Skip to main content

A Grey Wolf Integrated with Jaya Optimization Based Route Selection in IoT Network

  • Conference paper
  • First Online:
Computational Intelligence in Machine Learning (ICCIML 2022)

Part of the book series: Lecture Notes in Electrical Engineering ((LNEE,volume 1106))

  • 85 Accesses

Abstract

The internet and the Internet of Things (IoT) have now become an integral aspect of everyone's lives. The IoT connects people, objects, and networks so that they may respond to any virtual or physical communication without fail. It is thought to be the next epoch in communication, as it has made devices more intelligent and capable. Identification of best nodes and path in connection establishment step is still a difficulty issue. A Grey Wolf Integrated with Jaya Optimization (GWJO) approach is used for selection of optimal node and based on link quality the best route selection is exhibited in this paper. Initial nodes are identified considering delay, distance and energy parameters. The proposed methodology is compared with various performance metrics over the conventional models.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 299.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Hardcover Book
USD 379.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Cao J, Ma M, Li H (2014) A survey on security aspects for LTE and LTE-A networks. IEEE commun Surv Tutor 16(1):283–301

    Google Scholar 

  2. Kalyani G, Chaudhari S (2021) Enhanced privacy preservation in the routing layer with variable-length packet data for attack free IoT sector. J Eng Sci Technol Rev 14(1):95–99

    Google Scholar 

  3. Kalyani G, Chaudhari S (2020) Survey on 6LoWPAN security protocols in IoT communication. In: ICDSMLA 2019. Springer, Singapore, 696–702

    Google Scholar 

  4. Kalyani G, Chaudhari S (2019) Data privacy preservation in MAC aware Internet of things with optimized key generation. J King Saud Univ Comput Inf Sci

    Google Scholar 

  5. Krishna Jyothi K, Chaudhari S (2019) A secure cluster-based authentication and key management protocol for machine-type communication in the LTE network. Int J Comput Appl: 1–11

    Google Scholar 

  6. Jyothi KK, Chaudhari S (2020) Survey on MTC group authentication and key management for MTC in LTE networks. ICDSMLA 2019: 753–759

    Google Scholar 

  7. Jyothi KK, Chaudhari S (2020) Optimized neural network model for attack detection in LTE network. Comput Electr Eng 88:106879

    Google Scholar 

  8. Jyothi KK, Chaudhari S (2020) A novel block chain based cluster head authentication protocol for machine-type communication in LTE network: statistical analysis on attack detection. J King Saud Univ Comput Inf Sci

    Google Scholar 

  9. Kalyani G, Chaudhari S (2020) An efficient approach for enhancing security in Internet of Things using the optimum authentication key. Int J Comput Appl 42(3):306–314

    Google Scholar 

  10. Jyothi KK, Chaudhari S (2020) Cluster-based authentication for machine type communication in LTE network using elliptic curve cryptography. Int J Cloud Comput 9(2–3):258–284

    Google Scholar 

  11. Ourouss K, Naja N, Jamali A (2021) Defending against smart grayhole attack within MANETs: a reputation-based ant colony optimization approach for secure route discovery in DSR protocol. Wireless Pers Commun 116(1):207–226

    Article  Google Scholar 

  12. Kondaiah R, Sathyanarayana B (2018) Trust factor and fuzzy-firefly integrated particle swarm optimization based intrusion detection and prevention system for secure routing of MANET. Int J Comput Sci Eng 10(1)

    Google Scholar 

  13. Elavarasan R, Chithra K (2021) Enhanced LION optimization with efficient path routing equalization technique against DOS attack in WSN

    Google Scholar 

  14. Maheshwari P, Sharma AK, Verma K (2021) Energy efficient cluster based routing protocol for WSN using butterfly optimization algorithm and ant colony optimization. Ad Hoc Netw 110:102317

    Article  Google Scholar 

  15. Aghbari ZA et al (2020) Routing in wireless sensor networks using optimization techniques: a survey. Wirel Pers Commun 111(4):2407–2434

    Google Scholar 

  16. Rajaram V, Kumaratharan N (2021) Multi-hop optimized routing algorithm and load balanced fuzzy clustering in wireless sensor networks. J Ambient Intell Humaniz Comput 12(3):4281–4289

    Article  Google Scholar 

  17. Bera S, Das SK, Karati A (2020) Intelligent routing in wireless sensor network based on African buffalo optimization. In: Nature inspired computing for wireless sensor networks. Springer, Singapore, 119–142

    Google Scholar 

  18. Mirjalili S, Mirjalili SM, Lewis A (2014) Grey wolf optimizer. Adv Eng Softw 69:46–61

    Article  Google Scholar 

  19. Pandey HM (2016) Jaya a novel optimization algorithm: what, how and why? In: 2016 6th international conference—cloud system and big data engineering (confluence), Noida, 728–730

    Google Scholar 

  20. Deshpande KV, Rajesh A (2017) Investigation on IMCP based clustering in LTE-M communication for smart metering applications. Eng Sci Technol Int J 20(3):944–955

    Google Scholar 

  21. Liang J-M, Chang P-Y, Chen J-J (2019) Energy-efficient scheduling scheme with spatial and temporal aggregation for small and massive transmissions in LTE-M networks. Pervasive Mob Comput 52:29–45

    Article  Google Scholar 

  22. Priyadharshini AS, Bhuvaneswari PTV (2018) Regression model for handover control parameter configuration in LTE-A networks. Comput Electr Eng 72:877–893

    Article  Google Scholar 

  23. Malandra F, Chiquette LO, Lafontaine-Bédard L-P, Sansò B (2018) Traffic characterization and LTE performance analysis for M2M communications in smart cities. Pervasive Mob Comput 48:59–68

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to G. Kalyani .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2024 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Kalyani, G., Krishna Jyothi, K., Srilakshmi, K., Chaudhari, S. (2024). A Grey Wolf Integrated with Jaya Optimization Based Route Selection in IoT Network. In: Gunjan, V.K., Kumar, A., Zurada, J.M., Singh, S.N. (eds) Computational Intelligence in Machine Learning. ICCIML 2022. Lecture Notes in Electrical Engineering, vol 1106. Springer, Singapore. https://doi.org/10.1007/978-981-99-7954-7_14

Download citation

Publish with us

Policies and ethics