Big Data Analytics for Improved Risk Management and Customer Segregation in Banking Applications
Volume-3 | Issue-3
Design of Deep Learning Algorithm for IoT Application by Image based Recognition
Volume-3 | Issue-3
Analysis of Serverless Computing Techniques in Cloud Software Framework
Volume-3 | Issue-3
Health Record Management System – A Web-based Application
Volume-3 | Issue-4
A Novel Signal Processing Based Driver Drowsiness Detection System
Volume-3 | Issue-3
IoT Based Monitoring and Control System using Sensors
Volume-3 | Issue-2
Secure Data Sharing Platform for Portable Social Networks with Power Saving Operation
Volume-3 | Issue-3
Review of Internet of Wearable Things and Healthcare based Computational Devices
Volume-3 | Issue-3
Stock Index Prediction with Financial News Sentiments and Technical Indicators
Volume-4 | Issue-3
Hybrid Framework on Automatic Detection and Recognition of Traffic Display board Signs
Volume-3 | Issue-3
Suspicious Human Activity Detection System
Volume-2 | Issue-4
ROBOT ASSISTED SENSING, CONTROL AND MANUFACTURE IN AUTOMOBILE INDUSTRY
Volume-1 | Issue-3
EFFICIENT RESOURCE ALLOCATION AND QOS ENHANCEMENTS OF IOT WITH FOG NETWORK
Volume-1 | Issue-2
Live Streaming Architectures for Video Data - A Review
Volume-2 | Issue-4
IoT Based Monitoring and Control System using Sensors
Volume-3 | Issue-2
Big Data Analytics for Improved Risk Management and Customer Segregation in Banking Applications
Volume-3 | Issue-3
A Novel Signal Processing Based Driver Drowsiness Detection System
Volume-3 | Issue-3
IoT BASED AIR AND SOUND POLLUTION MONITIORING SYSTEM USING MACHINE LEARNING ALGORITHMS
Volume-2 | Issue-1
Analysis of Serverless Computing Techniques in Cloud Software Framework
Volume-3 | Issue-3
Hybrid Intrusion Detection System for Internet of Things (IoT)
Volume-2 | Issue-4
Volume - 2 | Issue - 2 | june 2020
Published
09 May, 2020
The revolution caused by the communication without wires has brought in multitudes of basic modifications in the data network and the telecommunication, making the integrated networks a reality. The further advancements in the wireless communication has enabled to set personal networks using the portable devices, and are termed as the adhoc networks. The networks formed under specific circumstances or a reason could follow any one of the topology to convey the information. W ireless mesh network is the form of such network mentioned above that organized in a mesh topology. This network formed in mesh topology contains several consumers who are arranged in the distributed manner and forward the packets in a one or more than one hop model. The protocols that help in sorting out the path for sending and receiving the information are has a vital influence over the network in mesh topology as they affect the throughput, life of established links etc. Integrating the wireless mesh topology to the internet of things has improved the way of information sharing by linking multitudes tangible things around. The mesh topology wireless networks formed using the portable devices or other-wise called as the mobile networks that are connected over internet are open to security breaches as the mesh holds few nodes that are malicious. This makes the information conveyed to be either compromised or manipulated. The article in order to ensure the reliability in the transmission of the data with the heightened confidentiality and integrity in the IOT empowered mobile networks proposes a routing strategy that is robust across the consumers in mesh, the gateway and the routers. The channels across the devices in the mesh are formed based on the efficiency of the connections for the distribution of the data. The simulation process of the proposed work using the network simulator 2 shows the performance improvement of the proposed work with respect to throughput of the network, packet loss rate, packet delivery rate, latency, energy efficiency and the computational overhead.
KeywordsMobile Network Iot Adhoc Network Wireless Mesh Network Reliability Confidentiality and Integrity
Full Article PDF