0% found this document useful (0 votes)
12 views12 pages

Convergence of Communication

cs
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
12 views12 pages

Convergence of Communication

cs
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 12

Convergence of Communication

Technologies with Internet of Things

V. Dankan Gowda, Suma Sira Jacob, Naziya Hussain, R. Chennappan,


and D. T. Sakhare

Abstract Internet of Things (IoT) is the term used to describe a network of physical
things such as mobile devices and household appliances that are embedded with elec-
tronics, software, sensors, and network connection that enables these objects to gather
and exchange data. Sensors, recognition and remote control of items are all made
possible by the Internet of Things (IoT). Once this property is combined with sensors
and actuators, it becomes an example of a cyber-physical system, which includes
technologies like intelligent power grids (grids), intelligent homes (smart homes),
smart cities (smart cities), and intelligent transportation systems (ITS). Integrating
MANET and WSN with IoT is covered in this study. Technology and protocols
needed to deploy the Internet of Things (IoT) are explored in this article.

Keywords Internet of things · Wireless sensor network · Protocol · Network ·


Sensor · Node

V. Dankan Gowda (B)


Department of Electronics and Communication Engineering, BMS Institute of Technology and
Mangement, Bangalore, Karnataka, India
e-mail: [email protected]
S. S. Jacob
Department of Information Technology, Sri Krishna College of Technology, Coimbatore, Tamil
Nadu, India
N. Hussain
School of Computers, IPS Academy, Indore, Madhya Pradesh, India
R. Chennappan
Department of Computer Science, Karpagam Academy of Higher Education, Coimbatore, Tamil
Nadu, India
D. T. Sakhare
Department of Chemistry, U.G., P.G. and Research Centre, Shivaji Arts Commerce and Science
College, Kannad Dist. Aurangabad, Maharashtra, India

© The Author(s), under exclusive license to Springer Nature Switzerland AG 2023 659
J. Hemanth et al. (eds.), Intelligent Cyber Physical Systems and Internet of Things,
Engineering Cyber-Physical Systems and Critical Infrastructures 3,
https://doi.org/10.1007/978-3-031-18497-0_48
660 V. Dankan Gowda et al.

1 Introduction

Kevin Ashton was the first to use the phrase “Internet of Things” in relation to supply
chain management. As a result, the concept has evolved over the last decade to include
a wider range of applications, including healthcare, utilities, transportation, and more
[1]. Computers can now discern information without any human intervention, even
if the concept of ‘Things’ has evolved throughout time with advancements in tech-
nology. One of the most significant developments in the recent decade has been the
advent of the Internet of Things concept. It is now possible to turn an isolated item
into a communicative device because to advancements in the electronics industry,
the expansion of communication protocols, and the shrinking size of devices and
transceivers. As a result, compact processing and sensor devices have become more
powerful, more energy efficient, and more capable of storing data. The exponential
growth in the number of Internet-connected sensing and computing devices known as
“smart gadgets” has been sparked by these advancements in electronics and computer
science. These devices may deliver massive services only limited by human imagina-
tion. The Internet of Things (IoT) is a network of interconnected physical devices that
communicate and exchange data with one another. Sensors, radio frequency iden-
tification devices (RFID), infrared sensors (IR), laser scanners, Global Positioning
System (GPS), wireless LANs (WLAN), and even Local Area Networks (LANs)
interfaces [2] are required for these devices. By using IPv6, these devices may be
linked to the Internet and managed from a distance. Sensors may convey data to other
devices for processing, allowing these devices to communicate with one other. An
M2M connection is one in which a machine communicates with another machine
under the IoT paradigm. The Internet of Things (IoT) relies heavily on WSN and
RFID technology [3]. In recent years, a number of studies have been conducted to
examine the increasing use of IoT applications. The integration of heterogeneous
devices, including mobile phones, laptop systems, PDAs and smart phones, wireless
sensors and network-enabled physical items, such as RFID and smart visual tags, is
also taking place. Once they’ve been integrated, these gadgets will be able to commu-
nicate easily with the Internet [4]. When it comes to building smart cities, IoT will
play a critical role in ensuring its residents have access to high-quality amenities and
services. To reach this purpose, it is necessary to gather data from a variety of sources,
analyse it, and display it in a variety of ways. This action requires a great deal of
standardisation work from several angles. It is critical that new, self-governing and
adaptable smart city services be developed that can be used in a variety of application
areas, from environmental monitoring to security control and sophisticated applica-
tions. Monitoring of natural resources such as air, water, noise, and light pollution,
as well as pollution caused by human activity such as automobiles, industries, and
traffic, are all included in environmental monitoring. Monitoring natural resources,
military operations and others are included in this category as well. Structural moni-
toring to avoid bridge and ancient building collapses, support for people living and
travelling, assistance for elderly and handicapped persons, emergency response are
all examples of security control. Smart TV, uninterrupted multimedia streaming,
Convergence of Communication Technologies with Internet of Things 661

online gaming through mobile devices, and a host of other high-tech applications
are just a few examples. In smart cities, WSNs and MANETs are key technology
for a variety of IoT applications [5]. These two technologies are more suited for
the installation of IoT applications because of their localised and self-configuration
capabilities. The implementation of WSNs and MANETs in cities for public safety,
location-aware computation, and environmental monitoring is predicted by several
studies to occur shortly [6]. Mobile phones equipped with several wireless inter-
faces (IEEE 802.11, Bluetooth, and 3G) have already begun delivering low-power
connection alternatives, such as IEEE 802.15.4, onboard. It is projected that in the
near future, most consumer gadgets will have access to low-power connection [7].

2 Literature Survey

The Internet of Things (IoT) is a network of things that are linked through the Internet.
Internet of Things (IoT) is an amalgamation of WSNs and the old Internet. Resource-
constrained sensors are the norm in WSNs, but powerful devices predominate over
them on the internet. Consequently, IoT may be described as a network of diverse
gadgets. There are many different types of Internet of Things devices, from sensors
to light bulbs to energy metres to vehicle parts to smartphones to PCs and tablets
to powerful servers to cloud computing systems. As a result, the Internet of Things
has the potential to link billions of IP-enabled devices. In [8], authors conducted a
survey on WSN assaults, and in Raymond and, authors reported their findings. WSN
DoS attacks and responses were examined in [9] by the authors. As outlined in [10],
IP-based WSN security concerns and responses were discussed in depth in this paper.
Many studies have shown that there are still many unsolved problems. An in-depth
look at the hurdles and issues linked with IoT is provided in [11] author’s work. To
name just a few, there’s interoperability, an IoT-based business model that allows
for the networking of billions of devices, security and privacy issues such as trust-
worthiness and complete end-to-end encryption, and more. Security models for IoT
technologies must be efficient, according to the study authors. A different point of
view was expressed in [12] by the authors, who pointed out that there are two primary
concerns: security and privacy. They’ve gone through the obstacles and spoken about
them from various angles. Data storage and secure processing have all been taken
into consideration while addressing security concerns, including authentication and
authorisation as well as Denial-of-Service (DoS) attack mitigation. Additionally,
while discussing privacy issues, they explored the privacy choices, identity control,
and commercial demands of passive users. Among the issues discussed in [13] are
those relating to the security of the Internet of Things. The authors made it apparent
that large-scale implementation of IoT would be fraught with difficulty and would
need careful consideration of a number of significant issues. Some of the difficul-
ties that need to be addressed include those related to secrecy and privacy, security,
heterogeneous device management, and network restrictions. By [14], the security
risks and difficulties of the Internet of Things are addressed in an innovative way [15].
662 V. Dankan Gowda et al.

As the most important goal of IoT security, data security is the basis for this catego-
rization. Sleep Deprivation (SD) attacks have been studied in a variety of MANET
setups. The Route Request (RREQ) flooding attack in MANETs was discussed in
[16]. They came up with a way to avoid the RREQ flooding attack by relying on the
monitoring of the neighbouring node. The incoming RREQs are kept in a priority
queue. If RREQs are regularly produced by a single node, their priority is degraded.
In a MANET environment, attackers may drain the power of wireless devices like
PDAs and notepads in a variety of methods, as described in [17]. The battery life
of notepads and PDAs was assessed in a series of trials done under this assault.
Finally, they observed that this assault consumes the battery’s energy faster. In order
to defeat this attack, they’ve created a power-secure architecture that makes use of
system energy monitoring and layered authentication. AODV protocol flooding may
be reduced by using the session-based history table provided in [18]. The average
number of RREQ packets is logged and compared to the discard threshold in this
method to identify flooding attacks. In order to conduct a sleep deprivation assault,
adversary nodes must become cluster chiefs, as predicted in [19]. Random vote,
round robin, and hash-based schemes are examined for minimising sleep depriva-
tion attack mitigation [20]. When a node detects an incursion, the agent then begins
a global reaction. Analyzing the behaviour of neighbouring nodes may help assess
the trustworthiness of other nodes in a MANET, as stated by [21]. An investigation
into the use of mobile agents in MANETs led to the conclusion that mobile agent-
based IDS is the best option for MANET IDS. The Dendritic Cell Algorithm is a
well-known addition to the danger project (DCA). It takes advantage of the HIS’s
innate resistance to dendritic cells. The DCA method therefore proves that it can
identify port scanning attacks, and it is thus argued that DCA may be utilised as
an algorithm for anomaly detection. A comparison of MANET and sensor network
environment features with innate immunity traits has been made by [12, 13]. This
shows that the DCA may be used to identify various forms of assaults in dynamic
settings like MANET.

3 RFID and IoT

To make the Internet of Things work, a few basic procedures are required [8]. In order
to implement M2M and D2D communication, two major needs must be met: The first
step is to recognise what you’re looking at. In order to be uniquely identified, objects
must have an integrated Auto-ID technology, which might be an RFID tag. Then
there’s the issue of communication. Devices using RFID tags can access the most
important information. The tags’ RFID readers may transmit the data they acquire
to the internet. In Fig. 1, you can see how RFID technology may be linked to the
Internet. Since the RFID readers are working as interpreters, they’re useful in this
situation. Radio-frequency identification tags may be passive or active. The radio
signal provided by the reader serves as the only source of power for passive tags,
which need no external power source. As a result, passive tags are far less expensive
Convergence of Communication Technologies with Internet of Things 663

Fig. 1 RFID technology connected with the internet

than active tags. The Electronic Product Code is linked to RFID’s involvement in
the Internet of Things (IoT) (EPC). The MIT Auto-ID Center has developed EPC to
serve as a global identifier for all physical objects on the planet.
Since RFID readers function as sensor nodes and RFID technology is the wireless
connection used to gather data from tags, all the WSN techniques may be used to
RFID communication. There is a server linked to the Internet through an RFID reader
network.

4 Wireless Sensor Network

The sink node in a wireless sensor network collects data from the network’s sensor
nodes and distributes it to the rest of the network’s nodes [9]. Sensor nodes are
often used to gather environmental data, such as temperature, pressure, humidity,
and proximity, among other factors. There are two ways to look at WSN in relation
to the Internet of Things: The network as a whole is a single entity, with the sink
node serving as the primary access point for all network information.
In terms of memory, compute, and battery power, WSNs are well-known to be
constrained in their capabilities. Changing or recharging the small batteries that
power WSN nodes is impractical in a WSN setup. To minimise frequent disconnec-
tions, nodes must save battery power by using efficient transmission techniques and
implementing good MAC and routing protocols. In a monitored environment, WSN
664 V. Dankan Gowda et al.

may be installed using a star, mesh, or tree topology. Because the nodes in a star
topology are all within one hop of the sink node, data gathered from several sensors
may be redundant. Such duplicate data is processed by the sink node in this case.
With the usage of a MANET communications overlay in both mesh and tree topolo-
gies, multi-hop communication may take place. One method of cutting down on the
network’s power consumption is to use a graph theory-based algorithm, such as the
minimal Connected Dominant Set (CDS) or minimum Spanning Tree. WSN has two
significant variants: For the first time, a patient’s bodily status may be monitored
and sent to the Internet through a wireless body area network (WBAN) including
a number of tiny biosensors [5]. Using the WBAN for a smart health monitoring
system is the primary use case. The Wireless Sensor and Actuator Network (WSAN)
[7] is the second option. Sinks, sensors, and actuators are the three main kinds of
nodes in WSANs. Data from sensors is sent to the sink node, which processes the
information and sends it to the backbone server through a link. Actuators are able to
respond to orders from the server and control the environment.

5 Connecting WSN with IoT

Because sensor nodes are small and have limited resources, establishing a WSN
connection to the Internet is very difficult. To connect WSNs to the Internet, many
designs have been suggested. In the image, these designs may be divided into three
classes [12]. Figure 2, IP over WSN, sensor over IP, and higher-level gateway overlays
(i.e., the IP layer on top of the sensor layer). IP overlay over WSN: Sensor nodes are
given a distinct IP address so that they may communicate with the Internet.
Due to the low processing capability of the sensor nodes, this strategy is not
a viable one. This problem may be alleviated in the future if efforts are made to
integrate IPv6 in sensor nodes. In this concept, each node is addressed using IPv6,
making it a true Internet of Things (IoT). Sensor nodes may be identified using the
6LoWPAN protocol established by the IETF [14].
The sink node encapsulates the detected data in IP packets before sending them
to the Internet through the sensor overlay over IP as shown in Fig. 2a. The sink node
is online, and the sensor nodes are virtualized in this design Fig. 2b. WSNs and the
Internet are treated as different networks by using a higher-level gateway overlay.
Both networks’ traffic is routed via the gateway to be redirected to the appropriate
network. Internet routing information is transformed into WSN routing techniques
by the gateway as in Fig. 2c. This is the most common way to link WSNs to the
Internet. IP packet translation is the responsibility of the adapter at the sink node.
Convergence of Communication Technologies with Internet of Things 665

Fig. 2 Three schemes of connecting WSN with the IoT a the IP overlay over WSN, b the sensor
overlay over IP, c the higher-level gateway overlays

6 Connecting MANET’s to IoT

Mobile Ad hoc Network (MANET) is a self-configurable network of mobile nodes


without the need for an infrastructure. These systems are often used in areas where
infrastructure is scarce and patching it up is not an option. MANET has already shown
its worth in disaster zones and on the battlefields. MANET’s multi-hop commu-
nication and low implementation costs make it beneficial in the above-mentioned
locations. Every node in a MANET functions as a router, forwarding packets to the
666 V. Dankan Gowda et al.

next node on the network. Green communication, M2M, D2D, and the Internet of
Things (IoT) are examples of recent research developments that demonstrate the
value of ad hoc networks in reducing deployment and communication costs [11]. In
order to link the MANET to the Internet, many technologies have been proposed.
IP addresses are often assigned to nodes in a MANET so that data packets may be
routed between them. As a result, it is always feasible to connect the MANET to the
Internet. However, there are two major obstacles to overcome: (i) It is important for a
node in a MANET to be able to quickly determine whether an address in the network
is existent or not. (ii) Whether or not an access point or a gateway is required to
connect to the Internet should be made very clear. Any node in the network may join
or depart at any moment because to the nodes’ mobility and flexibility. This makes it
difficult to gather neighbouring nodes’ IP addresses since nodes do not know where
they are at any one moment. They use more time and message packets even if they are
accessible. Connecting MANET to the Internet may be accomplished in a number
of ways: Connecting a MANET to the Internet through an Access Point is the first
option. However, the location of the access point is an issue. It is difficult to find the
most efficient location for an access point or gateway. A mobile node might serve as
a node of entry. Using two IP addresses, one for the MANET network and one for
the Internet, is an alternative method for identifying nodes in the network. The target
gateway, on the other hand, may be movable due to the nodes’ mobility. It’s possible
that outbound connections might be disrupted if a node moves to a different gateway.
Moving nodes may also be given IP addresses using the Dynamic Host Configuring
Protocol (DHCP). Mobile nodes may now configure their IP addresses using this
manner, however the DHCP server placement issue remains unresolved. As a result,
MANET nodes may be automatically setup. In the literature, there is a lot of discus-
sion on auto-configuration strategies. Connecting mobile nodes to the Internet via
an appropriate auto-configuration approach in a MANET context is essential. From
an IoT perspective, the capacity of nodes in a WSN to sense their surroundings and
organise themselves into ad hoc networks to convey data is significant. However,
three obstacles must be solved before the IoT may be used in more diverse ways [6].
Internet of Things (IoT) connectivity support for heterogeneous devices. In order for
the Internet of Things to be a success, WSN nodes will need to have a number of
common traits and functionalities. Sensor nodes’ battery power. IoT battery deple-
tion and the necessity for a regular battery replacement pose a significant hurdle to
wider deployments, despite many efforts to improve energy efficiency at different
levels of the system. Nodes integrated with sensors and microcontrollers are too large
to be used in an IoT system that will be available to everyone. To fully exploit the
IoT’s potential, further progress must be made in the field of miniaturisation.

7 MANET-IoT Integration Protocol

IoT’s WSN backbone requires two services from MANET: discovery and
announcing. Discovery enables MANET nodes to look around the WSN topology
Convergence of Communication Technologies with Internet of Things 667

Fig. 3 MANET cluster


formation

and choose a suitable node to connect to. WSN nodes are notified of the exis-
tence of MANET access points via the process of announcing. To prevent exces-
sive power consumption, it is required to reduce the number of packet exchanges
between MANET and WSN. Maintaining active communication and coordination
with WSN packets for higher priority packets allows the MANET nodes to remain
idle in typical scenarios. When a higher-priority data packet is detected in the WSN,
any MANET node, which will be the cluster-head, initiates the cluster-formation
procedure. As seen in the diagram, the procedure is divided into three sections. First,
a MANET node identifies the higher priority WSN data packet as a cluster head
and broadcasts a request to join the MANET group to other nodes. In the second
phase, the MANET nodes that receive the cluster head’s request send the discovery
message to the WSN nodes to locate an entry point for IoT and MANET connection.
Nodes that receive and connect with IoT nodes might join the MANET cluster in the
third phase. The NS-2 network simulator is used to test the proposed MANET-IoT
integration protocol’s performance. MANET cluster formation is shown in Fig. 3.

8 Results and Discussion

Because MANET nodes are distributed across a larger region and might be placed
in places that are disconnected from the WSN, simulation findings demonstrate that
increasing the number of MANET nodes has a significant impact on the delay of
higher priority packets. Figures 4 and 5 shows this outcome.
When MANET nodes move at 1.2 m/s, our protocol delivers over 90% of packets
and drops over 60% of packets when nodes move at 12 m/s.
668 V. Dankan Gowda et al.

Fig. 4 Latency ratios


between normal and higher
priority packets

Fig. 5 The ratio of packets


successfully delivered and
the speed of MANET nodes

9 Conclusion

Wireless sensor networks (WSNs), radio frequency identification (RFID), and mobile
ad hoc networks (MANETs) are all discussed in this study (MANET). Though the
Internet of Things (IoT) is interconnected via a variety of standards, protocols, and
other means of communication, several issues remain. Further study is needed on
energy management, energy efficiency, and energy-related assaults. IoT integration
with MANET and WSN will help us build smarter environments because of the
increasing prevalence of IoT services and applications in our daily lives. However,
the IoT is also affected by the faults or challenges associated with these technologies.
To overcome the problems and secure the Internet of Things (IoT) against different
threats, new solutions must be developed.
Convergence of Communication Technologies with Internet of Things 669

References

1. Andrea I, Chrysostomou C, Hadjichristofi G (2015) Internet of things: security vulnerabilities


and challenges. In: Computers and communication (ISCC), IEEE symposium. IEEE, pp 180–
187
2. Atakli IM, Hu H, Chen Y, Ku WS, Su Z (2008) Malicious node detection in wireless sensor
networks using weighted trust evaluation. In: Proceedings of the 2008 Spring simulation multi
conference. Society for Computer Simulation International, pp 836–843
3. Penna M, Jijesh JJ, Shivashankar (2017) Design and implementation of automatic medicine
dispensing machine. In: RTEICT 2017—2nd IEEE international conference on recent trends in
electronics, information and communication technology, proceedings, pp 1962–1966. https://
doi.org/10.1109/RTEICT.2017.8256941
4. Christin D, Reinhardt A, Mogre PS, Steinmetz R (2009) Wireless sensor networks and the
internet of things: selected challenges. In: Proceedings of the 8th GI/ITG KuVS Fachespräch
Drahtlose sensornetze, pp 31–34
5. Kishore DV, Shivashankar, Mehta S (2016) MANET topology for disaster management using
wireless sensor network. In: International conference on communication and signal processing,
ICCSP 2016, pp 0736–0740. https://doi.org/10.1109/ICCSP.2016.7754242
6. Varun CA, Shivashankar, Sahana M, Varun RS, Rajesh T (2018) Implementation of swarm
intelligence in obstacle avoidance. In: RTEICT 2017—2nd IEEE international conference on
recent trends in electronics, information and communication technology, proceedings, 2017,
pp 525–528. https://doi.org/10.1109/RTEICT.2017.8256652
7. Sridhara SB, Naveen KB, Ramesha M, Pai GN (2020) Internet of things: internet revolution,
impact, technology road map and features. Adv Math Sci J 9(7):4405–4414. https://doi.org/
10.37418/amsj.9.7.11
8. Ramesh Naidu P, Guruprasad N (2020) Design and implementation of cryptcloud system for
securing files in cloud. Adv Math Sci J 9(7):4485–4493. https://doi.org/10.37418/amsj.9.7.17
9. Isaiadis S, Getov V (2005) Integrating mobile devices into the grid: design considerations
and evaluation. In: European conference on parallel processing LNCS, vol 3648. Springer, pp
1080–1088
10. Kasinathan P, Costamagna G, Khaleel H, Pastrone C, Spirito MA (2013) DEMO: an IDS
framework for internet of things empowered by 6LoWPAN. In: Proceedings of the 2013 ACM
SIGSAC conference on computer and communications security. ACM, pp 1337–1340
11. Ramesha M, Sridhara SB, Naveena Pai G (2020) FPGA implementation of low power high
speed BTED algorithm for 8 bit error correction in cryptography system. Int J Emerg Trends
Eng Res 8(7):3893–3897. https://doi.org/10.30534/ijeter/2020/158872020
12. Kolias C, Kolias V, Kambourakis G (2017) TermID: a distributed swarm intelligence-based
approach for wireless intrusion detection. Int J Inf Secur 16(4):401–416
13. Lazarescu MT (2013) Design of a WSN platform for long-term environmental monitoring for
IoT applications. IEEE J Emerg Sel Top Circ Syst 3(1):45–54
14. Mamun MSI, Kabir AFM (2012) Hierarchical design based intrusion detection system for
wireless ad hoc network. Int J Netw Secur Appl (IJNSA) 2(3):102–117
15. Nadeem A, Howarth MP (2013) A survey of MANET intrusion detection and prevention
approaches for network layer attacks. IEEE Commun Surv Tutorials 15(4):2027–2045
16. Reina DG, Toral SL, Barrero F, Bessis N, Asimakopoulou E (2013) The role of ad hoc
networks in the internet of things: a case scenario for smart environments. In: Internet of
things and inter-cooperative computational technologies for collective intelligence. Springer,
Berlin, Heidelberg, pp 89–113
17. Schumacher C, Kushalnagar N, Montenegro G (2007) IPv6 over low-power wireless personal
area networks (6LoWPANs): overview, assumptions, problem statement, and goals. Available:
https://tools.ietf.org/html/rfc4919
18. Verma SS, Patel RB, Lenka SK (2015) Investigating variable time flood request impact over
QOS in MANET. Procedia Comput Sci 57:1036–1041
670 V. Dankan Gowda et al.

19. Watteyne T, Vilajosana X, Kerkez B, Chraim F, Weekly K, Wang Q, Pister K (2012) OpenWSN:
a standards-based low-power wireless development environment. Trans Emerg Telecommun
Technol 23(5):480–493
20. Smys S (2019) Energy-aware security routing protocol for WSN in big-data applications. J
ISMAC 1(01):38–55
21. Chen JI, Iong Z (2020) Optimal multipath conveyance with improved survivability for WSN’s
in challenging location. J ISMAC 2(02):73–82

You might also like