2022
DOI: 10.3390/math11010080
|View full text |Cite
|
Sign up to set email alerts
|

A Cluster-Tree-Based Secure Routing Protocol Using Dragonfly Algorithm (DA) in the Internet of Things (IoT) for Smart Agriculture

Abstract: The Internet of Things defines a global and comprehensive network whose task is to monitor and control the physical world by collecting, processing, and analyzing data sensed by IoT devices. This network has succeeded in various areas, and one of its most important applications is in smart agriculture because there are many demands for producing high-quality foodstuff in the world. These demands need new production schemes in the agriculture area. In IoT, communication security is essential due to the extensiv… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
12
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
8

Relationship

1
7

Authors

Journals

citations
Cited by 18 publications
(12 citation statements)
references
References 41 publications
0
12
0
Order By: Relevance
“…Not considering link quality when selecting paths, creating unstable paths, long delay for discovering paths SeLeZoR [34] Network clustering, creating unequal clusters, balancing energy consumption in the network, reducing traffic in the network Designing a weak security mechanism AODV [35] Designing an on-demand routing method, creating loop-free paths Not considering energy efficiency, high latency and high bandwidth consumption in the routing process, not designing a security mechanism LEACH-C [36] Clustering, scalability, balancing energy consumption in the network Single point of failure issue, not designing a lightweight security mechanism DRCKDS [37] Considering different security levels in the network, allocating high security level for sensitive data and low security level for low-sensitive data Not defining the routing process, not explaining the trust evaluation process, using symmetric encryption to secure the network CTSRD [38] An energy-aware powerful routing, uniform distribution of energy between nodes, reducing energy consumption, increasing network lifetime, designing a strong defense mechanism against attacks and isolating malicious nodes…”
Section: Scheme Advantages Disadvantagesmentioning
confidence: 99%
See 1 more Smart Citation
“…Not considering link quality when selecting paths, creating unstable paths, long delay for discovering paths SeLeZoR [34] Network clustering, creating unequal clusters, balancing energy consumption in the network, reducing traffic in the network Designing a weak security mechanism AODV [35] Designing an on-demand routing method, creating loop-free paths Not considering energy efficiency, high latency and high bandwidth consumption in the routing process, not designing a security mechanism LEACH-C [36] Clustering, scalability, balancing energy consumption in the network Single point of failure issue, not designing a lightweight security mechanism DRCKDS [37] Considering different security levels in the network, allocating high security level for sensitive data and low security level for low-sensitive data Not defining the routing process, not explaining the trust evaluation process, using symmetric encryption to secure the network CTSRD [38] An energy-aware powerful routing, uniform distribution of energy between nodes, reducing energy consumption, increasing network lifetime, designing a strong defense mechanism against attacks and isolating malicious nodes…”
Section: Scheme Advantages Disadvantagesmentioning
confidence: 99%
“…In [ 38 ], a tree-based secure routing method by means of a dragonfly algorithm called CTSRD is introduced for Internet of Things. CTSRD has a weighted trust system (W-Trust) that is distributed and lightweight and attempts to achieve the trust values of IoT devices.…”
Section: Related Workmentioning
confidence: 99%
“…Still, there are other fields, like education, where it is relatively scarce [ 31 ]. For instance, in the agriculture filed, IoT is often used in the process of crop nutrition monitoring, light, ph, temperature, and humidity, using sensors that send data from node to node to be processed and to make decisions or can change other devices automatically regarding system decisions [ 25 , 31 , 35 , 36 , 37 ].…”
Section: Theoretical Frameworkmentioning
confidence: 99%
“…The DA method is based on both dynamic (migration) and static (hunting) swarming particles. When it comes to optimization, these two swarming techniques rely on the usage of metaheuristics for both exploitation and exploration [68]. Figure 13 illustrates the flowchart of the Dragonfly algorithm [21,69,70].…”
Section: Determine Initial Contour Points Using Quantum Dragonfly Alg...mentioning
confidence: 99%
“…However, the position updating rule of traditional QDA has a lower correlation with the centroid of the preceding generation's population. As a consequence, this may cause problems in locating the global optimum, leading to a solution with poor precision and a tendency to converge too quickly to local minima [24,25,68,69]. Therefore, investigations are urged to discover new methods to update dragonfly locations.…”
Section: Convergence Issue Of the Proposed Modelmentioning
confidence: 99%