Seminar PPT-4.pptx
- 1. DEPARTMENT OF ECE, MRITS
A Seminar on
A ROBUST AND TRUSTED SCHEME FOR IOT-BASED
MOBILE WIRELESS MESH NETWORKS
Presented By
BADDAM AJENDER REDDY
19S11A0403
- 2. DEPARTMENT OF ECE, MRITS
CONTENTS
Introduction
History Related to the Topic
Working
Applications
Advantages
Disadvantages
Future Scope
Conclusion
References
- 3. DEPARTMENT OF ECE, MRITS
INTRODUCTION
Wireless mesh networks consist of a huge number
of mesh clients, mesh routers, and gateway devices
to cover a large region for information gathering
and forwarding.
RTS is a robust and trusted routing scheme
between mesh clients based on IoT devices to
prevent network threats and to achieve efficient
data transmission system.
This scheme aims to accomplish data reliability,
confidentiality, authenticity.
- 4. DEPARTMENT OF ECE, MRITS
HISTORY RELATED TO THE TOPIC
In 2018, the authors proposed a weighted trusted routing
mechanism to identify and exclude the malicious nodes in the
routing paths for wireless mesh networks.
Based on the studies, it has been noticed that the majority of
work has identified the significance of security for wireless
mesh networks.
Thus, a robust and trusted scheme has been designed to
prevent security attacks for IoT-based mobile wireless mesh
networks, which results in improving the network stability and
data privacy.
- 5. DEPARTMENT OF ECE, MRITS
The main aim of the proposed scheme is to design and develop the
major techniques for achieving efficient, secured and robust routing in
wireless mesh networks.
The proposed scheme consists of two main functional techniques :
A. The network infrastructure of mobile mesh clients.
B. Secure and Trusted data routing between mesh devices.
WORKING
- 6. DEPARTMENT OF ECE, MRITS
FUNCTIONAL TECHNIQUES OF RTS
In this technique, all mesh clients, routers, and
gateway devices are interconnected via a multi-
hop model as shown in Fig.1.
All mesh clients including mesh routers flood
their position data to construct the initial routing
table. The routing table is updated each time
when any new mesh client joins or existing one
leaves the network infrastructure.
FIG 1. The architecture of wireless mesh networks.
A.THE NETWORK INFRASTRUCTURE OF MOBILE MESH CLIENTS:
- 7. DEPARTMENT OF ECE, MRITS
At the start, each mesh node advertises
a LOC message in the field that
comprises two sub-fields.
They are node’s unique ID and its
current position.
Each mesh client generate routing
tables upon receiving the data.
And Mesh clients can transmit their
data packets directly.
- 10. DEPARTMENT OF ECE, MRITS
The proposed technique presents a fully secure and trusted data
routing strategy.
For secure data routing between the devices, an asymmetric-
based RSA cryptographic technique is proposed which uses public-
private keys.
The private key performs a vital role in data authentication and it
must be kept secure from malicious and authorized nodes in the
network.
In the proposed security technique, there are two topological
scenarios: fully connected network topology and partially
connected network topology.
- 11. DEPARTMENT OF ECE, MRITS
APPLICATIONS
1. LIGHTING: In lighting, wireless communication is needed for two reasons:
To control lamps, and
To collect data from the lamps, such as temperature or other
usage information.
Lighting systems needs robustness. The network should still operate even if
parts of the system goes out.
2. IN-DOOR ENVIRONMENTS: For large in-door environments need to
cover large areas. Examples are:
Warehouses
Retail Stores
- 12. DEPARTMENT OF ECE, MRITS
APPLICATIONS
3. ELECTRICITY:
Electricity and utility systems cover large areas that are often not served by
cellular networks.
4. CITY-SCALE SYSTEMS:
There are several IoT systems in use at the scale of a city.
They are:
Street Lightning
Air Pollution monitoring
Trash can usage monitoring
- 13. DEPARTMENT OF ECE, MRITS
ADVANTAGES
Self-configuring – In a mesh network, the nodes configure
themselves and It is cost effective.
Self-healing – Self-healing here is that the network is more
capable of recovering from a failure on its own.
Great coverage –In a mesh network, we can easily change the size
of the network, we can simply add and remove nodes from the
network .
- 14. DEPARTMENT OF ECE, MRITS
DISADVANTAGES
For every Hop the system makes, a little bit of speed is lost.
To cover a large amount of space, more modules are required.
The power consumption is very high.
Difficult to set up Initially.
The high risk of redundant connections.
- 15. DEPARTMENT OF ECE, MRITS
FUTURE SCOPE
In future, the proposed scheme will be further enhanced to tackle
other DOS threats, which crack network set-ups and functionalities.
Also, the proposed scheme may include some machine learning-
based optimization techniques to make the mesh clients intelligent.
- 16. DEPARTMENT OF ECE, MRITS
CONCLUSION
A robust and trusted scheme for IoT-based mobile wireless mesh
networks, which aim to improve the coverage and reliability of the
network infrastructure. The simulation results demonstrate that the
proposed scheme increases the data reliability and with minimal
computational overheads in varying network topologies.
- 17. DEPARTMENT OF ECE, MRITS
REFERENCES
[1] K. M. Modieginyane, B. B. Letswamotse, R. Malekian, and A. M.
Abu-Mahfouz, ``Software denied wireless sensor networks
application opportunities for efficient network management: A
survey,'‘ Comput. Electr. Eng., vol. 66, pp. 274287, Feb. 2018.
[2] L. Kumar, V. Sharma, and A. Singh, ``Feasibility and modelling for
convergence of optical-wireless network a review,'' AEU-Int. J.
Electron.Commun., vol. 80, pp. 144156, Oct. 2017.
[3] K. Haseeb, N. Islam, A. Almogren, and I. U. Din, ``Intrusion
prevention framework for secure routing in WSN-based mobile
Internet of Things,'‘ IEEE Access, vol. 7, pp. 185496185505, 2019.