Ijraset Journal For Research in Applied Science and Engineering Technology
Authors: Dr. Manishankar S, Chaya A, Likitha H K, Sinchana H S
DOI Link: https://doi.org/10.22214/ijraset.2022.44560
Certificate: View Certificate
The Internet of Things is the most recent & rapidly developing technology of our time. This paper proposed the idea of Hybrid-cellular Wireless sensor network architecture which uses a functioning cellular base station. A routing scheme is also proposed for the emergency scenario that systematically utilizes accessible devices. Wireless devices are taken into account in the proposed emergency communication architecture, which also supports WSN\'s self-organizing function. Within a few hours, this communication model may be put up in disaster-stricken communities. The proposed methodology can achieve the goal of establishing communication between trapped and rescue volunteers by providing emergency communication infrastructure. A control station serves as an accurate information system for rescue teams\' mobility, organization, and coordination. To assure their legality, a secure communication environment with rigorous IP address registration is provided. This approach provides a solution to issues such as calamity recovery networks and trapped victim search and rescue operations
In today's Information and Communications Technology (ICT) world, the Internet of Things is the newest & most rising trend (ICT). IoT applications include crisis response, army surveillance, medical, intelligent agriculture, and robotic systems, to name a few. The specification of IoT is substantially grounded on distributed and centralized communication architecture. Clients in the dispersed infrastructure extract data directly from deployed sensor devices, whereas sensor devices in the deployed area process information gathered via a concerned base station in the centralized infrastructure.
Multiple Wireless Sensor Networks collaborate to provide IoT connections to end-users. As a result, managing the identification of sensor devices in a secure environment is critical for these networks. Device-to-Device (D2D) security is a suitable option in these situations because WSN and IoT infrastructure development is time-consuming in most circumstances in the existing literature. D2D authenticating techniques for IoT are mostly utilized in a centralized manner. Legitimate sensor devices, on the other hand, rely on third parties, such as authentication servers, for their verification and network involvement in a centralized Device to the Device authentication system. Because all participating devices rely on a single point for authentication, this raises the risk of failure. In these networks, decentralized authentication overcomes the problem. Authentication of IoT networks connected as multi-WSNs is a new decentralized solution to solving the challenges associated with centralized authentication.
Because of its constant emergence, the interconnection of multi-WSNs poses several issues in terms of network security, design, longevity, and communication metrics. Data confidentiality and integrity are critical features of IoT networks because they ensure the network's validity. To provide a secure communication infrastructure, The topological structure and routing protocols are the primary focus of D2D authentication of IoT networks connecting multi-WSNs.
Currently available methods rely on centralized communication and peer-to-peer authentication via nodes, servers, or base stations.
During this research, this article provides a decentralized solution to tackle the authentication issue in these networks, which is effective in terms of many authentication types.
15. An edge node approach is presented in this study to cope with the difficulties of jamming attacks in WSNs. In the deployed area of WSN, three edge nodes with different transmission frequencies within the same bandwidth are used. The jamming attack channel in the WSN broadcast medium may be detected thanks to the sender signal's varying transmission frequencies and Round-Trip Time (RTT). If one of the transmission channels is jammed by an attacker, the other two edge nodes test media serviceability by sending data from the same deployed WSNs. Furthermore, due to high-frequency interference in nearby channels, the RTT of the surrounding channel is interrupted from its intended length of time, suggesting a network jamming assault.
III. METHODOLOGY
Fig 1 shows the system architecture of the proposed project. System architecture consists of Base Station, cluster head and sensor devices.
A. Base Station(BS)
Base Station will add the user profile , registers cluster head and sensor devices. Base station can also view all the registered CH .
B. Cluster Head(CH)
First cluster head should register itself by providing all the details such as user name, password, Base Station IP Address and port number, then registration request will be sent to the Base Station, BS will authenticate and send registration successful to only authorized CH , CH can also view all the registered sensor devices.
C. Sensor Devices
Devices registers itself by providing user name and password , registration request will be sent to the Base Station , BS will authenticate and send registration successful to only authorized users. Device should connect to any of the nearest cluster head to communicate with other devices, all the available CH information will be displayed to the user.
Author |
Year |
Approach |
Description |
Himanshu Verma, Naveen Chauhan |
2015 |
Hybrid cellular-MANET architecture |
In disaster-stricken areas, a hybrid cellular mobile ad hoc network (hybrid cellular MANET) can provide a solution for emergency communication systems. |
Mohammed El-hajj, Maroun Chamoun |
2017 |
IoT authentication protocols using multiple criteria, |
This study examines the many authentication systems offered in the literature. It compares and analyses existing authentication systems using a multi-criteria categorization, highlighting their benefits and drawbacks. |
Quan Wang & Pengfei Yang |
2018 |
Energy efficiency and life span of WSN |
The EECSR algorithm can effectively save energy and extend the network lifetime. |
Subho Shankar, Somanath Tripathy |
2018 |
Secure Multicast in an IoT environment and fewer resources |
Authors have proposed an S-CPABE technique based on CPABE, aimed specifically toward multicast demands and tailored to the IoT context. |
Junqin Huang & Singh Kang |
2019 |
Credit-based proof of work |
This paper implements the system on a Raspberry Pi and ran a case study factory, resulting in the conclusion that the PoW technique and data access control are secure and efficient in IoT. |
Wenxiu Ding & Xuyang Jing |
2019 |
Data fusion |
This paper is based on the need for IoT data fusion as a metric to assess and compare the results of current data fusion methods approaches. Based on the extensive survey, also outlines open research questions, highlights interesting future research areas, and identifies research challenges. |
Jianyu Wang & Austin Hester |
2019 |
EdgeChain Prototype Environment Setup, Blockchain Transactions |
The authors discussed the EdgeChain framework's architecture and prototype, which is a unique Edge-IoT framework based on blockchain and smart contracts. |
This study presents a hybrid cellular-WSN-based emergency communication infrastructure for disaster-affected regions that may be utilized by both trapped survivors and rescue personnel in this project. In the event that if all other communication networks are unavailable, this suggested system includes an emergency communication infrastructure. For message delivery in this location, we also developed a mobility-aware, self-organized reactive routing scenario. The proposed solution covers both issues, namely the disaster recovery network and the search-and-rescue- and - rescue operation for people stuck in buildings.
[1] Muhammad Adil “Hash-MAC-DSDV: Mutual Authentication for Intelligent IoT-Based Cyber-Physical Systems” IEEE JOURNAL OF INTERNET OF THINGS , July 2021.. [2] Jianli Pan & Jianyu Wang ” EdgeChain: An Edge-IoT Framework and Prototype Based on Blockchain and Smart Contracts” IEEE INTERNET OF THINGS JOURNAL, VOL. 6, NO. 3, JUNE 2019.. [3] Srividya.R and Ramesh.B,” Design of Biometric Authentication Technique for MANET Based Emergency Response System” IEEE, 2015. [4] Quan Wang & Deyu Lin, “An Energy-Efficient Compressive Sensing-Based Clustering Routing Protocol for WSNs“ .IEEE Sensor Journal ,2018. [5] Md Jubayer al Mahmod and Ujjwal Guin.” A Robust, Low-Cost and Secure Authentication Scheme for IoT Applications” Cryptography 2020, [6] Junqin Huang,Linghe Kong,” A Robust, Low-Cost and Secure Authentication Scheme for IoT Applications” IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, VOL. 15, NO. 6, JUNE 2019 [7] Subho Shankar Basu and Somanath Tripathy,” Securing Multicast Group Communication in IoT-Enabled Systems” IETE TECHNICAL REVIEW, 2018. [8] Borja Bordel Sánchez, Ramón AlcarriaRozi ,” Managing Wireless Communications for Emergency Situations in Urban Environments through Cyber-Physical Systems and 5G Technologies” Electronics 2020,. [9] Chenyu Zheng & Lijun Chen” Hybrid Cellular-MANETs in Practice: A Microblogging System for Smart Devices in Disaster Areas” IEEE 2014. [10] K.Kartheeban ”Secure Multicast Group Communications for IoT Applications using WSN” Proceedings of the Third International Conference on Smart Systems and Inventive Technology (ICSSIT 2020) . [11] Himanshu Verma & Naveen Chauhan” MANET Based Emergency Communication System for Natural Disasters“ International Conference on Computing, Communication and Automation (ICCCA2015). [12] Kaljot Sharma & Darpan Anand ” A Disaster Management Framework Using Internet of Things-Based Interconnected Devices” Hindawi Mathematical Problems in Engineering, 2021.. [13] Mohammed El-hajj & Maroun Chamoun,” Analysis of Authentication Techniques in Internet of Things (IoT)” IEEE Conference Paper October 2017 . [14] Wenxiu Ding1 & Xuyang Jing,” A Survey on Data Fusion in Internet of Things: Towards Secure and Privacy-Preserving Fusion” Information Fusion, 2019. [15] Muhammad Adil, Mohammed Amin Almaiah ,” An Anonymous Channel Categorization Scheme of Edge Nodes to Detect Jamming Attacks in Wireless Sensor Networks” MDPI Journal , Sensors 2020
Copyright © 2022 Dr. Manishankar S, Chaya A, Likitha H K, Sinchana H S. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
Paper Id : IJRASET44560
Publish Date : 2022-06-19
ISSN : 2321-9653
Publisher Name : IJRASET
DOI Link : Click Here