IRO Journals

Journal of IoT in Social, Mobile, Analytics, and Cloud

Big Data Analytics for Improved Risk Management and Customer Segregation in Banking Applications
Volume-3 | Issue-3

Design of Deep Learning Algorithm for IoT Application by Image based Recognition
Volume-3 | Issue-3

Analysis of Serverless Computing Techniques in Cloud Software Framework
Volume-3 | Issue-3

Health Record Management System – A Web-based Application
Volume-3 | Issue-4

A Novel Signal Processing Based Driver Drowsiness Detection System
Volume-3 | Issue-3

IoT Based Monitoring and Control System using Sensors
Volume-3 | Issue-2

Secure Data Sharing Platform for Portable Social Networks with Power Saving Operation
Volume-3 | Issue-3

Review of Internet of Wearable Things and Healthcare based Computational Devices
Volume-3 | Issue-3

Stock Index Prediction with Financial News Sentiments and Technical Indicators
Volume-4 | Issue-3

Hybrid Framework on Automatic Detection and Recognition of Traffic Display board Signs
Volume-3 | Issue-3

Suspicious Human Activity Detection System
Volume-2 | Issue-4

ROBOT ASSISTED SENSING, CONTROL AND MANUFACTURE IN AUTOMOBILE INDUSTRY
Volume-1 | Issue-3

EFFICIENT RESOURCE ALLOCATION AND QOS ENHANCEMENTS OF IOT WITH FOG NETWORK
Volume-1 | Issue-2

Live Streaming Architectures for Video Data - A Review
Volume-2 | Issue-4

IoT Based Monitoring and Control System using Sensors
Volume-3 | Issue-2

Big Data Analytics for Improved Risk Management and Customer Segregation in Banking Applications
Volume-3 | Issue-3

A Novel Signal Processing Based Driver Drowsiness Detection System
Volume-3 | Issue-3

IoT BASED AIR AND SOUND POLLUTION MONITIORING SYSTEM USING MACHINE LEARNING ALGORITHMS
Volume-2 | Issue-1

Analysis of Serverless Computing Techniques in Cloud Software Framework
Volume-3 | Issue-3

Hybrid Intrusion Detection System for Internet of Things (IoT)
Volume-2 | Issue-4

Home / Archives / Volume-2 / Issue-2 / Article-4

Volume - 2 | Issue - 2 | june 2020

Reliable Data Transmission with Heightened Confidentiality and Integrity in IOT Empowered Mobile Networks
Pages: 106-117
Published
09 May, 2020
Abstract

The revolution caused by the communication without wires has brought in multitudes of basic modifications in the data network and the telecommunication, making the integrated networks a reality. The further advancements in the wireless communication has enabled to set personal networks using the portable devices, and are termed as the adhoc networks. The networks formed under specific circumstances or a reason could follow any one of the topology to convey the information. W ireless mesh network is the form of such network mentioned above that organized in a mesh topology. This network formed in mesh topology contains several consumers who are arranged in the distributed manner and forward the packets in a one or more than one hop model. The protocols that help in sorting out the path for sending and receiving the information are has a vital influence over the network in mesh topology as they affect the throughput, life of established links etc. Integrating the wireless mesh topology to the internet of things has improved the way of information sharing by linking multitudes tangible things around. The mesh topology wireless networks formed using the portable devices or other-wise called as the mobile networks that are connected over internet are open to security breaches as the mesh holds few nodes that are malicious. This makes the information conveyed to be either compromised or manipulated. The article in order to ensure the reliability in the transmission of the data with the heightened confidentiality and integrity in the IOT empowered mobile networks proposes a routing strategy that is robust across the consumers in mesh, the gateway and the routers. The channels across the devices in the mesh are formed based on the efficiency of the connections for the distribution of the data. The simulation process of the proposed work using the network simulator 2 shows the performance improvement of the proposed work with respect to throughput of the network, packet loss rate, packet delivery rate, latency, energy efficiency and the computational overhead.

Keywords

Mobile Network Iot Adhoc Network Wireless Mesh Network Reliability Confidentiality and Integrity

Full Article PDF
×

Currently, subscription is the only source of revenue. The subscription resource covers the operating expenses such as web presence, online version, pre-press preparations, and staff wages.

To access the full PDF, please complete the payment process.

Subscription Details

Category Fee
Article Access Charge
For single article (Indian)
1,200 INR
Article Access Charge
For single article (non-Indian)
15 USD
Open Access Fee (Indian) 5,000 INR
Open Access Fee (non-Indian) 80 USD
Annual Subscription Fee
For 1 Journal (Indian)
15,000 INR
Annual Subscription Fee
For 1 Journal (non-Indian)
200 USD
secure PAY INR / USD
Subscription form: click here