Abstract
Internet of Things (IoT) is the term used to describe a network of physical things such as mobile devices and household appliances that are embedded with electronics, software, sensors, and network connection that enables these objects to gather and exchange data. Sensors, recognition and remote control of items are all made possible by the Internet of Things (IoT). Once this property is combined with sensors and actuators, it becomes an example of a cyber-physical system, which includes technologies like intelligent power grids (grids), intelligent homes (smart homes), smart cities (smart cities), and intelligent transportation systems (ITS). Integrating MANET and WSN with IoT is covered in this study. Technology and protocols needed to deploy the Internet of Things (IoT) are explored in this article.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Andrea I, Chrysostomou C, Hadjichristofi G (2015) Internet of things: security vulnerabilities and challenges. In: Computers and communication (ISCC), IEEE symposium. IEEE, pp 180–187
Atakli IM, Hu H, Chen Y, Ku WS, Su Z (2008) Malicious node detection in wireless sensor networks using weighted trust evaluation. In: Proceedings of the 2008 Spring simulation multi conference. Society for Computer Simulation International, pp 836–843
Penna M, Jijesh JJ, Shivashankar (2017) Design and implementation of automatic medicine dispensing machine. In: RTEICT 2017—2nd IEEE international conference on recent trends in electronics, information and communication technology, proceedings, pp 1962–1966. https://doi.org/10.1109/RTEICT.2017.8256941
Christin D, Reinhardt A, Mogre PS, Steinmetz R (2009) Wireless sensor networks and the internet of things: selected challenges. In: Proceedings of the 8th GI/ITG KuVS Fachespräch Drahtlose sensornetze, pp 31–34
Kishore DV, Shivashankar, Mehta S (2016) MANET topology for disaster management using wireless sensor network. In: International conference on communication and signal processing, ICCSP 2016, pp 0736–0740. https://doi.org/10.1109/ICCSP.2016.7754242
Varun CA, Shivashankar, Sahana M, Varun RS, Rajesh T (2018) Implementation of swarm intelligence in obstacle avoidance. In: RTEICT 2017—2nd IEEE international conference on recent trends in electronics, information and communication technology, proceedings, 2017, pp 525–528. https://doi.org/10.1109/RTEICT.2017.8256652
Sridhara SB, Naveen KB, Ramesha M, Pai GN (2020) Internet of things: internet revolution, impact, technology road map and features. Adv Math Sci J 9(7):4405–4414. https://doi.org/10.37418/amsj.9.7.11
Ramesh Naidu P, Guruprasad N (2020) Design and implementation of cryptcloud system for securing files in cloud. Adv Math Sci J 9(7):4485–4493. https://doi.org/10.37418/amsj.9.7.17
Isaiadis S, Getov V (2005) Integrating mobile devices into the grid: design considerations and evaluation. In: European conference on parallel processing LNCS, vol 3648. Springer, pp 1080–1088
Kasinathan P, Costamagna G, Khaleel H, Pastrone C, Spirito MA (2013) DEMO: an IDS framework for internet of things empowered by 6LoWPAN. In: Proceedings of the 2013 ACM SIGSAC conference on computer and communications security. ACM, pp 1337–1340
Ramesha M, Sridhara SB, Naveena Pai G (2020) FPGA implementation of low power high speed BTED algorithm for 8 bit error correction in cryptography system. Int J Emerg Trends Eng Res 8(7):3893–3897. https://doi.org/10.30534/ijeter/2020/158872020
Kolias C, Kolias V, Kambourakis G (2017) TermID: a distributed swarm intelligence-based approach for wireless intrusion detection. Int J Inf Secur 16(4):401–416
Lazarescu MT (2013) Design of a WSN platform for long-term environmental monitoring for IoT applications. IEEE J Emerg Sel Top Circ Syst 3(1):45–54
Mamun MSI, Kabir AFM (2012) Hierarchical design based intrusion detection system for wireless ad hoc network. Int J Netw Secur Appl (IJNSA) 2(3):102–117
Nadeem A, Howarth MP (2013) A survey of MANET intrusion detection and prevention approaches for network layer attacks. IEEE Commun Surv Tutorials 15(4):2027–2045
Reina DG, Toral SL, Barrero F, Bessis N, Asimakopoulou E (2013) The role of ad hoc networks in the internet of things: a case scenario for smart environments. In: Internet of things and inter-cooperative computational technologies for collective intelligence. Springer, Berlin, Heidelberg, pp 89–113
Schumacher C, Kushalnagar N, Montenegro G (2007) IPv6 over low-power wireless personal area networks (6LoWPANs): overview, assumptions, problem statement, and goals. Available: https://tools.ietf.org/html/rfc4919
Verma SS, Patel RB, Lenka SK (2015) Investigating variable time flood request impact over QOS in MANET. Procedia Comput Sci 57:1036–1041
Watteyne T, Vilajosana X, Kerkez B, Chraim F, Weekly K, Wang Q, Pister K (2012) OpenWSN: a standards-based low-power wireless development environment. Trans Emerg Telecommun Technol 23(5):480–493
Smys S (2019) Energy-aware security routing protocol for WSN in big-data applications. J ISMAC 1(01):38–55
Chen JI, Iong Z (2020) Optimal multipath conveyance with improved survivability for WSN’s in challenging location. J ISMAC 2(02):73–82
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2023 The Author(s), under exclusive license to Springer Nature Switzerland AG
About this paper
Cite this paper
Dankan Gowda, V., Jacob, S.S., Hussain, N., Chennappan, R., Sakhare, D.T. (2023). Convergence of Communication Technologies with Internet of Things. In: Hemanth, J., Pelusi, D., Chen, J.IZ. (eds) Intelligent Cyber Physical Systems and Internet of Things. ICoICI 2022. Engineering Cyber-Physical Systems and Critical Infrastructures, vol 3. Springer, Cham. https://doi.org/10.1007/978-3-031-18497-0_48
Download citation
DOI: https://doi.org/10.1007/978-3-031-18497-0_48
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-031-18496-3
Online ISBN: 978-3-031-18497-0
eBook Packages: EngineeringEngineering (R0)