resolving the Low‐Power and Lossy Networks (RPL) protocol concerns so that the devices are connected securely. Therefore, the proposed Detection of sinkholes in RPL (DSH‐RPL) method for securing the RPL protocol comprises the four following phases: the first phase creates a reliable RPL. The second phase detects the sinkhole attack. The third phase quarantines the detected malicious node, and the fourth phase transmits data through encryption. The simulation results show that the DSH‐RPL reduces the false‐positive rate more than 18.2% and 23.1% and reduces the false‐negative rate more than 16.1% and 22.78% and it also increases the packet delivery rate more than 19.68% and 25.32% and increases the detection rate more than 26% and 31% compared to SecTrust‐RPL and IBOOS‐RPL.
Article
Full-text available
Bunch specific transducers of Wireless sensor networks (WSN) that give detecting administrations to the Internet of Things gadgets with constrained vitality and capacity assets. Because substitution or energizing of battery in tiny sensor nodes is practically incomprehensible, control utilization winds up one of the critical structure issues in WSN for the future, we proposed a crossbreed directing convention: Advanced Zone-Stable Election Protocol (AZ-SEP) with nature of heterogeneous WSNs for IoT situations. In this convention, a few nodes transmit information legitimately to the base station while some utilization the bunching method to send information to the base station. We actualized AZ-SEP and contrasted it and the customary Low Energy adaptive clustering hierarchy (LEACH). Recreation results demonstrated that Z-SEP improved the steadiness time frame and throughput than existing conventions like LEACH. The proposed AZ-SEP convention outflanks when contrasted with the current LEACH convention with a 64% ascent in better output in the form throughput and broadening the quantity of alive tiny nodes to 2702 rounds which can be utilized to improve the IoT lifetime. At the point when contrasted and other vitality productive conventions, it is discovered that the proposed calculation performs better as far as dependability period and system lifetime in various situations of region, vitality and node density. Thus our simulation result will show enhanced energy, throughput with data aggregation
Article
Full-text available
Constituting the agriculture solid substance manufacture, the post-harvest sector processing schema is direct to preventing reduce the losses in intelligent agriculture. Many processing schemata will be preventing post-harvest losses on the agriculture solid substance manufacture, especially sekai-ichi apple is the regularly used fruit also used to make active in human-related activities of the sensory and control function consisting of an agricultural industry. Sekai-ichi apple is being a definite number of diseases induce, but it is to the highest degree of wastage involving in the Post-Harvest process. Especially sekai-ichi apple count loss is an unsafe many time because it not critically post-harvest. Regardless of consideration, the existing hierarchical model specified post-harvest losses prevention research has deficiencies to precise and quick detection of wastage for ensuring healthy separation of agriculture surroundings. This paper suggests a "Hierarchical Model within Ontology Enabled IoT" for distinguishable healthy separation of sekai-ichi apple by using Boosted Continuous Non-spatial whole Attribute Extraction (BCNAE). Sekai-ichi apple count loss is always safe on critically post-harvest. Proposed Post-Harvest hierarchical model specified post-harvest losses prevention and deficiencies to precise and quick detection of wastage for ensuring healthy separation of agriculture surroundings. In these suggestions, the separation cognitive operation takes the three levels of processing schemes such as lower level, middle level, and higher level. Firstly, the lower level is express agreements with the dynamic functioning for maintaining the definite number of manual induces. This lower level showing an absorption with the activity of manual separation by the human reliability determination. Secondly, the middle level is an express arrangement with the dynamic functioning for reducing the overfitting and accommodate to fitting the right shape deliberation. Middle level is establishing being generalized by concentrating the time-varying features in the occurrence of a change for the worse identification. Finally, the upper level is express for features refining with the help of the function of sekai-ichi apple image segmentation connection. This interpretability process helps to make the proven position of a prominent classification in a particular fruit on the agriculture solid substance. These three processing flow constructs the ontology structure with manually collected sekai-ichi apple images from a 3D sensor. The observational consequences express that the proposed BCNAE framework recognizes a detection performance carrying out with an optimized-separation ratio for time-variant of the separation process.
Article
Full-text available
Constituting the agriculture solid substance manufacture, the post-harvest sector processing schema is direct to preventing reduce the losses in intelligent agriculture. Many processing schemata will be preventing post-harvest losses on the agriculture solid substance manufacture, especially sekai-ichi apple is the regularly used fruit also used to make active in human-related activities of the sensory and control function consisting of an agricultural industry. Sekai-ichi apple is being a definite number of diseases induce, but it is to the highest degree of wastage involving in the Post-Harvest process. Especially sekai-ichi apple count loss is an unsafe many time because it not critically post-harvest. Regardless of consideration, the existing hierarchical model specified post-harvest losses prevention research has deficiencies to precise and quick detection of wastage for ensuring healthy separation of agriculture surroundings. This paper suggests a “Hierarchical Model within Ontology Enabled IoT” for distinguishable healthy separation of sekai-ichi apple by using Boosted Continuous Non-spatial whole Attribute Extraction (BCNAE). Sekai-ichi apple count loss is always safe on critically post-harvest. Proposed Post-Harvest hierarchical model specified post-harvest losses prevention and deficiencies to precise and quick detection of wastage for ensuring healthy separation of agriculture surroundings. In these suggestions, the separation cognitive operation takes the three levels of processing schemes such as lower level, middle level, and higher level. Firstly, the lower level is express agreements with the dynamic functioning for maintaining the definite number of manual induces. This lower level showing an absorption with the activity of manual separation by the human reliability determination. Secondly, the middle level is an express arrangement with the dynamic functioning for reducing the overfitting and accommodate to fitting the right shape deliberation. Middle level is establishing being generalized by concentrating the time-varying features in the occurrence of a change for the worse identification. Finally, the upper level is express for features refining with the help of the function of sekai-ichi apple image segmentation connection. This interpretability process helps to make the proven position of a prominent classification in a particular fruit on the agriculture solid substance. These three processing flow constructs the ontology structure with manually collected sekai-ichi apple images from a 3D sensor. The observational consequences express that the proposed BCNAE framework recognizes a detection performance carrying out with an optimized—separation ratio for time-variant of the separation process.
Article
Full-text available
Fog Computing is a new concept made by Cisco to provide same functionalities of Cloud Computing but near to Things to enhance performance such as reduce delay and response time. Packet loss may occur on single Fog server over a huge number of messages from Things because of several factors like limited bandwidth and capacity of queues in server. In this paper, Internet of Things based Fog-to-Cloud architecture is proposed to solve the problem of packet loss on Fog server using Load Balancing and virtualization. The architecture consists of 5 layers, namely: Things, gateway, Fog, Cloud, and application. Fog layer is virtualized to specified number of Fog servers using Graphical Network Simulator-3 and VirtualBox on local physical server. Server Load Balancing router is configured to distribute the huge traffic in Weighted Round Robin technique using Message Queue Telemetry Transport protocol. Then, maximum message from Fog layer are selected and sent to Cloud layer and the rest of messages are deleted within 1 hour using our proposed Data-in-Motion technique for storage, processing, and monitoring of messages. Thus, improving the performance of the Fog layer for storage and processing of messages, as well as reducing the packet loss to half and increasing throughput to 4 times than using single Fog server.
Article
Full-text available
Collecting and preserving the smart environment logs connected to cloud storage is challenging due to the black-box nature and the multi-tenant cloud models which can pervade log secrecy and privacy. The existing work for log secrecy and confidentiality depends on cloud-assisted models, but these models are prone to multi-stakeholder collusion problems. This study proposes 'PLAF,' a holistic and automated architecture for proactive forensics in the Internet of Things (IoT) that considers the security and privacy-aware distributed edge node log preservation by tackling the multi-stakeholder issue in a fog enabled cloud. We have developed a test-bed to implement the specification, as mentioned earlier, by incorporating many state-of-the-art technologies in one place. We used Holochain to preserve log integrity, provenance, log verifiability, trust admissibility, and ownership non-repudiation. We introduced the privacy preservation automation of log probing via non-malicious command and control botnets in the container environment. For continuous and robust integration of IoT microservices, we used docker containerization technology. For secure storage and session establishment for logs validation, Paillier Homomorphic Encryption, and SSL with Curve25519 is used respectively. We performed the security and performance analysis of the proposed PLAF architecture and showed that, in stress conditions, the automatic log harvesting running in containers gives a 95% confidence interval. Moreover, we show that log preservation via Holochain can be performed on ARM-Based architectures such as Raspberry Pi in a very less amount of time when compared with RSA and blockchain.
Article
Full-text available
with the increasing popularity of Internet of Things (IoT) applications in many different areas, the round-trip delay of data processing in the cloud affect the user’s quality perception. But fortunately, fog computing aims to service users at the network edge similar to cloud services, which helps in supporting IoT in processing the data near to the end-user, especially for time-sensitive applications. It makes the resource allocation of application placement requests in a fog environment more necessary to satisfy the Quality of Experience (QoE) Influence Factors (IFs). In this paper, an IoT application placement algorithm based on the Multi-Dimensional QoE (MD-QoE) model is proposed in a fog computing environment. The algorithm is composed of two main phases. The first phase is to prioritize different IoT application placement requests depending on three main domains of IFs which are: Environment runtime context, application usage, and user expectations considering the Quality of Service (QoS) violation as a feedback. The second phase is to map and place the request to the appropriate fog node instance, depending on its proximity, computing capabilities, and expected response time. The proposed algorithm is evaluated by simulating a fog environment using iFogSim. Experimental results indicate that the proposed algorithm significantly improves the QoE in respect of application placement time, application delay, network usage, and power consumption. Therefore, the proposed algorithm can improve the overall system performance with a slight increasing in power consumption in fog control nodes.
Article
Full-text available
Future Internet of Things (FIoT) is a service concentric distributed architecture that is used by the smart city users for information sharing and access. The design of FIoT focuses in achieving reliable service and response to the growing user demands through different interoperability features. In this manuscript, concurrent service access and management framework is introduced to improve the swiftness in user concentric request processing. Based on the availability of the services and the density of the users, the concurrency in information access is provided to the users in a reliable manner. The framework incorporates convolution neural learning process in linear and differential manner for improving the access and service usage rates of the requesting users. The access sessions are differentiated for the accessible and offloaded requests to the available service providers based on the learning instances. The proposed framework is assessed using the metrics access rate, service usage rate, access delay, time lag, and failure ratio.