Visible to the public Routing Table Management using Dynamic Information with Routing Around Connectivity Holes (RACH) for IoT Networks

TitleRouting Table Management using Dynamic Information with Routing Around Connectivity Holes (RACH) for IoT Networks
Publication TypeConference Paper
Year of Publication2019
AuthorsKapoor, Chavi
Conference Name2019 International Conference on Automation, Computational and Technology Management (ICACTM)
ISBN Number978-1-5386-8010-0
Keywordsback testing, Blackhole attack, blackhole attacks, Computational modeling, continuous analytical systems, data collection applications, Delay Optimization, delays, dense architectures, dense networks, dynamic information, failure analysis, historical systems, Internet of Things, IoT networks, IoT routing, Mathematical model, node failures, Path Recovery, Peer-to-peer computing, probability, pubcrawl, RACH, radio networks, resilience, Resiliency, route poisoning, Routing, routing around connectivity holes, routing scheme, routing table management, Scalability, software malfunctioning, sparse architectures, telecommunication network management, telecommunication network reliability, telecommunication network routing, telecommunication security, time series, time-series analytics, Wireless communication, wireless network, wireless nodes, wormhole attacks

The internet of things (IoT) is the popular wireless network for data collection applications. The IoT networks are deployed in dense or sparse architectures, out of which the dense networks are vastly popular as these are capable of gathering the huge volumes of data. The collected data is analyzed using the historical or continuous analytical systems, which uses the back testing or time-series analytics to observe the desired patterns from the target data. The lost or bad interval data always carries the high probability to misguide the analysis reports. The data is lost due to a variety of reasons, out of which the most popular ones are associated with the node failures and connectivity holes, which occurs due to physical damage, software malfunctioning, blackhole/wormhole attacks, route poisoning, etc. In this paper, the work is carried on the new routing scheme for the IoTs to avoid the connectivity holes, which analyzes the activity of wireless nodes and takes the appropriate actions when required.

Citation Keykapoor_routing_2019