Ijraset Journal For Research in Applied Science and Engineering Technology
Authors: Anjali Gujar, Ruchi Kulshrestha
DOI Link: https://doi.org/10.22214/ijraset.2025.67415
Certificate: View Certificate
It is impossible to ignore this information centre segment because it is closely related to the Web of Material. Wireless sensor networks, which operate in a variety of situations, are essential to the web of Contents. They serve as the fundamental framework for the Internet of Things network in many important domains, including manufacturing operations, environmental tracking, as well as the artificially intelligent neighbourhood.Nevertheless, a multitude of obstacles which are for instance, security and technical issues arise alongside such integrated sensor networks, particularly when trying to scale them up and deploy them seamlessly. The inherent challenges of WSNs largely arise as a result of their constrained and defective nodes which can be attributed to power and computation while the bandwidth is limited. Included among the main technology challenges in WSNs guided by IoT bartered with the weighty data transmission with an energy concern cost the balance with the longevity of the deployment, as well as the security robustness against future threats. Most importantly, such issues need to be solved to eliminate any constraints for the integration of low-powered IoT devices. Energy efficiency remains an important design consideration in IoT-enabled WSNs as sensor nodes are for the most part powered by batteries with limited capacities. Network Layer Global Unique VLAN ID Confabulating features which are typical for uniform WSNs do deliver part of the answer, but few can cope with issues related to the complexity of heterogeneous.
Overview
As the Internet of Things (IoT) grows, efficient and secure data routing becomes increasingly important due to the resource constraints of IoT devices and sensitivity of transmitted data. This research addresses these concerns by exploring advanced routing strategies that combine energy efficiency, security, and trust management within Wireless Sensor Networks (WSNs), which form the backbone of many IoT systems.
Traditional routing protocols often prioritize hop count or shortest path, neglecting energy usage, trustworthiness, and adaptability.
IoT networks are dynamic, diverse, and operate under tight power and processing constraints, requiring innovative protocols for long-term operation.
Sensor nodes deplete energy quickly and are often non-replaceable, making energy-aware routing critical.
TERP is a trust-based routing model designed to improve upon conventional protocols by:
Evaluating node behavior and past interactions to establish trust.
Enhancing secure, reliable, and energy-aware data transmission.
TERP dynamically selects routes based on trust metrics and energy efficiency, ensuring data integrity and network robustness.
Phase I – Multi-path Link Routing Protocol (MLRP)
Secure data transmission through neighbor discovery, encrypted communication (key distribution), and multi-path routing.
Phase II – H-TEEN Protocol
Focuses on load balancing and energy optimization by clustering nodes, extending network lifespan.
Phase III – Data Storage and Management
Emphasizes reliable storage, capacity planning, and data redundancy, ensuring integrity and availability.
Uses fuzzy logic and Harris Hawks Optimization (HHO) to select optimal routes based on six factors:
Delay, Distance, Power consumption, QoS, Cost, and Trust.
Incorporates geographic location for routing decisions and adapts to node conditions like energy level, link quality, and congestion.
Input Parameters: Node energy, distance to destination, link quality, network congestion, and mobility.
Fuzzy Inference System: Uses rules to evaluate the best routing path (e.g., if node energy is high and link quality is strong, choose as next hop).
De-fuzzification: Converts fuzzy outputs into specific routing decisions.
This model enables intelligent, context-aware routing in dynamic IoT settings.
IoT simulators are essential for evaluating routing protocols. Popular ones include:
Cooja + Contiki OS: Ideal for WSNs with real hardware integration.
OMNeT++: Modular and extendable but lacks default IoT protocol support.
NS-3: Supports cognitive-level IoT simulation.
QualNet: High-fidelity commercial simulator, excellent for cybersecurity and performance analysis.
A fuzzy logic-based enhancement of RPL, using metrics like Residual Energy Ratio (RER), Expected Transmission Count (ETX), and load.
Dynamically adjusts routing based on load balancing and traffic optimization.
Ensures better parent node selection in DODAG (Destination-Oriented Directed Acyclic Graph) structures for efficient IoT data transmission.
Urban IoT Architectures: Enable smart governance in transportation, healthcare, waste management, and public safety.
Scalability & Adaptability: Proposed methods handle large-scale, dynamic networks with diverse requirements.
Security & Trust: Improved data confidentiality, integrity, and protection from attacks like DDoS or eavesdropping.
Energy Efficiency: Extends network lifespan by optimizing power consumption and load distribution.
This study uses the conventional RPL custom to deal with the difficulties of IoT networking protocols. The initial change that is suggested is the Fuzzy Logic-based Energy-Aware RPL (FLEA-RPL) protocol, which uses fuzzy good judgement to optimize advice selection based on ETX, Load, and RER metrics. Simulation results indicate that FLEA-RPL greatly increases solidarity in their lives. The next protocol that is presented is the IoT Multilayer Energy-Aware RPL (MCEA-RPL), in which the ecosystem is divide. By utilising fuzzy logic in conjunction with RSSI and PER data to determine the transition value, the 0.33 protocol, IoT Enhanced Mobility Support RPL (EM-RPL), enhances connectivity overall. EM-RPL rapidly identifies change channels to minimise path breakdowns along with improving data transfer when the transfer of information cost surpasses a certain amount. The outcomes of the experiment show that EM-RPL enhances node movement. Future studies should build on the current examination, particularly by tackling the usage of a limited number of sink nodes for data succession, which streamlines the neighbourhood structure, even though those standards enhance the IoTorganisation lifetime. It is crucial to control energy use across nodes as internet of things gadgets proliferate. The primary objective of this research is to enhance the RPL standard (Routing Protocol for Low-Power, Lossy Networks) by tackling issues in the IoT routing protocols. system that assesses important indicators including network load along with projected message count (ETX). Additionally, the residual energy ratio (RER) is used to identify the best data transmission method. According to the simulation results, FLEA-RPL increases energy efficiency, which enhances overall performance. Energy Awareness at Several Levels RPL (MCEA-RPL): This protocol groups networks into comparable-sized groups. It optimises path selection using fuzzy logic in accordance with RER and ETX parameters. The data collected by the cluster head node is aggregated and sent to the sink node. Simulation results indicate that MCEA-RPL significantly extends the network lifetime compared to traditional RPL protocols by balancing power consumption among nodes. Advanced Movement Support RPL (EM-RPL):. EM-RPL addresses mobility challenges in IoT networks by applying fuzzy logic to measures such as received signal strength indicator (RSSI) and packet error rate (PER) to Calculate delivery value. Simulations show that EM-RPL reduces interference and improves data transfer efficiency. Added support for moving nodes. Summary of participation: These proposed protocols share the goal of extending the lifetime of IoT networks, and increasing energy efficiency. And increasing the ability to adapt to dynamic conditions such as node movement, etc., although current research reduces the complexity of the network architecture by using a limited number of sink nodes for data collection. But future work could expand on this matter. A framework to explore various IoT applications. These findings highlight the effectiveness of combining fuzzy logic with routing protocols to address key IoT challenges, paving the way for further innovation in this area.
[1] Gaddour, O., Koubaa, A., &Abid, M. (2015). Quality-of-service-aware routing for static and mobile IPv6-based low-power and lossy sensor networks using RPL. Ad Hoc Networks, 33(1), 233–256. [2] Gara, F., Saad, L. B., Hamida, E. B., Tourancheau, B., &Ayed, R. B. (2016). An adaptive timer for RPL to handle mobility in wireless sensor networks. In 2016 International Wireless Communications and Mobile Computing Conference (IWCMC) (pp. 678–683). Paphos, Cyprus. https://doi.org/[Insert DOI if available] [3] Ghaleb, B., Al-Dubai, A. Y., Ekonomou, E., Romdhani, I., Nasser, Y., &Boukerche, A. (2018). A novel adaptive and efficient routing update scheme for low-power lossy networks in IoT. IEEE Internet of Things Journal, 5(6), 5177–5189. https://doi.org/[Insert DOI if available] [4] Latib, Z., Jamil, A., Alduais, N., Abdullah, J., Audah, L., & Alias, R. (2017). Strategies for a better performance of RPL under mobility in wireless sensor networks. AIP Conference Proceedings, 1883, Article 020002. https://doi.org/[InsertDOI if available] [5] Gubbi, J., Buyya, R., Marusic, S., &Palaniswami, M. (2013). Internet of Things (IoT): A vision, architectural elements, and future directions. Future Generation Computer Systems, 29(7), 1645–1660. https://doi.org/[Insert DOI if available] [6] Hassan, A., Alshomrani, S., Altalhi, A., & Ahsan, S. (2016). Improved routing metrics for energy-constrained interconnected devices in low-power and lossy networks. Journal of Communications and Networks, 18(3), 327–332. https://doi.org/[Insert DOI if available] [7] Goyal, S., & Chand, T. (2018). Improved trickle algorithm for routing protocol for low power and lossy networks. IEEE Sensors Journal, 18(5), 2178–2183. https://doi.org/[Insert DOI if available] [8] Heinzelman, W. B., Chandrakasan, A. P., & Balakrishnan, H. (2002). An application-specific protocol architecture for wireless microsensor networks. IEEE Transactions on Wireless Communications, 1(4), 660–670. https://doi.org/[InsertDOI if available] [9] Tomar, M. S., & Shukla, P. K. (2019). Energy-efficient gravitational search algorithm and fuzzy-based clustering with hop count-based routing for wireless sensor networks. Multimedia Tools and Applications, 78(19), 27849–27870. https://doi.org/[Insert DOI if available] [10] Iova, O., Theoleyre, F., & Noel, T. (2015). Using multiparent routing in RPL to increase the stability and the lifetime of the network. Ad Hoc Networks, 29(1), 45–62. https://doi.org/[Insert DOI if available] [11] Izquierdo, S., &Izquierdo, L. R. (2017). Mamdani fuzzy systems for modelling and simulation: A critical assessment. [Journal Name], 21(3), 1–15. https://doi.org/[Insert DOI if available] [12] Karagiannis, V., Chatzimisios, P., Vazquez-Gallego, F., & Alonso-Zarate, J. (2015). A survey on application layer protocols for the Internet of Things. Transactions on IoT and Cloud Computing, 3(1), 11–17. https://doi.org/[Insert DOI if available] [13] Khan, R., Khan, S. U., Zaheer, R., & Khan, S. (2012). Future internet: The Internet of Things architecture, possible applications, and key challenges. In 2012 10th International Conference on Frontiers of Information Technology (pp. 257–260). Islamabad, Pakistan. https://doi.org/[Insert DOI if available] [14] Harshavardhana, T., Vineeth, B., Anand, S., &Hegde, M. (2018). Power control and cross-layer design of RPL objective function for low power and lossy networks. In 2018 10th International Conference on Communication Systems and Networks (COMSNETS) (pp. 214–219). Bengaluru, India. https://doi.org/[Insert DOI if available] [15] Kharrufa, H., Al-Kashoash, H., & Kemp, A. H. (2018). A game-theoretic optimization of RPL for mobile Internet of Things applications. IEEE Sensors Journal, 18(6), 2520–2530. https://doi.org/[Insert DOI if available] [16] Kim, H.-S., Cho, H., Kim, H., &Bahk, S. (2017). DT-RPL: Diverse bidirectional traffic delivery through RPL routing protocol in low-power and lossy networks. Computer Networks, 126(1), 150–161. https://doi.org/[Insert DOI if available] [17] Kim, H.-S., Paek, J., &Bahk, S. (2015). QU-RPL: Queue utilization-based RPL for load balancing in large-scale industrial applications. In 2015 12th Annual IEEE International Conference on Sensing, Communication, and Networking (SECON) (pp. 265–273). Seattle, WA, USA. https://doi.org/[Insert DOI if available] [18] Ko, J., & Chang, M. (2015). MoMoRo: Providing mobility support for low-power wireless applications. IEEE Systems Journal, 9(2), 585–594. https://doi.org/[Insert DOI if available] [19] Lamazi, H., Benamar, N., & Jara, A. J. (2018). RPL-based networks in static and mobile environments: A performance assessment analysis. Journal of King Saud University - Computer and Information Sciences, 30(3), 320–333. https://doi.org/[Insert DOI if available] [20] Rao, U. P., Shukla, P. K., Trivedi, C., & Gupta, S. (2021). Blockchain for information security and privacy (Z. S. Shibeshi, Ed.; 1st ed.). Auerbach Publications. [21] Lamaazi, H., &Benamar, N. (2018). OF-EC: A novel energy consumption-aware objective function for RPL based on fuzzy logic. Journal of Network and Computer Applications, 117(1), 42–58. https://doi.org/[Insert DOI if available] [22] Kautoo, P., Shukla, P. K., & Silakari, S. (2014). Trust formulization in dynamic source routing protocol using SVM. International Journal of Information Technology and Computer Science (IJITCS, 6), 43–50. https://doi.org/[Insert DOI if available] [23] Butani, B., Shukla, P. K., & Silakari, S. (2014). An exhaustive survey on physical node capture attacks in WSN. International Journal of Computer Applications, 95(3), 32–39. https://doi.org/[Insert DOI if available] [24] Bhatt, R., Maheshwary, P., Shukla, P., Shukla, P., Shrivastava, M., &Changlani, S. (2020). Implementation of Fruit Fly Optimization Algorithm (FFOA) to escalate the attacking efficiency of node capture attack in Wireless Sensor Networks (WSN). Computer Communications, 149, 134–145. https://doi.org/[Insert DOI if available] [25] Gupta, R., &Shukla, P. K. (2015). Performance analysis of anti-phishing tools and study of classification data mining algorithms for a novel anti-phishing system. International Journal of Computer Network and Information Security (IJCNIS, 7)(12), 70–77. https://doi.org/[Insert DOI if available] [26] Rajawat, A. S., Bedi, P., Goyal, S. B., et al. (2021). Securing 5G-IoT device connectivity and coverage using Boltzmann machine keys generation. Mathematical Problems in Engineering, 2021, Article ID 2330049, 10 pages. https://doi.org/[Insert DOI if available] [27] Ahirwar, M. K., Shukla, P. K., &Singhai, R. (2021). CBO-IE: A data mining approach for healthcare IoT dataset using chaotic biogeography-based optimization and information entropy. Wireless Communications and Mobile Computing, 2021, Article ID 8715668, 14 pages. https://doi.org/[Insert DOI if available] [28] Gupta, M., Gupta, K. K., Khosravi, M. R., Shukla, P. K., Kautish, S., & Shankar, A. (2021). An intelligent session key-based hybrid lightweight image encryption algorithm using logistic-tent map and crossover operator for Internet of Multimedia Things. Wireless Personal Communications, 121. https://doi.org/[Insert DOI if available] [29] Khare, A., Gupta, R., & Shukla, P. K. (2022). Improving the protection of wireless sensor networks using a black hole optimization algorithm (BHOA) on the bestpossible node capture attack. In P. Nayak, S. Pal, & S. L. Peng (Eds.), IoT and Analytics for Sensor Networks (Vol. 244). Springer, Singapore. https://doi.org/[Insert DOI if available] [30] Gupta, M., Gupta, K. K., &Shukla, P. K. (2021). Session key-based novel lightweight image encryption algorithm using a hybrid of Chebyshev chaotic map and crossover. Multimedia Tools and Applications, 80(25), 33843–33863. https://doi.org/[Insert DOI if available] [31] Saxena, A. K., Sinha, S., & Shukla, P. (2018). Design and development of image security technique by using cryptography and steganography: A combined approach. International Journal of Image, Graphics and Signal Processing (IJIGSP, 10)(4), 13–21. https://doi.org/[Insert DOI if available] [32] Tarwani, N., Chourasia, U., &Shukla, P. K. (2017). Survey of cyberbullying detection on social media big data. International Journal of Advanced Research in Computer Science, 8(5), 831–835. https://doi.org/[Insert DOI if available] [33] Parwani, D., Dutta, A., Shukla, P. K., & Tahiliyani, M. (2015). Various techniques of DDoS attacks detection and prevention at cloud: A survey. Oriental Journal of Computer Science & Technology, 8, 110–120. https://doi.org/[InsertDOI if available] [34] Mahatpure, J., Motwani, M., &Shukla, P. K. (2019). An electronic prescription system powered by speech recognition, natural language processing, and blockchain technology. International Journal of Scientific & Technology Research, 8(8), 1454–1462. https://doi.org/[Insert DOI if available]
Copyright © 2025 Anjali Gujar, Ruchi Kulshrestha. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
Paper Id : IJRASET67415
Publish Date : 2025-03-11
ISSN : 2321-9653
Publisher Name : IJRASET
DOI Link : Click Here