scispace - formally typeset
Search or ask a question
Proceedings Article•DOI•

An adaptive learning approach for fault-tolerant routing in Internet of Things

TL;DR: Mixed cross-layered and learning automata (LA)-based fault-tolerant routing protocol for IOTs, which assures successful delivery of packets even in the presence of faults between a pair of source and destination nodes is proposed.
Abstract: Internet of Things (IOT) is a wireless ad-hoc network of everyday objects collaborating and cooperating with one other in order to accomplish some shared objectives. The envisioned high degrees of association of humans with IOT nodes require equally high degrees of reliability of the network. In order to render this reliability to IOT networks, it is necessary to make them tolerant to faults. In this paper, we propose mixed cross-layered and learning automata (LA)-based fault-tolerant routing protocol for IOTs, which assures successful delivery of packets even in the presence of faults between a pair of source and destination nodes. As this work concerns IOT, the algorithm designed should be highly scalable and should be able to deliver high degrees of performance in a heterogeneous environment. The LA and cross-layer concepts adopted in the proposed approach endow this flexibility to the algorithm so that the same standard can be used across the network. It dynamically adopts itself to the changing environment and, hence, chooses the optimal action. Since energy is a major concern in IOTs, the algorithm performs energy-aware fault-tolerant routing. To save on energy, all the nodes lying in the unused path are put to sleep. Again this sleep scheduling is dynamic and adaptive. The simulation results of the proposed strategy shows an increase in the overall energy-efficiency of the network and decrease in overhead, as compared to the existing protocols we have considered as benchmarks in this study.

Content maybe subject to copyright    Report

Citations
More filters
Proceedings Article•DOI•
Lang long1•
16 Aug 2004
TL;DR: It is shown that there exists a threshold on sensor outage probability above which a distributed random access protocol (such as ALOHA) outperforms the centralized deterministic schedulers.
Abstract: Summary form only given. The layered architecture is one of the key reasons behind the explosive and continuing growth of the Internet. There are, however, special networks in which cross-layer design is appropriate and may even be necessary. Two such cases are small wireless LAN and large-scale sensor networks. We consider first the design of medium access control (MAC) for a small wireless LAN based on a multiuser physical layer. We present a complete characterization of the throughput region and present conditions under which ALOHA is optimal. Next we consider the estimation of signal field using data collected from a large scale sensor network. The impact of medium access control on estimation is examined. We show that there exists a threshold on sensor outage probability above which a distributed random access protocol (such as ALOHA) outperforms the centralized deterministic schedulers.

335 citations

Journal Article•DOI•
TL;DR: A fault-tolerant algorithm is proposed for the reliable IoT system in which gateways on the same layer in the system are linked to form a daisy chain for fault tolerance at the level, and a gateway stores the backup copy of the previous gateway positioned immediately ahead of the gateway in the da Daisy chain.

138 citations

Journal Article•DOI•
TL;DR: This paper seeks to highlight the concept of Internet of Things (IoT) in general, as well as reviewing the main challenges of the IoT environment by focusing on the recent research directions in this topic.
Abstract: In this paper, we seek to highlight the concept of Internet of Things (IoT) in general, as well as reviewing the main challenges of the IoT environment by focusing on the recent research directions in this topic. Recently, IoT has emerged as a new technology that is used to express a modern wireless telecommunication network, and it can be defined as an intelligent and interoperability node interconnected in a dynamic global infrastructure network, also it seeks to implement the connectivity concept of anything from anywhere at anytime. Indeed, the IoT environment possesses a large spectrum of challenges has a broad impact on their performance, which can be divided into two categories, namely, i) General challenges: such as communication, heterogeneity, virtualization and security; and ii) Unique challenges: such as wireless sensor network (WSN), Radio Frequency Identification (RFID), and finally Quality of service (QoS) that is considered as a common factor between both general and special challenges. In addition, this paper highlights the main applications of the IoT.

101 citations

Posted Content•
TL;DR: This paper has identified, categorized, and discussed various security challenges and state-of-the-art efforts to resolve these challenges.
Abstract: Internet of Things (IoT) is realized by the idea of free flow of information amongst various low power embedded devices that use Internet to communicate with one another. It is predicted that the IoT will be widely deployed and it will find applicability in various domains of life. Demands of IoT have lately attracted huge attention and organizations are excited about the business value of the data that will be generated by the IoT paradigm. On the other hand, IoT have various security and privacy concerns for the end users that limit its proliferation. In this paper we have identified, categorized and discussed various security challenges and state of the art efforts to resolve these challenges.

60 citations


Cites background from "An adaptive learning approach for f..."

  • ...AI based approaches to provide fault tolerance in IoT can be found in [70] where the authors proposed hybrid cross layer and fault tolerant routing protocol based on learning automata....

    [...]

Proceedings Article•DOI•
01 Jan 2019
TL;DR: The paper investigates different considerations to achieve a good degree of fault-tolerance for fog computing supporting smart city applications and proposes fault tolerance middleware services for fog Computing to help solve reliability and fault tolerance issues.
Abstract: Fog computing can provide many services to support IoT-based smart city applications. Fog computing usually consists of multiple nodes that are distributed across a smart city to enable IoT-based smart city applications such as intelligent transportation, smart energy, smart water, smart health, smart infrastructure monitoring, and smart environmental monitoring. The Fog platform will allow executing services geographically close to the IoT-based smart city applications to provide low latency, location awareness, mobility, streaming, management, and real-time support. One of the main issues with this support is the reliability and fault tolerance of the fog platform. This paper discusses the issues of reliability and fault tolerance for fog platforms supporting IoT-based smart city applications. It investigates different considerations to achieve a good degree of fault-tolerance for fog computing supporting smart city applications. The paper also proposes fault tolerance middleware services for fog computing to help solve reliability and fault tolerance issues. These services can provide a more reliable environment to operate IoT-based smart city applications.

40 citations


Cites background from "An adaptive learning approach for f..."

  • ...of cloud computing and IoT were investigated [7][8] and several middleware-based fault-tolerance solutions were proposed for both areas [9][10][11], the reliability and fault tolerance of fog computing is not yet adequately investigated....

    [...]

References
More filters
Journal Article•DOI•
TL;DR: This survey is directed to those who want to approach this complex discipline and contribute to its development, and finds that still major issues shall be faced by the research community.

12,539 citations

01 Jul 2003
TL;DR: A logging instrument contains a pulsed neutron source and a pair of radiation detectors spaced along the length of the instrument to provide an indication of formation porosity which is substantially independent of the formation salinity.
Abstract: The Ad hoc On-Demand Distance Vector (AODV) routing protocol is intended for use by mobile nodes in an ad hoc network. It offers quick adaptation to dynamic link conditions, low processing and memory overhead, low network utilization, and determines unicast routes to destinations within the ad hoc network. It uses destination sequence numbers to ensure loop freedom at all times (even in the face of anomalous delivery of routing control messages), avoiding problems (such as "counting to infinity") associated with classical distance vector protocols.

11,490 citations

Journal Article•DOI•
TL;DR: A definition for cross-layer design is suggested, the basic types of cross- layer design with examples drawn from the literature are discussed, and the initial proposals on howcross-layer interactions may be implemented are categorized.
Abstract: Of late, there has been an avalanche of cross-layer design proposals for wireless networks. A number of researchers have looked at specific aspects of network performance and, approaching cross-layer design via their interpretation of what it implies, have presented several cross-layer design proposals. These proposals involve different layers of the protocol stack, and address both cellular and ad hoc networks. There has also been work relating to the implementation of cross-layer interactions. It is high time that these various individual efforts be put into perspective and a more holistic view be taken. In this article, we take a step in that direction by presenting a survey of the literature in the area of cross-layer design, and by taking stock of the ongoing work. We suggest a definition for cross-layer design, discuss the basic types of cross-layer design with examples drawn from the literature, and categorize the initial proposals on how cross-layer interactions may be implemented. We then highlight some open challenges and new opportunities for cross-layer design. Designers presenting cross-layer design proposals can start addressing these as they move ahead.

1,057 citations


"An adaptive learning approach for f..." refers background in this paper

  • ...It will require a unique addressing system so that each device can be uniquely identified....

    [...]

Journal Article•DOI•
TL;DR: This article addresses the issue of cross-layer networking, where the physical and MAC layer knowledge of the wireless medium is shared with higher layers, in order to provide efficient methods of allocating network resources and applications over the Internet.
Abstract: As the cellular and PCS world collides with wireless LANs and Internet-based packet data, new networking approaches will support the integration of voice and data on the composite infrastructure of cellular base stations and Ethernet-based wireless access points. This article highlights some of the past accomplishments and promising research avenues for an important topic in the creation of future wireless networks. We address the issue of cross-layer networking, where the physical and MAC layer knowledge of the wireless medium is shared with higher layers, in order to provide efficient methods of allocating network resources and applications over the Internet. In essence, future networks will need to provide "impedance matching" of the instantaneous radio channel conditions and capacity needs with the traffic and congestion conditions found over the packet-based world of the Internet. Furthermore, such matching will need to be coordinated with a wide range of particular applications and user expectations, making the topic of cross-layer networking increasingly important for the evolving wireless buildout.

917 citations

Journal Article•DOI•
TL;DR: The mobile ad hoc network researchers face the challenge of achieving full functionality with good performance while linking the new technology to the rest of the Internet, and the MobileMan cross-layer architecture offers an alternative.
Abstract: Mobile ad hoc network researchers face the challenge of achieving full functionality with good performance while linking the new technology to the rest of the Internet. A strict layered design is not flexible enough to cope with the dynamics of manet environments, however, and will prevent performance optimizations. The MobileMan cross-layer architecture offers an alternative to the pure layered approach that promotes stricter local interaction among protocols in a manet node.

430 citations


"An adaptive learning approach for f..." refers background in this paper

  • ...It will require a unique addressing system so that each device can be uniquely identified....

    [...]