Energy-Aware Next-Generation Mobile Routing Chains with Fog Computing for Emerging Applications
Abstract
:1. Introduction
- i.
- Developed a reliable and load-balanced routing protocol for mobile devices using analysis of QoS parameters by exploring lightweight methods.
- ii.
- The overburden routes are excluded from routing chains and only optimal end-to-end communication is attained with the integration of fog computing.
- iii.
- Using a lightweight authentication scheme, the proposed algorithm achieves security in terms of device verification, link confidentiality, and replay attacks. Such communication ensures trust in an unpredictable environment with efficient computing strategies.
- iv.
- Using simulations, the proposed algorithm is evaluated in terms of numerous performance parameters in the comparison of existing work.
2. Related Literature
3. Proposed Load-Balanced and Energy-Efficient Mobile Routing Protocol
3.1. System Model
- i.
- Nodes have heterogeneous resources for energy, transmission power, and memory constraints.
- ii.
- Each path is assigned a unique identity.
- iii.
- After deployment, no batteries can be replaced for sensor nodes.
- iv.
- Aggregated data are transmitted to the sink node with the support of fog nodes over the unpredictable communication links
- v.
- The transmission power of the nodes can be adjusted using Received Signal Strength Indicator (RSSI).
3.2. Overview
3.3. Proposed Algorithm
3.3.1. Routing Chains and Resources Allocation (RCRA)
Algorithm 1 Network routing with efficient resource allocation |
Procedure RCRA |
compute the transmission range of nodes |
nodes are divided into regions |
assign a unique id to each region |
for (i = 1; i <= N; i++) |
do |
analyze the members’ parameters |
if node (i) is optimized then |
set as cluster head |
end if |
end for |
cluster head to fog communication |
establish routing chain using |
fog to sink communication |
end procedure |
3.3.2. Reliability-Based Lightweight Authentication (RLA)
Algorithm 2 Secured network connections with a lightweight authentication scheme |
Procedure RLA |
if has any data to transmit then |
call con_dev( ) |
end if |
is verified then |
end if |
if the session time is expired then |
call con_dev( ) |
end if |
end procedure |
4. Simulation Environment
5. Conclusions
Author Contributions
Funding
Institutional Review Board Statement
Informed Consent Statement
Data Availability Statement
Conflicts of Interest
References
- Omoniwa, B.; Hussain, R.; Javed, M.A.; Bouk, S.H.; Malik, S.A. Fog/edge computing-based IoT (FECIoT): Architecture, applications, and research issues. IEEE Internet Things J. 2018, 6, 4118–4149. [Google Scholar] [CrossRef]
- Alavi, A.H.; Jiao, P.; Buttlar, W.G.; Lajnef, N. Internet of Things-enabled smart cities: State-of-the-art and future trends. Measurement 2018, 129, 589–606. [Google Scholar] [CrossRef]
- Haseeb, K.; Islam, N.; Javed, Y.; Tariq, U. A lightweight secure and energy-efficient fog-based routing protocol for constraint sensors network. Energies 2020, 14, 89. [Google Scholar] [CrossRef]
- Sobin, C. A survey on architecture, protocols and challenges in IoT. Wirel. Pers. Commun. 2020, 112, 1383–1429. [Google Scholar] [CrossRef]
- Cui, S.; Farha, F.; Ning, H.; Zhou, Z.; Shi, F.; Daneshmand, M. A survey on the bottleneck between applications exploding and user requirements in IoT. IEEE Internet Things J. 2021, 9, 261–273. [Google Scholar] [CrossRef]
- Islam, N.; Altamimi, M.; Haseeb, K.; Siraj, M. Secure and Sustainable Predictive Framework for IoT-Based Multimedia Services Using Machine Learning. Sustainability 2021, 13, 13128. [Google Scholar] [CrossRef]
- Thangaramya, K.; Kulothungan, K.; Logambigai, R.; Selvi, M.; Ganapathy, S.; Kannan, A. Energy aware cluster and neuro-fuzzy based routing algorithm for wireless sensor networks in IoT. Comput. Netw. 2019, 151, 211–223. [Google Scholar] [CrossRef]
- Sharma, S.; Verma, V.K. An integrated exploration on internet of things and wireless sensor networks. Wirel. Pers. Commun. 2022, 124, 2735–2770. [Google Scholar] [CrossRef]
- Mehmood, A.; Lv, Z.; Lloret, J.; Umar, M.M. ELDC: An artificial neural network based energy-efficient and robust routing scheme for pollution monitoring in WSNs. IEEE Trans. Emerg. Top. Comput. 2017, 8, 106–114. [Google Scholar] [CrossRef]
- Haseeb, K.; Ahmad, I.; Awan, I.I.; Lloret, J.; Bosch, I. A machine learning SDN-enabled big data model for IoMT systems. Electronics 2021, 10, 2228. [Google Scholar] [CrossRef]
- Miglani, A.; Kumar, N.; Chamola, V.; Zeadally, S. Blockchain for Internet of Energy management: Review, solutions, and challenges. Comput. Commun. 2020, 151, 395–418. [Google Scholar] [CrossRef]
- Chen, R.; Long, W.-X.; Mao, G.; Li, C. Development trends of mobile communication systems for railways. IEEE Commun. Surv. Tutor. 2018, 20, 3131–3141. [Google Scholar] [CrossRef]
- Bai, T.; Pan, C.; Deng, Y.; Elkashlan, M.; Nallanathan, A.; Hanzo, L. Latency minimization for intelligent reflecting surface aided mobile edge computing. IEEE J. Sel. Areas Commun. 2020, 38, 2666–2682. [Google Scholar] [CrossRef]
- Chen, S.; Liang, Y.-C.; Sun, S.; Kang, S.; Cheng, W.; Peng, M. Vision, requirements, and technology trend of 6G: How to tackle the challenges of system coverage, capacity, user data-rate and movement speed. IEEE Wirel. Commun. 2020, 27, 218–228. [Google Scholar] [CrossRef] [Green Version]
- Budhiraja, I.; Tyagi, S.; Tanwar, S.; Kumar, N.; Rodrigues, J.J.P.C. Tactile Internet for smart communities in 5G: An insight for NOMA-based solutions. IEEE Trans. Ind. Inform. 2019, 15, 3104–3112. [Google Scholar] [CrossRef]
- Wang, D.; Liu, J.; Yao, D. An energy-efficient distributed adaptive cooperative routing based on reinforcement learning in wireless multimedia sensor networks. Comput. Netw. 2020, 178, 107313. [Google Scholar] [CrossRef]
- Memon, I.; Hasan, M.; Shaikh, R.; Nebhen, J.; Bakar, K.; Hossain, E.; Tunio, M. Energy-efficient fuzzy management system for internet of things connected vehicular ad hoc networks. Electronics 2021, 10, 1068. [Google Scholar] [CrossRef]
- Li, S.; Kim, J.G.; Han, D.H.; Lee, K.S. A survey of energy-efficient communication protocols with QoS guarantees in wireless multimedia sensor networks. Sensors 2019, 19, 199. [Google Scholar] [CrossRef] [Green Version]
- Wang, N.; Wang, P.; Alipour-Fanid, A.; Jiao, L.; Zeng, K. Physical-layer security of 5G wireless networks for IoT: Challenges and opportunities. IEEE Internet Things J. 2019, 6, 8169–8181. [Google Scholar] [CrossRef]
- Chen, S.; Sun, S.; Kang, S. System integration of terrestrial mobile communication and satellite communication—The trends, challenges and key technologies in B5G and 6G. China Commun. 2020, 17, 156–171. [Google Scholar] [CrossRef]
- Ahmed, A.; Abu Bakar, K.; Channa, M.I.; Haseeb, K. Countering node misbehavior attacks using trust based secure routing protocol. Telkomnika Telecommun. Comput. Electron. Control. 2015, 13, 260–268. [Google Scholar] [CrossRef] [Green Version]
- Malik, U.M.; Javed, M.A.; Zeadally, S.; Islam, S.U. Energy efficient fog computing for 6G enabled massive IoT: Recent trends and future opportunities. IEEE Internet Things J. 2021, 9, 14572–14594. [Google Scholar] [CrossRef]
- Bhat, J.R.; Alqahtani, S.A. 6G ecosystem: Current status and future perspective. IEEE Access 2021, 9, 43134–43167. [Google Scholar] [CrossRef]
- Qi, Q.; Tao, F. A smart manufacturing service system based on edge computing, fog computing, and cloud computing. IEEE Access 2019, 7, 86769–86777. [Google Scholar] [CrossRef]
- Mutlag, A.A.; Ghani, M.K.A.; Arunkumar, N.; Mohammed, M.A.; Mohd, O. Enabling technologies for fog computing in healthcare IoT systems. Future Gener. Comput. Syst. 2019, 90, 62–78. [Google Scholar] [CrossRef]
- Ghobaei-Arani, M.; Souri, A.; Rahmanian, A.A. Resource management approaches in fog computing: A comprehensive review. J. Grid Comput. 2020, 18, 1–42. [Google Scholar] [CrossRef]
- Sofla, M.S.; Kashani, M.H.; Mahdipour, E.; Mirzaee, R.F. Towards effective offloading mechanisms in fog computing. Multimed. Tools Appl. 2022, 81, 1997–2042. [Google Scholar] [CrossRef]
- Alnoman, A.; Sharma, S.K.; Ejaz, W.; Anpalagan, A. Emerging edge computing technologies for distributed IoT systems. IEEE Netw. 2019, 33, 140–147. [Google Scholar] [CrossRef] [Green Version]
- Avasalcai, C.; Murturi, I.; Dustdar, S. Edge and fog: A survey, use cases, and future challenges. Fog Comput. Theory Pract. 2020, 43–65. [Google Scholar] [CrossRef]
- Hong, C.-H.; Varghese, B. Resource management in fog/edge computing: A survey on architectures, infrastructure, and algorithms. ACM Comput. Surv. CSUR 2019, 52, 1–37. [Google Scholar] [CrossRef]
- Habibi, P.; Farhoudi, M.; Kazemian, S.; Khorsandi, S.; Leon-Garcia, A. Fog computing: A comprehensive architectural survey. IEEE Access 2020, 8, 69105–69133. [Google Scholar] [CrossRef]
- Sicari, S.; Rizzardi, A.; Coen-Porisini, A. 5G in the internet of things era: An overview on security and privacy challenges. Comput. Netw. 2020, 179, 107345. [Google Scholar] [CrossRef]
- Erhan, L.; Ndubuaku, M.; Di Mauro, M.; Song, W.; Chen, M.; Fortino, G.; Bagdasar, O.; Liotta, A. Smart anomaly detection in sensor systems: A multi-perspective review. Inf. Fusion 2021, 67, 64–79. [Google Scholar] [CrossRef]
- Abidoye, A.; Kabaso, B. Energy-efficient hierarchical routing in wireless sensor networks based on fog computing. EURASIP J. Wirel. Commun. Netw. 2021, 2021, 1–26. [Google Scholar] [CrossRef]
- Biswash, S.K.; Jayakody, D.N.K. A fog computing-based device-driven mobility management scheme for 5G networks. Sensors 2020, 20, 6017. [Google Scholar] [CrossRef] [PubMed]
- Gupta, S.; Garg, R.; Gupta, N.; Alnumay, W.S.; Ghosh, U.; Sharma, P.K. Energy-efficient dynamic homomorphic security scheme for fog computing in IoT networks. J. Inf. Secur. Appl. 2021, 58, 102768. [Google Scholar] [CrossRef]
- Fang, W.; Zhang, W.; Chen, W.; Liu, Y.; Tang, C. TMSRS: Trust management-based secure routing scheme in industrial wireless sensor network with fog computing. Wirel. Netw. 2020, 26, 3169–3182. [Google Scholar] [CrossRef]
- Babu, S.; Biswash, S.K. Fog computing–based node-to-node communication and mobility management technique for 5G networks. Trans. Emerg. Telecommun. Technol. 2019, 30, e3738. [Google Scholar] [CrossRef]
- Rajeswari, A.R.; Kulothungan, K.; Ganapathy, S.; Kannan, A. A trusted fuzzy based stable and secure routing algorithm for effective communication in mobile adhoc networks. Peer-to-Peer Netw. Appl. 2019, 12, 1076–1096. [Google Scholar] [CrossRef]
Overview and Limitations | |
---|---|
Existing solutions | Sensors and fog computing are frequently utilized for real-time emerging networks to automate the devices’ connection and communication systems. Moreover, fog nodes are increasing the scalability of constraint networks and reducing the energy consumption of interconnected devices for data transmission. However, due to the limited computing powers of the nodes, many solutions are not able to cope with robust stability for the communication systems. Furthermore, it was observed that many solutions do not offer security systems for wireless systems, and impose additional overhead for protecting network data. It was also noted that most proposed solutions have a longer delay for crucial network operations due to issues with frequent network disconnectivity. |
Proposed algorithm | In this research study, we proposed for a mobile network to offer an energy-aware solution with the combination of data trustworthiness using fog computing. Moreover, a lightweight authentication system is developed to support real-time communication in a reliable discipline. |
Parameters | Values |
---|---|
Mobile devices | 100–500 |
Network diameter | 500 m × 500 m |
Deployment | Random |
Path loss model | Free space |
Transmission range | 3 m |
Number of sinks | 3 |
Number of simulations | 35 |
Packet size | 100 bytes |
Message generation interval | 1s to 5s |
Initial energy | 2j |
Fog nodes | 10 |
Malicious nodes | 20 |
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content. |
© 2023 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
Share and Cite
Haseeb, K.; Alzahrani, F.A.; Siraj, M.; Ullah, Z.; Lloret, J. Energy-Aware Next-Generation Mobile Routing Chains with Fog Computing for Emerging Applications. Electronics 2023, 12, 574. https://doi.org/10.3390/electronics12030574
Haseeb K, Alzahrani FA, Siraj M, Ullah Z, Lloret J. Energy-Aware Next-Generation Mobile Routing Chains with Fog Computing for Emerging Applications. Electronics. 2023; 12(3):574. https://doi.org/10.3390/electronics12030574
Chicago/Turabian StyleHaseeb, Khalid, Fahad A. Alzahrani, Mohammad Siraj, Zahid Ullah, and Jaime Lloret. 2023. "Energy-Aware Next-Generation Mobile Routing Chains with Fog Computing for Emerging Applications" Electronics 12, no. 3: 574. https://doi.org/10.3390/electronics12030574
APA StyleHaseeb, K., Alzahrani, F. A., Siraj, M., Ullah, Z., & Lloret, J. (2023). Energy-Aware Next-Generation Mobile Routing Chains with Fog Computing for Emerging Applications. Electronics, 12(3), 574. https://doi.org/10.3390/electronics12030574