Inicio  /  Drones  /  Vol: 6 Par: 9 (2022)  /  Artículo
ARTÍCULO
TITULO

Dwarf Mongoose Optimization-Based Secure Clustering with Routing Technique in Internet of Drones

Fatma S. Alrayes    
Jaber S. Alzahrani    
Khalid A. Alissa    
Abdullah Alharbi    
Hussain Alshahrani    
Mohamed Ahmed Elfaki    
Ayman Yafoz    
Abdullah Mohamed and Anwer Mustafa Hilal    

Resumen

Over the last few years, unmanned aerial vehicles (UAV), also called drones, have attracted considerable interest in the academic field and exploration in the research field of wireless sensor networks (WSN). Furthermore, the application of drones aided operations related to the agriculture industry, smart Internet of things (IoT), and military support. Now, the usage of drone-based IoT, also called Internet of drones (IoD), and their techniques and design challenges are being investigated by researchers globally. Clustering and routing aid to maximize the throughput, reducing routing, and overhead, and making the network more scalable. Since the cluster network used in a UAV adopts an open transmission method, it exposes a large surface to adversaries that pose considerable network security problems to drone technology. This study develops a new dwarf mongoose optimization-based secure clustering with a multi-hop routing scheme (DMOSC-MHRS) in the IoD environment. The goal of the DMOSC-MHRS technique involves the selection of cluster heads (CH) and optimal routes to a destination. In the presented DMOSC-MHRS technique, a new DMOSC technique is utilized to choose CHs and create clusters. A fitness function involving trust as a major factor is included to accomplish security. Besides, the DMOSC-MHRS technique designs a wild horse optimization-based multi-hop routing (WHOMHR) scheme for the optimal route selection process. To demonstrate the enhanced performance of the DMOSC-MHRS model, a comprehensive experimental assessment is made. An extensive comparison study demonstrates the better performance of the DMOSC-MHRS model over other approaches.

 Artículos similares

       
 
Tolijan Trajanovski and Ning Zhang    
The leaked IoT botnet source-codes have facilitated the proliferation of different IoT botnet variants, some of which are equipped with new capabilities and may be difficult to detect. Despite the availability of solutions for automated analysis of IoT b... ver más
Revista: Future Internet

 
Dawei Wei, Feifei Shi and Sahraoui Dhelim    
The identification of Internet protocols provides a significant basis for keeping Internet security and improving Internet Quality of Service (QoS). However, the overwhelming developments and updating of Internet technologies and protocols have led to la... ver más
Revista: Future Internet

 
Liang Jiang, Jie Chen, Ye Tian and Jing Luo    
Basic education resources are basic urban and rural social public security resources, and their spatial distribution is an important issue related to people?s livelihoods and social justice. Taking Wuhan as a case study, this paper analyzed the spatial d... ver más

 
Eunseo Kwon, Sungwon Jung and Jaewook Lee    
Crime prediction research using AI has been actively conducted to predict potential crimes?generally, crime locations or time series flows. It is possible to predict these potential crimes in detail if crime characteristics, such as detailed techniques, ... ver más

 
Bing Han, Mingxing Hu, Jiemin Zheng and Tan Tang    
The rapid expansion of cities brings in new challenges for the urban firefighting security, while the increasing fire frequency poses serious threats to the life, property, and safety of individuals living in cities. Firefighting in cities is a challengi... ver más