Abstract
The internet and the Internet of Things (IoT) have now become an integral aspect of everyone's lives. The IoT connects people, objects, and networks so that they may respond to any virtual or physical communication without fail. It is thought to be the next epoch in communication, as it has made devices more intelligent and capable. Identification of best nodes and path in connection establishment step is still a difficulty issue. A Grey Wolf Integrated with Jaya Optimization (GWJO) approach is used for selection of optimal node and based on link quality the best route selection is exhibited in this paper. Initial nodes are identified considering delay, distance and energy parameters. The proposed methodology is compared with various performance metrics over the conventional models.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Cao J, Ma M, Li H (2014) A survey on security aspects for LTE and LTE-A networks. IEEE commun Surv Tutor 16(1):283–301
Kalyani G, Chaudhari S (2021) Enhanced privacy preservation in the routing layer with variable-length packet data for attack free IoT sector. J Eng Sci Technol Rev 14(1):95–99
Kalyani G, Chaudhari S (2020) Survey on 6LoWPAN security protocols in IoT communication. In: ICDSMLA 2019. Springer, Singapore, 696–702
Kalyani G, Chaudhari S (2019) Data privacy preservation in MAC aware Internet of things with optimized key generation. J King Saud Univ Comput Inf Sci
Krishna Jyothi K, Chaudhari S (2019) A secure cluster-based authentication and key management protocol for machine-type communication in the LTE network. Int J Comput Appl: 1–11
Jyothi KK, Chaudhari S (2020) Survey on MTC group authentication and key management for MTC in LTE networks. ICDSMLA 2019: 753–759
Jyothi KK, Chaudhari S (2020) Optimized neural network model for attack detection in LTE network. Comput Electr Eng 88:106879
Jyothi KK, Chaudhari S (2020) A novel block chain based cluster head authentication protocol for machine-type communication in LTE network: statistical analysis on attack detection. J King Saud Univ Comput Inf Sci
Kalyani G, Chaudhari S (2020) An efficient approach for enhancing security in Internet of Things using the optimum authentication key. Int J Comput Appl 42(3):306–314
Jyothi KK, Chaudhari S (2020) Cluster-based authentication for machine type communication in LTE network using elliptic curve cryptography. Int J Cloud Comput 9(2–3):258–284
Ourouss K, Naja N, Jamali A (2021) Defending against smart grayhole attack within MANETs: a reputation-based ant colony optimization approach for secure route discovery in DSR protocol. Wireless Pers Commun 116(1):207–226
Kondaiah R, Sathyanarayana B (2018) Trust factor and fuzzy-firefly integrated particle swarm optimization based intrusion detection and prevention system for secure routing of MANET. Int J Comput Sci Eng 10(1)
Elavarasan R, Chithra K (2021) Enhanced LION optimization with efficient path routing equalization technique against DOS attack in WSN
Maheshwari P, Sharma AK, Verma K (2021) Energy efficient cluster based routing protocol for WSN using butterfly optimization algorithm and ant colony optimization. Ad Hoc Netw 110:102317
Aghbari ZA et al (2020) Routing in wireless sensor networks using optimization techniques: a survey. Wirel Pers Commun 111(4):2407–2434
Rajaram V, Kumaratharan N (2021) Multi-hop optimized routing algorithm and load balanced fuzzy clustering in wireless sensor networks. J Ambient Intell Humaniz Comput 12(3):4281–4289
Bera S, Das SK, Karati A (2020) Intelligent routing in wireless sensor network based on African buffalo optimization. In: Nature inspired computing for wireless sensor networks. Springer, Singapore, 119–142
Mirjalili S, Mirjalili SM, Lewis A (2014) Grey wolf optimizer. Adv Eng Softw 69:46–61
Pandey HM (2016) Jaya a novel optimization algorithm: what, how and why? In: 2016 6th international conference—cloud system and big data engineering (confluence), Noida, 728–730
Deshpande KV, Rajesh A (2017) Investigation on IMCP based clustering in LTE-M communication for smart metering applications. Eng Sci Technol Int J 20(3):944–955
Liang J-M, Chang P-Y, Chen J-J (2019) Energy-efficient scheduling scheme with spatial and temporal aggregation for small and massive transmissions in LTE-M networks. Pervasive Mob Comput 52:29–45
Priyadharshini AS, Bhuvaneswari PTV (2018) Regression model for handover control parameter configuration in LTE-A networks. Comput Electr Eng 72:877–893
Malandra F, Chiquette LO, Lafontaine-Bédard L-P, Sansò B (2018) Traffic characterization and LTE performance analysis for M2M communications in smart cities. Pervasive Mob Comput 48:59–68
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2024 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Kalyani, G., Krishna Jyothi, K., Srilakshmi, K., Chaudhari, S. (2024). A Grey Wolf Integrated with Jaya Optimization Based Route Selection in IoT Network. In: Gunjan, V.K., Kumar, A., Zurada, J.M., Singh, S.N. (eds) Computational Intelligence in Machine Learning. ICCIML 2022. Lecture Notes in Electrical Engineering, vol 1106. Springer, Singapore. https://doi.org/10.1007/978-981-99-7954-7_14
Download citation
DOI: https://doi.org/10.1007/978-981-99-7954-7_14
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-99-7953-0
Online ISBN: 978-981-99-7954-7
eBook Packages: Intelligent Technologies and RoboticsIntelligent Technologies and Robotics (R0)