misra2012
misra2012
Abstract—Internet of Things (IOT) is a wireless ad-hoc network Indubitably, IOT is envisioned to have huge influence on a
of everyday objects collaborating and cooperating with one other variety of aspects of our everyday life [1]. It is likely to emerge
in order to accomplish some shared objectives. The envisioned as a new technology capable of playing a prominent role in a
high degrees of association of humans with IOT nodes require wide range of applications ranging from basic domestic
equally high degrees of reliability of the network. In order to assistance to intelligent automated industrial systems. From the
render this reliability to IOT networks, it is necessary to make bird‟s eye view, IOT is a self-configuring wireless network
them tolerant to faults. In this paper, we propose mixed cross- which integrates the physical world with the world of Internet
layered and learning automata (LA)-based fault-tolerant routing [2]. It has the potential to equip humans with the ability to have
protocol for IOTs, which assures successful delivery of packets high degrees of control over physical objects. It will enable
even in the presence of faults between a pair of source and centralized unified control which is extended to almost every
destination nodes. As this work concerns IOT, the algorithm
object in the proximity.
designed should be highly scalable and should be able to deliver
high degrees of performance in a heterogeneous environment. The huge interconnection requirement between the nodes in
The LA and cross-layer concepts adopted in the proposed IOT will require the enabling of huge centralized/decentralized
approach endow this flexibility to the algorithm so that the same database of objects across the globe. It will require a unique
standard can be used across the network. It dynamically adopts addressing system so that each device can be uniquely
itself to the changing environment and, hence, chooses the identified. IOT draws lot of similarity with the current day
optimal action. Since energy is a major concern in IOTs, the Internet, but it has significantly high level of diversity and
algorithm performs energy-aware fault-tolerant routing. To save
enormous number of communicating devices. IOT devices
on energy, all the nodes lying in the unused path are put to sleep.
share information about their states and other vital factors
Again this sleep scheduling is dynamic and adaptive. The
simulation results of the proposed strategy shows an increase in
which imparts them with essential, though unique,
the overall energy-efficiency of the network and decrease in characteristics such as self-management, self-decision making
overhead, as compared to the existing protocols we have and self-governance [3]. The aspects of cooperation endows
considered as benchmarks in this study. them autonomy and intelligence.
An IOT is conceived to be open and self-assimilating
Keywords-IOT; Cross-Layer Design; Learning Automata; internetwork. These kinds of internetworks are highly prone to
Fault-tolerant routing; faults and security threats [4]. These faults, if not handled
properly, may lead to serious network downtime. Faults tend to
I. INTRODUCTION degrade the network performance and affect the network‟s
IOT refers to a nexus of customary and conventional operation time by introducing unnecessary overheads. Faults
objects connected in the form of an internetwork. The primary can occur due to a variety of factors. To generalize, they can be
concept behind this new technology is the pervasive presence classified into two major categories namely hardware-based
of these objects such as RFID around us interacting and and software-based. The more critical the application of
collaborating with each other to attain mutual goals. Of course network would be, the more severe would be the implications
in order to communicate with one another, the network-enabled because of such faults. In case of IOTs, due to their large scale,
objects need common protocols and standards for these faults have magnified repercussions. To make IOT a
communication. robust, reliable and dependent technology, it is necessary to
adopt a strategy to avoid and counter these faults.
816
abstracted as a triple {A, B, C}. A, B, and C are defined as The vertices are the nodes in the network and the edges are the
follows [10]: wireless links in between the wireless nodes. A path is a set of
vertices connected to each other from a vertex (which can also
A = {α1, α1,…,αn} represents a finite input set;
be source) to destination (sink). Faults can occur unpredictably
B = {β1, β2,…,βn} is the output set of the environment; in any node in the network. We assume all links in the
and network to be bidirectional, i.e., if (vi, vi+1) → E, then (vi+1, vi)
→E also exists. Each node „v‟ has two components: a routing
C = {c1, c2,…,cn} is a set of penalty probabilities, where
element ci Є C corresponds to an input action αi. component and an LA component. Each node‟s LA
component functions independently of others and shares
We now provide a few important definitions used in the updates through an update table maintained at the routing
field of LA. Given an action probability vector P (t) at time t, component which shares LA information through the neighbor
the average penalty is defined as [10] nodes. Apart from network layer inputs it uses the data from
M (t ) E t | Pt Pr t 1 | Pt the physical layer while rewarding or penalizing the path. Fig.
3 depicts the proposed system model outline.
r
Pr t 1 | t Pr t
i 1
i i
r
c p t .
i 1
i i
(1)
The average penalty for the “pure-chance” automation is
given by [4]
r
1
M0
r c .
i 1
i
(2)
As t→∞ if the average penalty M(t) < M0, at least
asymptotically, the automaton is generally considered to be
better than the pure-chance automaton. E [M(t)] is given by Fig. 2. Cross-Layer Design
[10]
EM t EE t | Pt E t . (3)
817
not lying on any currently being used path are put to sleep to VII. SIMULATIONS
save energy. The goodness value of the path is continuously We have performed simulations of the proposed solution,
and dynamically updated using the underlying reward/penalty i-CLAFTRA, using ns-2 [14], and have compared its
scheme by LA. performance with the corresponding algorithms in ENFAT-
AODV [13] and AODV [15]. The parameters used for ns-2
A. Reward/Penalty Scheme simulation are specified in Table 2.
As described earlier, each node has a learning automaton
stationed in it. Therefore, the automaton keeps a check on the TABLE 1: Simulation parameters
delivery of the packet sent through it. If the packet delivery is
reported to be successful then the stationed LA increments the Parameter Value
value of the goodness value of that particular node. The Number of Nodes 40-240
Speed 0-15 m/s
increment is the sum of a constant R, the reward constant and MAC IEEE 802.11
a function of energy remaining level of the node. The node Traffic type CBR (at TCP-IP
with higher level of energy remaining will get the higher interface)
reward as it is better to select the nodes with the more energy Terrain Dimensions 1200 m x 1000 m
as they will deliver better operation time.
A. Variation in average energy consumption with respect to
To calculate the goodness value of the path, we take the mobility in the network
commulative sum of the goodness values of the nodes lying in
that path. Once the computation of the goodness value is The aim of this experiment was to study the energy
completed, it is then compared with the threshold and consumption by the network with varying percentage of
accordingly the most suitable path is selected. The nodes of mobile nodes.
the remaining unused path areput to sleep. This increases the
network lifetime. Fig. 4 shows the variation in average energy consumption
of i-CLAFTRA, AODV and ENFAT-AODV. It is observed
B. Sleep/Wake up Scheme from the graph that energy consumption by i-CLAFTRA is
less than other protocols. i-CLAFTRA performs well because
As soon as a fault is detected in the currently used path,
of the ability of learning automata adaptability and its sleep
then the path is switched to the alternative path with the next
mechanism. Energy consumption in AODV remains constant
highest path goodness value. Other than this, if the goodness
as all nodes remain active and dissipate nearly same amount of
value of a path falls by 10%, then the source node will check
energy. The average energy consumption by ENFAT-AODV
if the alternate path is good enough (i.e., has goodness value
increases as number of nodes increases as it has to spend more
higher than the currently used path) for data transmission, then
energy in maintaining the alternate path.
it will use alternate path. If the goodness value of any of the
alternate paths is not more than current path, then in such a
case, it will continue using the current path.
15.1
In the given strategy, the nodes undergo sleep and wake-
up, depending upon the goodness value of path which is
Average Engery Consumption (mW)
818
i-CLAFTRA‟s packet delivery ratio is affected by a very ACKNOWLEDGEMENT
minor factor as the percentage of mobility increases. By The work of the first author was supported in part by the
percentage of mobility, we imply the fraction of mobile nodes
Council for Scientific and Industrial Research (CSIR), New
of the total nodes in a network. As we know, IOT can have
both mobile as well as stationary nodes at the same time, we Delhi, India, Grant Ref. No. 22(0477)/09/EMR-II.
have taken this parameter as one of the criteria for analyzing i- REFERENCES
CLAFTRA‟s accomplishment. The increasing gap between
the curve of i-CLAFTRA and other two curves shows the
stability in the execution the proposed protocol has as [1] L. Atzori, A. Iera and G. Morabito, “The Internet of Things: A survey”,
Computer Networks, Vol. 54, No. 15, October 2010, pp. 2787-2805,
compared to AODV and ENFAT-AODV. ISSN 1389-1286, DOI: 10.1016/j.comnet.2010.05.010.
[2] O. Zhu, R. Wang; Q. Chen, Y. Liu and W. Qin, "IOT Gateway:
110
BridgingWireless Sensor Networks into Internet of Things," Embedded
and Ubiquitous Computing (EUC), 2010 IEEE/IFIP 8th International
100 Conference on , vol., no., pp.347-352, 11-13 Dec. 2010
doi: 10.1109/EUC.2010.58.
[3] ITU Internet Reports, The Internet of Things, November 2005.
90
Packet Delivery Ratio
819