SlideShare a Scribd company logo
DEPARTMENT OF ECE, MRITS
A Seminar on
A ROBUST AND TRUSTED SCHEME FOR IOT-BASED
MOBILE WIRELESS MESH NETWORKS
Presented By
BADDAM AJENDER REDDY
19S11A0403
DEPARTMENT OF ECE, MRITS
CONTENTS
 Introduction
 History Related to the Topic
 Working
 Applications
 Advantages
 Disadvantages
 Future Scope
 Conclusion
 References
DEPARTMENT OF ECE, MRITS
INTRODUCTION
 Wireless mesh networks consist of a huge number
of mesh clients, mesh routers, and gateway devices
to cover a large region for information gathering
and forwarding.
 RTS is a robust and trusted routing scheme
between mesh clients based on IoT devices to
prevent network threats and to achieve efficient
data transmission system.
 This scheme aims to accomplish data reliability,
confidentiality, authenticity.
DEPARTMENT OF ECE, MRITS
HISTORY RELATED TO THE TOPIC
In 2018, the authors proposed a weighted trusted routing
mechanism to identify and exclude the malicious nodes in the
routing paths for wireless mesh networks.
 Based on the studies, it has been noticed that the majority of
work has identified the significance of security for wireless
mesh networks.
 Thus, a robust and trusted scheme has been designed to
prevent security attacks for IoT-based mobile wireless mesh
networks, which results in improving the network stability and
data privacy.
DEPARTMENT OF ECE, MRITS
 The main aim of the proposed scheme is to design and develop the
major techniques for achieving efficient, secured and robust routing in
wireless mesh networks.
 The proposed scheme consists of two main functional techniques :
A. The network infrastructure of mobile mesh clients.
B. Secure and Trusted data routing between mesh devices.
WORKING
DEPARTMENT OF ECE, MRITS
FUNCTIONAL TECHNIQUES OF RTS
 In this technique, all mesh clients, routers, and
gateway devices are interconnected via a multi-
hop model as shown in Fig.1.
 All mesh clients including mesh routers flood
their position data to construct the initial routing
table. The routing table is updated each time
when any new mesh client joins or existing one
leaves the network infrastructure.
FIG 1. The architecture of wireless mesh networks.
A.THE NETWORK INFRASTRUCTURE OF MOBILE MESH CLIENTS:
DEPARTMENT OF ECE, MRITS
At the start, each mesh node advertises
a LOC message in the field that
comprises two sub-fields.
 They are node’s unique ID and its
current position.
 Each mesh client generate routing
tables upon receiving the data.
 And Mesh clients can transmit their
data packets directly.
DEPARTMENT OF ECE, MRITS
DEPARTMENT OF ECE, MRITS
B. SECUREAND TRUSTED DATAROUTING BETWEEN MESH DEVICES
DEPARTMENT OF ECE, MRITS
 The proposed technique presents a fully secure and trusted data
routing strategy.
 For secure data routing between the devices, an asymmetric-
based RSA cryptographic technique is proposed which uses public-
private keys.
The private key performs a vital role in data authentication and it
must be kept secure from malicious and authorized nodes in the
network.
In the proposed security technique, there are two topological
scenarios: fully connected network topology and partially
connected network topology.
DEPARTMENT OF ECE, MRITS
APPLICATIONS
1. LIGHTING: In lighting, wireless communication is needed for two reasons:
To control lamps, and
To collect data from the lamps, such as temperature or other
usage information.
Lighting systems needs robustness. The network should still operate even if
parts of the system goes out.
2. IN-DOOR ENVIRONMENTS: For large in-door environments need to
cover large areas. Examples are:
 Warehouses
 Retail Stores
DEPARTMENT OF ECE, MRITS
APPLICATIONS
3. ELECTRICITY:
 Electricity and utility systems cover large areas that are often not served by
cellular networks.
4. CITY-SCALE SYSTEMS:
There are several IoT systems in use at the scale of a city.
They are:
 Street Lightning
 Air Pollution monitoring
 Trash can usage monitoring
DEPARTMENT OF ECE, MRITS
ADVANTAGES
Self-configuring – In a mesh network, the nodes configure
themselves and It is cost effective.
Self-healing – Self-healing here is that the network is more
capable of recovering from a failure on its own.
Great coverage –In a mesh network, we can easily change the size
of the network, we can simply add and remove nodes from the
network .
DEPARTMENT OF ECE, MRITS
DISADVANTAGES
 For every Hop the system makes, a little bit of speed is lost.
 To cover a large amount of space, more modules are required.
 The power consumption is very high.
Difficult to set up Initially.
 The high risk of redundant connections.
DEPARTMENT OF ECE, MRITS
FUTURE SCOPE
In future, the proposed scheme will be further enhanced to tackle
other DOS threats, which crack network set-ups and functionalities.
Also, the proposed scheme may include some machine learning-
based optimization techniques to make the mesh clients intelligent.
DEPARTMENT OF ECE, MRITS
CONCLUSION
A robust and trusted scheme for IoT-based mobile wireless mesh
networks, which aim to improve the coverage and reliability of the
network infrastructure. The simulation results demonstrate that the
proposed scheme increases the data reliability and with minimal
computational overheads in varying network topologies.
DEPARTMENT OF ECE, MRITS
REFERENCES
[1] K. M. Modieginyane, B. B. Letswamotse, R. Malekian, and A. M.
Abu-Mahfouz, ``Software denied wireless sensor networks
application opportunities for efficient network management: A
survey,'‘ Comput. Electr. Eng., vol. 66, pp. 274287, Feb. 2018.
[2] L. Kumar, V. Sharma, and A. Singh, ``Feasibility and modelling for
convergence of optical-wireless network a review,'' AEU-Int. J.
Electron.Commun., vol. 80, pp. 144156, Oct. 2017.
[3] K. Haseeb, N. Islam, A. Almogren, and I. U. Din, ``Intrusion
prevention framework for secure routing in WSN-based mobile
Internet of Things,'‘ IEEE Access, vol. 7, pp. 185496185505, 2019.
DEPARTMENT OF ECE, MRITS
DEPARTMENT OF ECE, MRITS

More Related Content

Seminar PPT-4.pptx

  • 1. DEPARTMENT OF ECE, MRITS A Seminar on A ROBUST AND TRUSTED SCHEME FOR IOT-BASED MOBILE WIRELESS MESH NETWORKS Presented By BADDAM AJENDER REDDY 19S11A0403
  • 2. DEPARTMENT OF ECE, MRITS CONTENTS  Introduction  History Related to the Topic  Working  Applications  Advantages  Disadvantages  Future Scope  Conclusion  References
  • 3. DEPARTMENT OF ECE, MRITS INTRODUCTION  Wireless mesh networks consist of a huge number of mesh clients, mesh routers, and gateway devices to cover a large region for information gathering and forwarding.  RTS is a robust and trusted routing scheme between mesh clients based on IoT devices to prevent network threats and to achieve efficient data transmission system.  This scheme aims to accomplish data reliability, confidentiality, authenticity.
  • 4. DEPARTMENT OF ECE, MRITS HISTORY RELATED TO THE TOPIC In 2018, the authors proposed a weighted trusted routing mechanism to identify and exclude the malicious nodes in the routing paths for wireless mesh networks.  Based on the studies, it has been noticed that the majority of work has identified the significance of security for wireless mesh networks.  Thus, a robust and trusted scheme has been designed to prevent security attacks for IoT-based mobile wireless mesh networks, which results in improving the network stability and data privacy.
  • 5. DEPARTMENT OF ECE, MRITS  The main aim of the proposed scheme is to design and develop the major techniques for achieving efficient, secured and robust routing in wireless mesh networks.  The proposed scheme consists of two main functional techniques : A. The network infrastructure of mobile mesh clients. B. Secure and Trusted data routing between mesh devices. WORKING
  • 6. DEPARTMENT OF ECE, MRITS FUNCTIONAL TECHNIQUES OF RTS  In this technique, all mesh clients, routers, and gateway devices are interconnected via a multi- hop model as shown in Fig.1.  All mesh clients including mesh routers flood their position data to construct the initial routing table. The routing table is updated each time when any new mesh client joins or existing one leaves the network infrastructure. FIG 1. The architecture of wireless mesh networks. A.THE NETWORK INFRASTRUCTURE OF MOBILE MESH CLIENTS:
  • 7. DEPARTMENT OF ECE, MRITS At the start, each mesh node advertises a LOC message in the field that comprises two sub-fields.  They are node’s unique ID and its current position.  Each mesh client generate routing tables upon receiving the data.  And Mesh clients can transmit their data packets directly.
  • 9. DEPARTMENT OF ECE, MRITS B. SECUREAND TRUSTED DATAROUTING BETWEEN MESH DEVICES
  • 10. DEPARTMENT OF ECE, MRITS  The proposed technique presents a fully secure and trusted data routing strategy.  For secure data routing between the devices, an asymmetric- based RSA cryptographic technique is proposed which uses public- private keys. The private key performs a vital role in data authentication and it must be kept secure from malicious and authorized nodes in the network. In the proposed security technique, there are two topological scenarios: fully connected network topology and partially connected network topology.
  • 11. DEPARTMENT OF ECE, MRITS APPLICATIONS 1. LIGHTING: In lighting, wireless communication is needed for two reasons: To control lamps, and To collect data from the lamps, such as temperature or other usage information. Lighting systems needs robustness. The network should still operate even if parts of the system goes out. 2. IN-DOOR ENVIRONMENTS: For large in-door environments need to cover large areas. Examples are:  Warehouses  Retail Stores
  • 12. DEPARTMENT OF ECE, MRITS APPLICATIONS 3. ELECTRICITY:  Electricity and utility systems cover large areas that are often not served by cellular networks. 4. CITY-SCALE SYSTEMS: There are several IoT systems in use at the scale of a city. They are:  Street Lightning  Air Pollution monitoring  Trash can usage monitoring
  • 13. DEPARTMENT OF ECE, MRITS ADVANTAGES Self-configuring – In a mesh network, the nodes configure themselves and It is cost effective. Self-healing – Self-healing here is that the network is more capable of recovering from a failure on its own. Great coverage –In a mesh network, we can easily change the size of the network, we can simply add and remove nodes from the network .
  • 14. DEPARTMENT OF ECE, MRITS DISADVANTAGES  For every Hop the system makes, a little bit of speed is lost.  To cover a large amount of space, more modules are required.  The power consumption is very high. Difficult to set up Initially.  The high risk of redundant connections.
  • 15. DEPARTMENT OF ECE, MRITS FUTURE SCOPE In future, the proposed scheme will be further enhanced to tackle other DOS threats, which crack network set-ups and functionalities. Also, the proposed scheme may include some machine learning- based optimization techniques to make the mesh clients intelligent.
  • 16. DEPARTMENT OF ECE, MRITS CONCLUSION A robust and trusted scheme for IoT-based mobile wireless mesh networks, which aim to improve the coverage and reliability of the network infrastructure. The simulation results demonstrate that the proposed scheme increases the data reliability and with minimal computational overheads in varying network topologies.
  • 17. DEPARTMENT OF ECE, MRITS REFERENCES [1] K. M. Modieginyane, B. B. Letswamotse, R. Malekian, and A. M. Abu-Mahfouz, ``Software denied wireless sensor networks application opportunities for efficient network management: A survey,'‘ Comput. Electr. Eng., vol. 66, pp. 274287, Feb. 2018. [2] L. Kumar, V. Sharma, and A. Singh, ``Feasibility and modelling for convergence of optical-wireless network a review,'' AEU-Int. J. Electron.Commun., vol. 80, pp. 144156, Oct. 2017. [3] K. Haseeb, N. Islam, A. Almogren, and I. U. Din, ``Intrusion prevention framework for secure routing in WSN-based mobile Internet of Things,'‘ IEEE Access, vol. 7, pp. 185496185505, 2019.