Convergence of Communication
Convergence of Communication
Abstract Internet of Things (IoT) is the term used to describe a network of physical
things such as mobile devices and household appliances that are embedded with elec-
tronics, software, sensors, and network connection that enables these objects to gather
and exchange data. Sensors, recognition and remote control of items are all made
possible by the Internet of Things (IoT). Once this property is combined with sensors
and actuators, it becomes an example of a cyber-physical system, which includes
technologies like intelligent power grids (grids), intelligent homes (smart homes),
smart cities (smart cities), and intelligent transportation systems (ITS). Integrating
MANET and WSN with IoT is covered in this study. Technology and protocols
needed to deploy the Internet of Things (IoT) are explored in this article.
© The Author(s), under exclusive license to Springer Nature Switzerland AG 2023 659
J. Hemanth et al. (eds.), Intelligent Cyber Physical Systems and Internet of Things,
Engineering Cyber-Physical Systems and Critical Infrastructures 3,
https://doi.org/10.1007/978-3-031-18497-0_48
660 V. Dankan Gowda et al.
1 Introduction
Kevin Ashton was the first to use the phrase “Internet of Things” in relation to supply
chain management. As a result, the concept has evolved over the last decade to include
a wider range of applications, including healthcare, utilities, transportation, and more
[1]. Computers can now discern information without any human intervention, even
if the concept of ‘Things’ has evolved throughout time with advancements in tech-
nology. One of the most significant developments in the recent decade has been the
advent of the Internet of Things concept. It is now possible to turn an isolated item
into a communicative device because to advancements in the electronics industry,
the expansion of communication protocols, and the shrinking size of devices and
transceivers. As a result, compact processing and sensor devices have become more
powerful, more energy efficient, and more capable of storing data. The exponential
growth in the number of Internet-connected sensing and computing devices known as
“smart gadgets” has been sparked by these advancements in electronics and computer
science. These devices may deliver massive services only limited by human imagina-
tion. The Internet of Things (IoT) is a network of interconnected physical devices that
communicate and exchange data with one another. Sensors, radio frequency iden-
tification devices (RFID), infrared sensors (IR), laser scanners, Global Positioning
System (GPS), wireless LANs (WLAN), and even Local Area Networks (LANs)
interfaces [2] are required for these devices. By using IPv6, these devices may be
linked to the Internet and managed from a distance. Sensors may convey data to other
devices for processing, allowing these devices to communicate with one other. An
M2M connection is one in which a machine communicates with another machine
under the IoT paradigm. The Internet of Things (IoT) relies heavily on WSN and
RFID technology [3]. In recent years, a number of studies have been conducted to
examine the increasing use of IoT applications. The integration of heterogeneous
devices, including mobile phones, laptop systems, PDAs and smart phones, wireless
sensors and network-enabled physical items, such as RFID and smart visual tags, is
also taking place. Once they’ve been integrated, these gadgets will be able to commu-
nicate easily with the Internet [4]. When it comes to building smart cities, IoT will
play a critical role in ensuring its residents have access to high-quality amenities and
services. To reach this purpose, it is necessary to gather data from a variety of sources,
analyse it, and display it in a variety of ways. This action requires a great deal of
standardisation work from several angles. It is critical that new, self-governing and
adaptable smart city services be developed that can be used in a variety of application
areas, from environmental monitoring to security control and sophisticated applica-
tions. Monitoring of natural resources such as air, water, noise, and light pollution,
as well as pollution caused by human activity such as automobiles, industries, and
traffic, are all included in environmental monitoring. Monitoring natural resources,
military operations and others are included in this category as well. Structural moni-
toring to avoid bridge and ancient building collapses, support for people living and
travelling, assistance for elderly and handicapped persons, emergency response are
all examples of security control. Smart TV, uninterrupted multimedia streaming,
Convergence of Communication Technologies with Internet of Things 661
online gaming through mobile devices, and a host of other high-tech applications
are just a few examples. In smart cities, WSNs and MANETs are key technology
for a variety of IoT applications [5]. These two technologies are more suited for
the installation of IoT applications because of their localised and self-configuration
capabilities. The implementation of WSNs and MANETs in cities for public safety,
location-aware computation, and environmental monitoring is predicted by several
studies to occur shortly [6]. Mobile phones equipped with several wireless inter-
faces (IEEE 802.11, Bluetooth, and 3G) have already begun delivering low-power
connection alternatives, such as IEEE 802.15.4, onboard. It is projected that in the
near future, most consumer gadgets will have access to low-power connection [7].
2 Literature Survey
The Internet of Things (IoT) is a network of things that are linked through the Internet.
Internet of Things (IoT) is an amalgamation of WSNs and the old Internet. Resource-
constrained sensors are the norm in WSNs, but powerful devices predominate over
them on the internet. Consequently, IoT may be described as a network of diverse
gadgets. There are many different types of Internet of Things devices, from sensors
to light bulbs to energy metres to vehicle parts to smartphones to PCs and tablets
to powerful servers to cloud computing systems. As a result, the Internet of Things
has the potential to link billions of IP-enabled devices. In [8], authors conducted a
survey on WSN assaults, and in Raymond and, authors reported their findings. WSN
DoS attacks and responses were examined in [9] by the authors. As outlined in [10],
IP-based WSN security concerns and responses were discussed in depth in this paper.
Many studies have shown that there are still many unsolved problems. An in-depth
look at the hurdles and issues linked with IoT is provided in [11] author’s work. To
name just a few, there’s interoperability, an IoT-based business model that allows
for the networking of billions of devices, security and privacy issues such as trust-
worthiness and complete end-to-end encryption, and more. Security models for IoT
technologies must be efficient, according to the study authors. A different point of
view was expressed in [12] by the authors, who pointed out that there are two primary
concerns: security and privacy. They’ve gone through the obstacles and spoken about
them from various angles. Data storage and secure processing have all been taken
into consideration while addressing security concerns, including authentication and
authorisation as well as Denial-of-Service (DoS) attack mitigation. Additionally,
while discussing privacy issues, they explored the privacy choices, identity control,
and commercial demands of passive users. Among the issues discussed in [13] are
those relating to the security of the Internet of Things. The authors made it apparent
that large-scale implementation of IoT would be fraught with difficulty and would
need careful consideration of a number of significant issues. Some of the difficul-
ties that need to be addressed include those related to secrecy and privacy, security,
heterogeneous device management, and network restrictions. By [14], the security
risks and difficulties of the Internet of Things are addressed in an innovative way [15].
662 V. Dankan Gowda et al.
As the most important goal of IoT security, data security is the basis for this catego-
rization. Sleep Deprivation (SD) attacks have been studied in a variety of MANET
setups. The Route Request (RREQ) flooding attack in MANETs was discussed in
[16]. They came up with a way to avoid the RREQ flooding attack by relying on the
monitoring of the neighbouring node. The incoming RREQs are kept in a priority
queue. If RREQs are regularly produced by a single node, their priority is degraded.
In a MANET environment, attackers may drain the power of wireless devices like
PDAs and notepads in a variety of methods, as described in [17]. The battery life
of notepads and PDAs was assessed in a series of trials done under this assault.
Finally, they observed that this assault consumes the battery’s energy faster. In order
to defeat this attack, they’ve created a power-secure architecture that makes use of
system energy monitoring and layered authentication. AODV protocol flooding may
be reduced by using the session-based history table provided in [18]. The average
number of RREQ packets is logged and compared to the discard threshold in this
method to identify flooding attacks. In order to conduct a sleep deprivation assault,
adversary nodes must become cluster chiefs, as predicted in [19]. Random vote,
round robin, and hash-based schemes are examined for minimising sleep depriva-
tion attack mitigation [20]. When a node detects an incursion, the agent then begins
a global reaction. Analyzing the behaviour of neighbouring nodes may help assess
the trustworthiness of other nodes in a MANET, as stated by [21]. An investigation
into the use of mobile agents in MANETs led to the conclusion that mobile agent-
based IDS is the best option for MANET IDS. The Dendritic Cell Algorithm is a
well-known addition to the danger project (DCA). It takes advantage of the HIS’s
innate resistance to dendritic cells. The DCA method therefore proves that it can
identify port scanning attacks, and it is thus argued that DCA may be utilised as
an algorithm for anomaly detection. A comparison of MANET and sensor network
environment features with innate immunity traits has been made by [12, 13]. This
shows that the DCA may be used to identify various forms of assaults in dynamic
settings like MANET.
To make the Internet of Things work, a few basic procedures are required [8]. In order
to implement M2M and D2D communication, two major needs must be met: The first
step is to recognise what you’re looking at. In order to be uniquely identified, objects
must have an integrated Auto-ID technology, which might be an RFID tag. Then
there’s the issue of communication. Devices using RFID tags can access the most
important information. The tags’ RFID readers may transmit the data they acquire
to the internet. In Fig. 1, you can see how RFID technology may be linked to the
Internet. Since the RFID readers are working as interpreters, they’re useful in this
situation. Radio-frequency identification tags may be passive or active. The radio
signal provided by the reader serves as the only source of power for passive tags,
which need no external power source. As a result, passive tags are far less expensive
Convergence of Communication Technologies with Internet of Things 663
than active tags. The Electronic Product Code is linked to RFID’s involvement in
the Internet of Things (IoT) (EPC). The MIT Auto-ID Center has developed EPC to
serve as a global identifier for all physical objects on the planet.
Since RFID readers function as sensor nodes and RFID technology is the wireless
connection used to gather data from tags, all the WSN techniques may be used to
RFID communication. There is a server linked to the Internet through an RFID reader
network.
The sink node in a wireless sensor network collects data from the network’s sensor
nodes and distributes it to the rest of the network’s nodes [9]. Sensor nodes are
often used to gather environmental data, such as temperature, pressure, humidity,
and proximity, among other factors. There are two ways to look at WSN in relation
to the Internet of Things: The network as a whole is a single entity, with the sink
node serving as the primary access point for all network information.
In terms of memory, compute, and battery power, WSNs are well-known to be
constrained in their capabilities. Changing or recharging the small batteries that
power WSN nodes is impractical in a WSN setup. To minimise frequent disconnec-
tions, nodes must save battery power by using efficient transmission techniques and
implementing good MAC and routing protocols. In a monitored environment, WSN
664 V. Dankan Gowda et al.
may be installed using a star, mesh, or tree topology. Because the nodes in a star
topology are all within one hop of the sink node, data gathered from several sensors
may be redundant. Such duplicate data is processed by the sink node in this case.
With the usage of a MANET communications overlay in both mesh and tree topolo-
gies, multi-hop communication may take place. One method of cutting down on the
network’s power consumption is to use a graph theory-based algorithm, such as the
minimal Connected Dominant Set (CDS) or minimum Spanning Tree. WSN has two
significant variants: For the first time, a patient’s bodily status may be monitored
and sent to the Internet through a wireless body area network (WBAN) including
a number of tiny biosensors [5]. Using the WBAN for a smart health monitoring
system is the primary use case. The Wireless Sensor and Actuator Network (WSAN)
[7] is the second option. Sinks, sensors, and actuators are the three main kinds of
nodes in WSANs. Data from sensors is sent to the sink node, which processes the
information and sends it to the backbone server through a link. Actuators are able to
respond to orders from the server and control the environment.
Because sensor nodes are small and have limited resources, establishing a WSN
connection to the Internet is very difficult. To connect WSNs to the Internet, many
designs have been suggested. In the image, these designs may be divided into three
classes [12]. Figure 2, IP over WSN, sensor over IP, and higher-level gateway overlays
(i.e., the IP layer on top of the sensor layer). IP overlay over WSN: Sensor nodes are
given a distinct IP address so that they may communicate with the Internet.
Due to the low processing capability of the sensor nodes, this strategy is not
a viable one. This problem may be alleviated in the future if efforts are made to
integrate IPv6 in sensor nodes. In this concept, each node is addressed using IPv6,
making it a true Internet of Things (IoT). Sensor nodes may be identified using the
6LoWPAN protocol established by the IETF [14].
The sink node encapsulates the detected data in IP packets before sending them
to the Internet through the sensor overlay over IP as shown in Fig. 2a. The sink node
is online, and the sensor nodes are virtualized in this design Fig. 2b. WSNs and the
Internet are treated as different networks by using a higher-level gateway overlay.
Both networks’ traffic is routed via the gateway to be redirected to the appropriate
network. Internet routing information is transformed into WSN routing techniques
by the gateway as in Fig. 2c. This is the most common way to link WSNs to the
Internet. IP packet translation is the responsibility of the adapter at the sink node.
Convergence of Communication Technologies with Internet of Things 665
Fig. 2 Three schemes of connecting WSN with the IoT a the IP overlay over WSN, b the sensor
overlay over IP, c the higher-level gateway overlays
next node on the network. Green communication, M2M, D2D, and the Internet of
Things (IoT) are examples of recent research developments that demonstrate the
value of ad hoc networks in reducing deployment and communication costs [11]. In
order to link the MANET to the Internet, many technologies have been proposed.
IP addresses are often assigned to nodes in a MANET so that data packets may be
routed between them. As a result, it is always feasible to connect the MANET to the
Internet. However, there are two major obstacles to overcome: (i) It is important for a
node in a MANET to be able to quickly determine whether an address in the network
is existent or not. (ii) Whether or not an access point or a gateway is required to
connect to the Internet should be made very clear. Any node in the network may join
or depart at any moment because to the nodes’ mobility and flexibility. This makes it
difficult to gather neighbouring nodes’ IP addresses since nodes do not know where
they are at any one moment. They use more time and message packets even if they are
accessible. Connecting MANET to the Internet may be accomplished in a number
of ways: Connecting a MANET to the Internet through an Access Point is the first
option. However, the location of the access point is an issue. It is difficult to find the
most efficient location for an access point or gateway. A mobile node might serve as
a node of entry. Using two IP addresses, one for the MANET network and one for
the Internet, is an alternative method for identifying nodes in the network. The target
gateway, on the other hand, may be movable due to the nodes’ mobility. It’s possible
that outbound connections might be disrupted if a node moves to a different gateway.
Moving nodes may also be given IP addresses using the Dynamic Host Configuring
Protocol (DHCP). Mobile nodes may now configure their IP addresses using this
manner, however the DHCP server placement issue remains unresolved. As a result,
MANET nodes may be automatically setup. In the literature, there is a lot of discus-
sion on auto-configuration strategies. Connecting mobile nodes to the Internet via
an appropriate auto-configuration approach in a MANET context is essential. From
an IoT perspective, the capacity of nodes in a WSN to sense their surroundings and
organise themselves into ad hoc networks to convey data is significant. However,
three obstacles must be solved before the IoT may be used in more diverse ways [6].
Internet of Things (IoT) connectivity support for heterogeneous devices. In order for
the Internet of Things to be a success, WSN nodes will need to have a number of
common traits and functionalities. Sensor nodes’ battery power. IoT battery deple-
tion and the necessity for a regular battery replacement pose a significant hurdle to
wider deployments, despite many efforts to improve energy efficiency at different
levels of the system. Nodes integrated with sensors and microcontrollers are too large
to be used in an IoT system that will be available to everyone. To fully exploit the
IoT’s potential, further progress must be made in the field of miniaturisation.
IoT’s WSN backbone requires two services from MANET: discovery and
announcing. Discovery enables MANET nodes to look around the WSN topology
Convergence of Communication Technologies with Internet of Things 667
and choose a suitable node to connect to. WSN nodes are notified of the exis-
tence of MANET access points via the process of announcing. To prevent exces-
sive power consumption, it is required to reduce the number of packet exchanges
between MANET and WSN. Maintaining active communication and coordination
with WSN packets for higher priority packets allows the MANET nodes to remain
idle in typical scenarios. When a higher-priority data packet is detected in the WSN,
any MANET node, which will be the cluster-head, initiates the cluster-formation
procedure. As seen in the diagram, the procedure is divided into three sections. First,
a MANET node identifies the higher priority WSN data packet as a cluster head
and broadcasts a request to join the MANET group to other nodes. In the second
phase, the MANET nodes that receive the cluster head’s request send the discovery
message to the WSN nodes to locate an entry point for IoT and MANET connection.
Nodes that receive and connect with IoT nodes might join the MANET cluster in the
third phase. The NS-2 network simulator is used to test the proposed MANET-IoT
integration protocol’s performance. MANET cluster formation is shown in Fig. 3.
Because MANET nodes are distributed across a larger region and might be placed
in places that are disconnected from the WSN, simulation findings demonstrate that
increasing the number of MANET nodes has a significant impact on the delay of
higher priority packets. Figures 4 and 5 shows this outcome.
When MANET nodes move at 1.2 m/s, our protocol delivers over 90% of packets
and drops over 60% of packets when nodes move at 12 m/s.
668 V. Dankan Gowda et al.
9 Conclusion
Wireless sensor networks (WSNs), radio frequency identification (RFID), and mobile
ad hoc networks (MANETs) are all discussed in this study (MANET). Though the
Internet of Things (IoT) is interconnected via a variety of standards, protocols, and
other means of communication, several issues remain. Further study is needed on
energy management, energy efficiency, and energy-related assaults. IoT integration
with MANET and WSN will help us build smarter environments because of the
increasing prevalence of IoT services and applications in our daily lives. However,
the IoT is also affected by the faults or challenges associated with these technologies.
To overcome the problems and secure the Internet of Things (IoT) against different
threats, new solutions must be developed.
Convergence of Communication Technologies with Internet of Things 669
References
19. Watteyne T, Vilajosana X, Kerkez B, Chraim F, Weekly K, Wang Q, Pister K (2012) OpenWSN:
a standards-based low-power wireless development environment. Trans Emerg Telecommun
Technol 23(5):480–493
20. Smys S (2019) Energy-aware security routing protocol for WSN in big-data applications. J
ISMAC 1(01):38–55
21. Chen JI, Iong Z (2020) Optimal multipath conveyance with improved survivability for WSN’s
in challenging location. J ISMAC 2(02):73–82