Smart Device-Machine-To-Machine Approach for Enhancing Communication in MANET Using IoT and Cloud

Authors

  • Erode Dhanapal Kanmani Ruby Department of Electronics and Communication Engineering, Vel Tech Rangarajan Dr. Sagunthala R&D Institute of Science and Technology Chennai-600062, Tamil Nadu, India
  • M. Pushpavalli Department of Electronics and Communication Engineering, Bannari Amman Institute of Technology, Sathyamangalam.
  • Aruliah Selvarani Department of Electronics and Communication Engineering, Panimalar Engineering College, Poonamallee, Chennai-600123, Tamil Nadu, India.
  • S. D. Thilagavathy Department of Information Technology, Adhiyamaan College of Engineering Hosur, Tamil Nadu 635109, India
  • Shruti Bhargava Choubey Dean-Innovation, Department of Electronics and Communication Engineering, Sreenidhi Institute of Science & Technology, Hyderabad-501301, Telangana, India.
  • Dondapati Harika Department of Electronics and Communication Engineering, Mohan Babu University (Erstwhile Sree Vidyanikethan Engineering College), Tirupati-517102.India.

Keywords:

IoT, MANET, Cloud Computing, Security, CH, LBCH, SD-M2M, CDTR, network security, data transmission rate

Abstract

Mobile Ad Hoc Networks (MANET) are crucial for the next generation of computing in the Internet of Things (IoT). All devices in a MANET can transfer from one location to another in any direction. Data processing and resource management can be implemented in all components by providing cloud services to users in MANET to access smart devices within the IoT framework. However, security is a major challenge for the growth of Cloud Computing (CC). Establishing a secure network connection takes time and effort. Nevertheless, embracing CC includes frequent outages, improper management, lack of resources, interoperability issues, privacy concerns, and reliability problems. Therefore, to solve this problem, they initially selected the Cluster Head (CH) to calculate the parameters of a mobility and energy node using a weighted metric. Furthermore, the Load Balancing Cluster Head (LBCH) algorithm can reduce the delay in sending and receiving packets through CH. In addition, the variation between the communication workload of each mobile node can be assessed. Then, the Velocity of the IoT node can be calculated using the Cloud Data Transfer Rate (CDTR) approach at the base of the cloud-maintained IoT integration. Finally, the proposed technique can detect the new positions using a Smart Device-Machine-To-Machine (SD-M2M) approach and enhance communication network security. Implementing the proposed method can enhance secure communication in MANET's IoT structure systematically and efficiently. Simulation results evaluate the algorithm's performance regarding channel number, throughput, data transmission rate, energy consumption, energy efficiency, network security and packet delivery rate. The proposed method attains a throughput performance of 79% and security performance of 83% in MANET..

Downloads

Download data is not yet available.

References

Tanweer Alam, "Efficient and Secure Data Transmission Approach in Cloud-MANET-IoT Integrated Framework", May 2020 SSRN Electronic Journal 12(1):2289-8131, DOI:10.2139/ssrn.3639058.a

Alnumay, W.; Ghosh, U.; Chatterjee, P. A Trust-Based Predictive Model for Mobile Ad Hoc Network in Internet of Things. Sensors 2019, 19, 1467. https://doi.org/10.3390/s19061467.

M. Stoyanova, Y. Nikoloudakis, S. Panagiotakis, E. Pallis and E. K. Markakis, "A Survey on the Internet of Things (IoT) Forensics: Challenges, Approaches, and Open Issues," in IEEE Communications Surveys & Tutorials, vol. 22, no. 2, pp. 1191-1221, Second quarter 2020, doi: 10.1109/COMST.2019.2962586.

A. Alwarafy, K. A. Al-Thelaya, M. Abdallah, J. Schneider and M. Hamdi, "A Survey on Security and Privacy Issues in Edge-Computing-Assisted Internet of Things," in IEEE Internet of Things Journal, vol. 8, no. 6, pp. 4004-4022, 15 March 15, 2021, doi: 10.1109/JIOT.2020.3015432.

W. Almuseelem, "Energy-Efficient and Security-Aware Task Offloading for Multitier Edge-Cloud Computing Systems," in IEEE Access, vol. 11, pp. 66428-66439, 2023, doi: 10.1109/ACCESS.2023.3290139.

Tanweer Alam. “Internet of Things: A Secure Cloud-Based MANET Mobility Model." International Journal of Network Security. Vol 22(3), 2020. DOI: 10.6633/IJNS.202005_22 (3).17.

Mr. Guguloth Ravi Kumar, Dr. R.M.S Parvath "The Significance of an Embedded Design of CloudMANET Framework in the Internet of Things (IoT) & 5G Networks", June 2022 | IJIRT | Volume 9 Issue 1 | ISSN: 2349-6002.

M. M. Sadeeq, N. M. Abdulkareem, S. R. M. Zeebaree, D. M. Ahmed, A. S. Sami and R. R. Zebari, "IoT and cloud computing issues challenges and opportunities: A review", Qubahan Academic J., vol. 1, no. 2, pp. 1-7, Mar. 2021.

Tanweer Alam. "A Reliable Communication Framework and Its Use in Internet of Things (IoT)." International Journal of Scientific Research in Computer Science, Engineering and Information Technology. Vol 3(5), 2018.

I. A. Alameri, "MANETS and Internet of Things: The Development of a Data Routing Algorithm," Engineering, Technology & Applied Science Research Vol. 8, No. 1, 2018, 2604-2608 2604.

Sahaya Sheela MA, Prabakaran R. Improvement of battery lifetime in software-defined network using particle swarm optimization based cluster-head gateway switch routing protocol with fuzzy rules. Computational Intelligence. 2020;36:813–823. https://doi.org/10.1111/coin.12271

AlShahwan, F. Adaptive Security Framework in Internet of Things (IoT) for Providing Mobile Cloud Computing. 2018, https://doi.org/10.5772/intechopen.75190.

Hai, T., Zhou, J., Lu, Y. et al. Enhanced security using multiple paths routine scheme in cloud-MANETs. J Cloud Comp 12, 68 (2023). https://doi.org/10.1186/s13677-023-00443-5.

Gopalakrishnan Subburayalu, Hemanand Duraivelu, Arun Prasath Raveendran, Rajesh Arunachalam, Deepika Kongara & Chitra Thangavel (2023) Cluster Based Malicious Node Detection System for Mobile Ad-Hoc Network Using ANFIS Classifier, Journal of Applied Security Research, 18:3, 402-420, DOI: 10.1080/19361610.2021.2002118.

Perumal, G., Subburayalu, G., Abbas, Q., Naqi, S. M., & Qureshi, I. (2023). VBQ-Net: A Novel Vectorization-Based Boost Quantized Network Model for Maximizing the Security Level of IoT System to Prevent Intrusions. Systems, 11(8), 436. MDPI AG. Retrieved from http://dx.doi.org/10.3390/systems11080436.

Turaka, R., Chand, S. R., Anitha, R., Prasath, R. A., Ramani, S., Kumar, H., Gopalakrishnan, S., & Farhaoui, Y. (2023). A novel approach for designing energy-efficient inexact reverse carry select adders for IoT applications. Results in Engineering, 18, 101127. https://doi.org/10.1016/j.rineng.2023.101127.

W. -Z. Zhang et al., "Secure and Optimized Load Balancing for Multitier IoT and Edge-Cloud Computing Systems," in IEEE Internet of Things Journal, vol. 8, no. 10, pp. 8119-8132, 15 May 15, 2021, doi: 10.1109/JIOT.2020.3042433.

X. Li, Q. Wang, X. Lan, X. Chen, N. Zhang and D. Chen, "Enhancing Cloud-Based IoT Security Through Trustworthy Cloud Service: An Integration of Security and Reputation Approach," in IEEE Access, vol. 7, pp. 9368-9383, 2019, doi: 10.1109/ACCESS.2018.2890432.

M. Burhan et al., "A Comprehensive Survey on the Cooperation of Fog Computing Paradigm-Based IoT Applications: Layered Architecture, Real-Time Security Issues, and Solutions," in IEEE Access, vol. 11, pp. 73303-73329, 2023, doi: 10.1109/ACCESS.2023.3294479.

F. Rezaeibagha, Y. Mu, K. Huang, L. Chen and L. Zhang, "Toward Secure Data Computation and Outsource for Multi-User Cloud-Based IoT," in IEEE Transactions on Cloud Computing, vol. 11, no. 1, pp. 217-228, 1 Jan.-March 2023, doi: 10.1109/TCC.2021.3087614.

C. Choi and J. Choi, "Ontology-Based Security Context Reasoning for Power IoT-Cloud Security Service," in IEEE Access, vol. 7, pp. 110510-110517, 2019, doi: 10.1109/ACCESS.2019.2933859.

D. K. Sharma, K. K. Bhardwaj, S. Banyal, R. Gupta, N. Gupta and L. Nkenyereye, "An Opportunistic Approach for Cloud Service-Based IoT Routing Framework Administering Data, Transaction, and Identity Security," in IEEE Internet of Things Journal, vol. 9, no. 4, pp. 2505-2512, 15 February 15, 2022, doi: 10.1109/JIOT.2021.3078810.

T. Wang, G. Zhang, A. Liu, M. Z. A. Bhuiyan and Q. Jin, "A Secure IoT Service Architecture With an Efficient Balance Dynamics Based on Cloud and Edge Computing," in IEEE Internet of Things Journal, vol. 6, no. 3, pp. 4831-4843, June 2019, doi: 10.1109/JIOT.2018.2870288.

T Shanthi, M Sahaya Sheela, JJ Jayakanth, M Karpagam, G Srividhya, TVS Gowtham Prasad,” A Novel approach Secure Routing in Wireless Sensor Networks for Safe Path Establishment of Private IoT Data Transmission,” in International Journal of Intelligent Systems and Applications in Engineering, vol. 11, pp.455-460, July. 2023.

F. Kong, Y. Zhou, B. Xia, L. Pan and L. Zhu, "A Security Reputation Model for IoT Health Data Using S-AlexNet and Dynamic Game Theory in Cloud Computing Environment," in IEEE Access, vol. 7, pp. 161822-161830, 2019, doi: 10.1109/ACCESS.2019.2950731.

C. Stergiou, K. E. Psannis, B.-G. Kim and B. Gupta, "Secure integration of IoT and cloud computing", Future Gener. Comput. Syst., vol. 78, pp. 964-975, Jan. 2018

C.-M. Chen, S. A. Chaudhry, K.-H. Yeh and M. N. Aman, "Security trust and privacy for cloud fog and Internet of Things", Secur. Commun. Netw., vol. 2022, pp. 1-2, Jan. 2022.

I. A. Elgendy, W. -Z. Zhang, Y. Zeng, H. He, Y. -C. Tian and Y. Yang, "Efficient and Secure Multi-User Multi-Task Computation Offloading for Mobile-Edge Computing in Mobile IoT Networks," in IEEE Transactions on Network and Service Management, vol. 17, no. 4, pp. 2410-2422, Dec. 2020, doi: 10.1109/TNSM.2020.3020249.

Hemanand, D., Reddy, G. ., Babu, S. S. ., Balmuri, K. R. ., Chitra, T., & Gopala Krishnan, S. (2022). An Intelligent Intrusion Detection and Classification System using the CSGO-LSVM Model for Wireless Sensor Networks (WSNs). International Journal of Intelligent Systems and Applications in Engineering, 10(3), 285–293. Retrieved from https://ijisae.org/index.php/IJISAE/article/view/2167.

G. V. Reddy et al., "Human Action Recognition Using Difference of Gaussian and Difference of Wavelet," in Big Data Mining and Analytics, vol. 6, no. 3, pp. 336-346, September 2023, doi: 10.26599/BDMA.2022.90

Satyanarayana, P., Diwakar, G., Subbayamma, B. V., Phani Sai Kumar, N. V., Arun, M., & Gopalakrishnan, S. (2023). Comparative analysis of new meta-heuristic-variants for privacy preservation in wireless mobile ad-hoc networks for IoT applications. Computer Communications, 198, 262–281. https://doi.org/10.1016/j.comcom. 2022.12.006.

X. Wang, P. Zhang, Y. Du and M. Qi, "Trust Routing Protocol Based on Cloud-Based Fuzzy Petri Net and Trust Entropy for Mobile Ad hoc Network," in IEEE Access, vol. 8, pp. 47675-47693, 2020, doi: 10.1109/ACCESS.2020. 2978143.

S. C. Y. Ng, and M. Bakhtiari, "Advanced Persistent Threat Detection Based On Network Traffic Noise Pattern and Analysis", Journal of Advanced Research in Computing and Applications, Vol. 2, No. 1. Pages 1-18, 2016.

W. M. H. Ahmad Azamuddin, Z. A. M. Noh, A. S. H. Basari and A. S. H. Shibghatullah, "Enhancement Quality of Service at ADTECBP LAN Using Traffic Policing", Journal of Advanced Research in Computing and Applications, Vol. 4, No. 1. Pages 9-19, 2016.

Khalil F Ramadan, M I Dessouky, Mohammed Abd-Elnaby, Fathi E Abd EL-Samie, "An energy-efficient MAC protocol based on node power for wireless sensor networks", Journal of Advanced Research in Computing and Applications 9, Issue 1 (2017) 1-13.

Tavanam Venkata Rao, V. Kumara Swamy, K. A. Karthigeyan, S. Gopalakrishnan, T. Kalaichelvi, & S. Koteswari. (2023). Energy Efficient Trust Based Data Communication using AODV Protocol in MANET. Journal of Advanced Research in Applied Sciences and Engineering Technology, 32(1), 390–405.

Ahmed Mohamed Anwar, Mohamed Shehata, Safa M. Gasser, & Hesham El Badawy. (2023). Handoff Scheme for 5G Mobile Networks Based on Markovian Queuing Model. Journal of Advanced Research in Applied Sciences and Engineering Technology, 30(3), 348–361.

Alam, Tanweer. "Middleware Implementation in Cloud-MANET Mobility Model for Internet of Smart Devices", International Journal of Computer Science and Network Security, 17(5), 2017. Pp. 86-94.

Alam T, Benaida M. CICS: Cloud–Internet Communication Security Framework for the Internet of Smart Devices. International Journal of Interactive Mobile Technologies (iJIM). 2018 Nov 1;12(6):74-84. DOI:https://doi.org/ 10.3991/ijim.v12i6.6776.

RM SP, Bhattacharya S, Maddikunta PKR, Somayaji SRK, Lakshmanna K, Kaluri R, Hussien A, Gadekallu TR (2020) Load balancing of energy cloud using wind-driven and firefly algorithms in the internet of everything. J Parallel Distrib Comput 142:16–26.

Kaur I, Rao A (2017) A framework to improve the network security with less mobility in MANET. Int J Comput Appl 167:21–4.

Bharany S, Badotra S, Sharma S, Rani S, Alazab M, Jhaveri RH, Gadekallu TR (2022) Energy efficient fault tolerance techniques in green cloud computing: a systematic survey and taxonomy. Sustain Energy Technol Assess 53, Part b: 102613.

Gopalakrishnan Subburayalu, Hemanand Duraivelu et al., “Cluster Based Malicious Node Detection System for Mobile Ad-Hoc Network Using ANFIS Classifier”, Journal of Applied Security Research, pp.1-20, 2021.

S.Manthandi Periannasamy, S.Gopalakrishnan et al., “Performance analysis of multicast routing using multi agent zone based mechanism in MANET”, Int. J. Nonlinear Anal. Appl. 13 (2022) No. 1, 1047–1055.

Downloads

Published

24.03.2024

How to Cite

Kanmani Ruby, E. D. ., Pushpavalli, M., Selvarani, A. ., Thilagavathy, S. D. ., Choubey, S. B. ., & Harika, D. . (2024). Smart Device-Machine-To-Machine Approach for Enhancing Communication in MANET Using IoT and Cloud. International Journal of Intelligent Systems and Applications in Engineering, 12(20s), 846–854. Retrieved from https://ijisae.org/index.php/IJISAE/article/view/5310

Issue

Section

Research Article