Monitoring Internet of Thing Networks.

Page 1


International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056

Volume: 11 Issue: 04 | Apr 2024 www.irjet.net p-ISSN: 2395-0072

Monitoring Internet of Thing Networks.

Neha Santosh Deshmukh1, MCA, YTC Satara

Asst. prof. P S Gade2, MCA, YTC Satara

Dept. of MCA, Yashoda Technical Campus Satara, Maharashtra, India

Abstract - To insure robustness, functionality and QualityofServiceinwirelessnetworks,coveringthenetwork stateandfunctioningofbumpsandlinksispivotal;especially forcritical operations.ThisPhDthesistargetsrobustnessin Internet of effects ( IoT) networks. Bias are resourceconstrained and connected via loss links; thus, fault forestallmentandrapid-fire formmechanismsarepivotal Meanwhile,coveringshouldminimizetheperformingenergy and business outflow; to leave the network unconstrained duringitsnormaloperation.Toattackthisproblem,several integratedoptimizationmodelsandeffectivealgorithmswere proposed during the course of PhD. Our conditioning and results cover the examiner placement and scheduling problems. The topology is represented by a graph, and several graph related optimization problems can be answered.We endatrealizingapolynomial-timesoluble examiner placement algorithm Likewise, to minimize the monitoringoutflowandmaximizelife,coveringplacesshould bebalancedandalternatedamongstbumps;thus,wetarget optimalexaminerscheduling.WeproposeaBinaryInteger Programming problem expression. We present the exact result as well asan effectiveheuristic. Expansive trial was conducted using different network sizes and topologies. Results confirm effective monitoring with minimal energy consumption and network outflow while balancing the monitoringpartbetweenbumps

1. Problem Statement

Low-powerWirelessPersonalAreaNetworks(LoWPANs), whichuseIPv6,makeupthemajorityofInternetofThings networks.Thesenetworksarereferredtoas6LoWPANs[1]. It's very difficult to maintain robustness in these kinds of networksbecausegadgets

are vulnerable to physical attacks because they are: (1) wirelesslyconnectedviaunreliable,lossychannels,making disconnectivity, node unreachability, and eavesdropping extremelycommon;(2)typicallyresource-constrainedwith low-powerradioandlimitedandunpredictablebandwidth; (3)susceptibletoInternetsecurityrisks;and(4)unattended and possibly deployed in hostile, highly dynamic environments[2].

Thereisaclassofreal-time,mission-criticalIoTapplications wheredatamustbeprocessedandexchangedquicklywhile adhering to stringent reliability requirements, despite the

factthatasubstantialportionoftheseapplicationsarenot time-sensitive.Forexample,safetyandcriticalcontrol

2. Research Goal and Methodology

Routestabilityistypicallyprioritizedoverfaulttolerancein routingprotocols.Theyhavetheabilitytoperformreactive route repair methods in response to certain defects. Nonetheless,thepresenceofa

For mission-critical Internet of Things applications, a proactiveapproachisgreatlypreferred,whereproblemsare detected and quickly handled. By enforcing continuous maintenance to notify network operators of defects, proactive monitoring helps to avoid disconnectivity, node unreachability,andservicefailuresfromhappeninginthe first place. Enhancing robustness and Quality of Service (QoS) could have a significant impact, leading to a rise in stakeholders'adoptionofthetechnology.

IoTdevicestypicallyhavelimitedresources,hencetheyare unable to implement sophisticated monitoring systems. When the network is operating normally, it should not be restricted. As a result, effective monitoring systems are necessary.

Tosummarizethegoalsofourmonitoringsystem,weaimat maintainingahighlyreliableIoTnetworkstructureby:

•Proactivelyandefficientlyverifyingthecorrectoperation ofnodesandlinks,

• collecting, aggregating and filtering real-time data from nodes,

• Detecting and localizing (or even predicting) abnormal eventsorfaults

• adapting to dynamic, real-time changes in the network State

Toachievethestatedgoals,ourresearchmethodologyisthe following:

• Extensive reviews to the state of the art of monitoring WirelessSensorNetworks(WSNs),

• Creation of robust models and corresponding graph optimizationproblems,

International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056

Volume: 11 Issue: 04 | Apr 2024 www.irjet.net p-ISSN: 2395-0072

•Analysisoftheproposedmodelsfromthepointofviewof complexityandresolvability,

•developingexactandapproximatedanalyticalsolutionsto therelatedgraphproblems,

• integrating the proposed models with active and/or passivenetworkmonitoringalgorithms,and

• performing extensive simulations for performance evaluations;toverifytheeffectivenessandefficiencyofthe proposedmodels.

3. PROPOSED MODEL

Selectingtheappropriatelocationforthemonitoringnodes tobeembeddedisoneofthebiggestproblemswithnetwork monitoring.Thesecomponentsoughttobeabletoanalyze themonitoringdataand/orconductmonitoringprobesinan active or passive manner. The optimal positioning of the probesisnecessarytoreducetheenergyconsumptionand monitoringburden.Moreover,inordertomeetthelowcost and energy limits of IoT devices, the monitoring computational cost, battery, and memory requirements should be kept to a minimum. Examples of network monitoringindicatethatthecorrespondingoptimizationis frequently Phar.D. [3]. We start by creating a model that seeks to locate monitors as optimally as possible while maintaining computational tractability and network coverage.

A. Fixed Parameter Tractable Monitoring Placement Algorithm

A graph can be used to represent the communication and networktopologyamongthecomponents.TheDestination OrientedDirectedAcyclicGraph(DODAG),createdbyRPL,is the graph we utilize since the suggested models ought to cooperate with RPL. Determining the bare minimum of monitoringnodesneededtomaintaintrackoneverylinkin the network is known as optimal monitor placement. The traditional Vertex Cover Problem (VCP) can be used to modeltheissue[4].VCPongenericgraphsisNP-hard.The boundary parameter in this case is the treewidth. On the otherhand,itispolynomialwhensolvedontreesandFixed Parameter Tractable (FPT) when solved on "tree-like" graphs,sometimesknownasnice-treedecompositions[5]. Withthisknowledgeinmind,wesuggestedmethods

B.Three-PhaseHeuristicforMonitoringScheduling

Sinceenergyconsumptionistheprimarylimitingfactorfor WSNsandLoW-powerLossyNetworks(LLNs),idlelistening tothechannelmightrapidlydrainbatteries.Dutycyclingis frequentlyincludedinthesekindsofnetworksinorderto increasetheirlifespan.Whendutycycling,anodestumblesa lot.

Intoasleepingstateandperiodicallywakesuptoperformits sensing,receivingortransmissionrole.Thesame periodic activitycanbeappliedtomonitoring.Itispresumedthatthe monitoring system provides information on the state of network components during prearranged periods. The criticality of the application determines the frequency of epochs. This alternative aims to distribute the monitoring workload evenly among multiple node subsets. At certain times,monitoringsubsetsawakentofulfilltheirmonitoring dutiesandreturntosleepmonitoring,allowingothernodes to take over. Duty cycling does, regrettably, have an unfavorablesideeffect:switchingbetweentheactive,sleep, andtransitorystagesrequiresadditionalenergy[7].Thus, schedulingthemonitoringdutyamongstnodesasefficiently aspossiblewhilereducingtheamountofmonitoringstate transitions is another objective for a resource-aware monitoring system. In order to deal with the monitoring role'soptimalscheduling.

4. Experimental Evaluation:

Thetrialsareperformedonaparticularcomputer with16 GigabytesofRAMand2.20GigahertzIntelCorei7 processor. Theproposedmodelsaretestedusingcases withvariable numberofbumps(|V|),links(|E|),andgraphconsistence( p).Forthethree-phasecorruption,thecasesrangedfrom50 to200bumps,and123to576links.Fortheexact result, networksizesrangedfrom25to4941bumps,andfrom150 to 11535 links. Table II presents a brief summary of experimentalresultsfortheexactresult

International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056

Volume: 11 Issue: 04 | Apr 2024 www.irjet.net p-ISSN: 2395-0072

Regardingthethree-phaseheuristic,analysisofexperiment tallresultsrevealsthatmodelingthemonitoringplacement asVCPguaranteesfullmonitoringcontent.Ouralgorithm1 in(6)is salutaryforreducingthecomputationaltimeand realizing Fixed Parameter Tractability of VCP. The proposition inPhaseII(cf.TableI)is suitabletooptimally assignobservers toplanningageswith minimalmonitoring andcommainactionenergyconsumption;dependingonthe problem’s parameters(numberofages(|T|),energylossper period(Em),andreserved_batteryk).Thechanceofresidual batteryaftermonitoring,relayingthemonitoringdatatothe BRandstatetransitionsisfurtherthan86inalltestedcases Thus,it'sconcludedthattheBIPexpressionwaseffectivein minimizingtheenergyconsumption.Results 2019IEEE5th WorldForumonInternetofeffects(WF-IoT) after working theTSPPath(Phasic),foroptimalsequencing ofVCsacross timeages,confirmbotheffectivenessand effectivenessin reducingthestatetransitions;insomecasesup to80. It’s intriguing to emphasize that when the yk is fairly small, moreVCsare neededtocoverthesamenumberofagesand schedulingforminimumenergyconsumptioniscritical.All of the mentioned conclusions are important for the relinquishment of network monitoring; particularly into charge-criticalIoT operations. Thesameconclusionsare drawn for the exact model. The optimization assured full network content and minimum energy consumption. The testedcasesforthismodelwerelargerinsizeandviscosity Yet, the residual battery no way fell below 74 in all cases. Looking at the prosecution time, it is concluded that the exactresultisefficientlyreckonedforsmall-mediumcases, while it can be time consuming for large- sized or thick networks.Nonetheless,itservesasa standard.

5. Future Research Direction

Since theIoTnetwork topology isfrequently dynamic,it's necessary to target heuristics and dynamic monitoring algorithmsinourunbornwork.Likewise,it'snecessaryto test the effectiveness and effectiveness of the proposed modelsagainstRPL’sformmechanisms.Enforcingnetwork monitoringbyusingRPL’sDAGMCobjectsrequiresthehelp ofanetworksimulator.WeplanonusingCOOJA;theContiki networksimulatorthattargetsconstrainedIoTnetworks.

6. Acknowledgment

Mohamed Saleh, Sally Kassem, Abderrahim Benslimane, Molnar(UniversityofMontpellier),and(CairoUniversity)for your ongoing assistance. She also expresses gratitude to UNESCO and the L'Oreal foundation for their support in providingherwiththe2017L'Oreal-UNESCOforWomenin ScienceLevantandEgyptFellowship.Finally,sheexpresses hergratitudeforthescholarshipfromtheFrenchInstitutein Egypt,theFrenchMinistryofForeignAffairs,andtheFrench EmbassyinEgypt.

7. Conclusion

To sum up, keeping an eye on IoT networks is criticaltoguaranteeingtheirdependability,efficiency,and security.Itaidsinthedetectionandremediationofsecurity flaws, data integrity preservation, network congestion management, and device health optimization. Monitoring frameworks need to change as IoT technologies do to accommodate a wider range of devices and data types. Stakeholdercollaborationisessentialtotheestablishmentof bestpracticesandstandards.TooptimizeIoTbenefitsand minimizerisks,itisessentialtoinvestinastrongmonitoring infrastructure. Organizations can fully utilize IoT to drive efficiency and innovation in the digital age by creating a collaborative environment, implementing sophisticated monitoring strategies, and placing a high priority on security.

8. References

[1] G. Montenegro, N. Kushalnagar, J. Hui, and D. Culler, “Transmissionofipv6packetsoverieee802.15.4networks,” Tech.Rep.,2007.

[2] Z. Sheng, S. Yang, Y. Yu, A. Vasilakos, J. Mccann, and K. Leung,“Asurveyontheietfprotocolsuitefortheinternetof things: Standards, challenges, and opportunities,” IEEE WirelessCommunications,vol.20,no.6,pp.91–98,2013.

[3] S. Agrawal, K. Naidu, and R. Rastogi, “Diagnosing linklevel anomalies using passive probes,” in INFOCOM 2007. 26th IEEE International Conference on Computer Communications.IEEE.IEEE,2007,pp.1757–1765.

[4]S.Balaji,V.Swaminathan,andK.Kannan,“Optimization ofunweightedminimumvertexcover,”WorldAcademyof Science,EngineeringandTechnology,vol.43,pp.716–729, 2010.

[5]H.Moser,“Exactalgorithmsforgeneralizationsofvertex cover,” Master’s thesis, Fakultät für Mathematik und Informatik,Friedrich-Schiller UniversitätJena,2005.

[6]B.Mostafa,A.Benslimane,E.Boureau,M.Molnar,andM. Saleh,“Distributedmonitoringin6lowpanbasedinternetof things,” in 2016 International Conference on Selected

International Research Journal of Engineering and Technology (IRJET) e-ISSN:

Volume: 11 Issue: 04 | Apr 2024 www.irjet.net p-ISSN:

Topics in Mobile Wireless Networking (MoWNeT), April 2016,pp.1–7.

[7] D. Ganesan, R. Govindan, S. Shenker, and D. Estrin, “Highly-resilient, energy-efficient multipath routing in wireless sensor networks,” ACM SIGMOBILE Mobile Computing and Communications Review, vol. 5, no. 4, pp. 11–25,2001.

[8] B. Mostafa, A. Benslimane, M. Saleh, S. Kassem, and M. Molnar, “An energy-efficient multiobjective scheduling modelformonitoringininternetofthings,”IEEEInternetof ThingsJournal,vol.5,no.3,pp.1727–1738,June2018.

Turn static files into dynamic content formats.

Create a flipbook
Issuu converts static files into: digital portfolios, online yearbooks, online catalogs, digital photo albums and more. Sign up and create your flipbook.