[BACK]
Intelligent Automation & Soft Computing
DOI:10.32604/iasc.2022.024134
images
Article

Decentralized Link Failure Prevention Routing (DLFPR) Algorithm for Efficient Internet of Things

D. Kothandaraman1,*, M. Manickam2, A. Balasundaram3, D. Pradeep4, A. Arulmurugan5, Arun Kumar Sivaraman6, Sita Rani7, Barnali Dey8 and R. Balakrishna9

1School of Computer Science and Artificial Intelligence, SR University, Warangal, Telangana, 506371, India
2Department of Networking and Communications, SRM Institute of Science and Technology, Kattankulathur, Chennai, Tamil Nadu, 603203, India
3School of Computer Science and Engineering, Center for Cyber Physical Systems, Vellore Institute of Technology (VIT), Chennai, Tamil Nadu, 600127, India
4Department of Computer Science and Engineering, M. Kumarasamy College of Engineering, Karur, Tamil Nadu, 639113, India
5Department of Computer Science and Engineering, Vignan’s Foundation for Science, Technology & Research, Guntur, Andhra Pradesh, 522213, India
6School of Computer Science and Engineering, Vellore Institute of Technology (VIT), Chennai, Tamil Nadu, 600127, India
7Department of Computer Science and Engineering, Gulzar Group of Institutions, Khanna, Punjab, 141401, India
8Department of Information Technology, Sikkim Manipal Institute of Technology, Sikkim Manipal University, Sikkim, 737136, India
9Department of Computer science and Engineering, Vels Institute of Science Technology and Advanced Studies (VISTAS), Chennai, Tamil Nadu, 600117, India
*Corresponding Author: D. Kothandaraman. Email: kothanda_raman_d@srecwarangal.ac.in
Received: 06 October 2021; Accepted: 11 January 2022

Abstract: This work implements a Decentralized Links Failure Prevention (DLFP) routing algorithm to promote enhanced and efficient Internet of Things (IoT). The work increases the mobility as well as an opportunity for loss of IoT node meeting links due to both mobility and blockers/interferers. The proposed algorithm overcomes loss issues as well as works in dynamically allocating alternate route from other IoT nodes available in near and selecting for efficient route in the network. When the link fails, bandwidth is reduced and coverage area problems for packets sending from source to destination is managed. The proposed algorithm works with light-weight wireless mesh based route handling techniques. In such case, reduced link failure, removal of route discovery latency, communication cost and control overheads, energy consumptions and network life time are to be handled with care. To address these issues, the proposed algorithm enhances the Packet Delivery Ratio (PDR) as well as transmission packet efficiently received through destination node. The ability of Dynamic Alternate Routing (DAR) to relay node handling capabilities and to improve the communication link availability of IoT nodes has ultimately increased the PDR. Simulation work was done using Network Simulator 3 (NS3) and the results show that the performance is better when compared with existing Dynamic Source Routing (DSR) and Energy Efficient Delay Tolerant Routing (EEDTR) algorithm.

Keywords: IoT; communication links; decentralized; mobility; routing performance

1  Introduction

This work focuses mainly on Dynamically Alternate Route (DAR) handling techniques. This is a local search mechanism used for reconfiguration, discovery and addition of new nodes along with efficient handling of loss and recurrent routes, real time gathering of local link status [1,2] effective packets forwarding through dynamically mesh handling in the network operate by providing for route related such as source node route establishment towards the destination node in case change of established routes due to mobility [3]. At the same time route discovery latency should also be minimal. It should possess dynamic route handling techniques in IoT such as, mobility pattern transmission range [4,5], and interferences. Instead, an IoT mobility model is proposed where these features are captured by a single parameter λ.

Let, 0 ≤ λ ti,j(1) < λ ti,j(2) < · · · be the IoT node-successive meeting times of nodes i and j (i#j ). The node state is denoted as τi,j(n):= λ ti,j(n + 1)λ ti,j(n), the nth IoT node-meeting time of nodes i and j may only take place when nodes meeting times sends the packets to nearby nodes with respective time stamps [6,7]. This present work has addressed this main issue by introducing a packet delay while transferring a packet from node i to node j IoT node. Potential links make use of intermediary mobile IoT nodes [810].

In IoT networks, communication takes place between node i to node j in meeting-time λ ti,j(n). If node i transmits the packets a time λ ti,j(n) and is not delivered, obviously packets are lost [11,12]. To overcome the loss issues the authors propose to use dynamic alternate route allocating and communicate packets to destination IoT nodes. Due to these issues, the performance enhancement of DAR in terms of latency, throughput, etc., is difficult to achieve [1318]. This underlines the significance and imminent need of this proposed work.

2  Proposed Approach

The proposed algorithm used in the model is a dynamic mesh topology that is built by dynamic routing. The stochastic technique considers a network with G = (N, L), n IoT nodes (n=|N|) and m links (m=L). There is a packet to be sent when an IoT node meets a sender node. They are then synced via intermediate nodes. The parameters (M/M/C) of constant-service queue as follows:

IoT nodes-arrival route-queue follows Poisson distribution with parameter λ.

Pn=λ0,λ1,......λn1μ1,μ2,......,μnPo (1)

The packets send a hypothetical network load which is exponential with parameter μ, and this theoretical work-load is due to IoT-MT of nodes as defined [19] by follows (1).

μ=8υRπTA (2)

where, v is the constant velocity of the links, trans-mission radius is R of the links; A is coverage area of IoT nodes in the network. and ρ=λμ

When ρc>1 , the IoT nodes is out of coverage area.

When ρc<1 , the IoT nodes is coverage area to transmit the packets towards the destination.

The steady state probability of IoT nodes are shown in (3).

Po=[k=0c1ρkk!+ρcc!×11ρc]1ifρc<1 (3)

The coverage area of nodes follows (3). The out of coverage nodes that do not follow (3) are considered as unstable. The IoT nodes contact-pattern follows the route depicted in (1). Then, the sender node (i) is modelled by M/M/C multi-server queuing parameters.

2.1 Random Direction 2D Mobility Model (RD2DMM)

The IoT nodes-meeting time starts sending packets to the random node. Else, the two IoT nodes are considered to be meeting each other. The IoT nodes gathering time is distinct from the time those authorizations of two successive meetings for each node. The nodes maintain the same communication range r. The RD2DMM in the node meeting and the IoT nodes gathering times are exponential distributions. The static communication radius is lesser when compared with distance (M).

2.2 Exponential Arrival Time λ of IoT Meeting Nodes

Modelling of IoT nodes i and j with Probability success rate (P) follows exponential distribution. The velocity and positions of the IoT nodes originate this P by using (xi, yi), (xj, yj) with P(xi, yi), P(xj, yj). Within the next time ∆t of the IoT nodes, future meeting of other nodes happen. The P(xi, yi) is dependent on the Coverage Area (CA) at ∆t time [2028]. The coverage area and the number of nodes are highly inter related and determine the network performance. As showed in Fig. 1, the Coverage Area (CA) is given by 2rVi∆t.

images

Figure 1: CA covered by IoT nodes i and j1 during a time ∆t

The IoT node j2 in time ∆t adheres to a stationary distribution. Also, the velocity of IoT node j2 is considered for interpretation. The j2 IoT node is in its immobile position. The probability P for j2 IoT node which is positioned in Coverage area CA is given by (4) and (5).

pxi,yi=CAπ(xi,yi)dxdy (4)

pxj,yj=CAπ(xi,yi)dxdy (5)

where, r the points π(xi, yi) in CA as estimated by π(xi, yi) and π(xj, yj). This is to give by (6).

pxi,yi2r.Vi.Δt.π(xi,yi).

pxj,yj2r.Vj.Δt.π(xj,yj) (6)

Conditioning IoT-node in position of the pointers the p within the next-time of ∆t of i and j, IoT-nodes has to meet each other as showed in (7)

p=0M0Mpxi,yiπ(xi,yi)dxidyi

2r.Vi.Δt0M0Mπ2(xi,yi)dxidyi (7)

Initially ∆t → 0. This gives an exponential with parameter as showed in (8)

λ2rVi0M0Mπ2(xi,yi)dxidyi (8)

In this scenario, the node j2 is in mobility with velocity Vj = vj. The node j2 has to meet other node in the next time interval ∆t. As shown in Fig. 2, CA depends on V∗ and the relay IoT node between the nodes and j.

images

Figure 2: Position as changing the node j2 has to be meeting in nodes i

If i is the node in (xi, yi), then the probability of a “success” is given by (9)

pxi,yi=CAπ(xi,yi)dxidyi (9)

2r.V.Δt.π(xi,yi)

Then, the area of CA is 2r ·V∗· ∆t. Applying the same logic over all starting positions of IoT node, i is given by (10).

p=0M0Mpxi,yiπ(xi,yi)dxidyi

2r.V.Δt.0M0Mπ2(xi,yi)dxidyi (10)

where, ∆t → 0 indicates the exponential growth as shown in (11)

λ2rV0M0Mπ2(xi,yi)dxidyi (11)

The IoT nodes gathering time is distinct from the time the authorizations of two successive meetings for each node within the same communication range r. The RD2DMM and the IoT nodes gathering times are exponentially distributions and extended as the static communication radius is lesser when compared with the distance (M).

2.3 IoT Nodes Meeting Time Distribution

Let i and j IoT nodes move free between each other in M × M with velocity Vi and Vj. Let IE[V∗] be the average transmit velocity of two IoT nodes, π(xi, yj) positions in the steady-state. If the communication range r << M, position of the node time t is independent of it position at time t + ∆t, and then IoT node-meeting time (F) of the nodes is exponential of λ is given in (12)

λ2rIE[V]0M0Mπ2(x,y)dxdy (12)

The average time till the two IoT nodes has met is showed in (13)

IE[F]1λ1λ2rIE[V]0M0Mπ2(x,y)dxdy (13)

The meeting time distribution has to be applied to RD2DMM measures. The IoT node spatial distribution and the average relay node velocity IE[V∗] are to be computed. Let π(x, y) probability distribution function of the spatial IoT node mobility in M × M as showed in (14).

0M0Mπ2(x,y)dxdy=1M2 (14)

where, IoT nodes transmit for according to the RD2DMM.

2.4 Relay Nodes Velocity Distribution

The IoT nodes travel in a direction as that of a straight-line and the combined transmission is uniformly distributed. If the IoT nodes are travelling with velocity Vi = vi and Vj = vj, then the Cumulative Distribution Functions (CDF) of the relative velocity is shown in (15).

P(Vτ|Vi=τi;Vj=τj)={0,ifτ|τiτj|,1pcos1(τi2+τj2τ22τiτj)if|τiτj|<τ<τi+τj,1,  ifττi+τj (15)

The Conditional probability Density Function (CDF) follows the derivative in (16).

fV(τ|Vi=τi;Vj=τj)={τ1(τi2+τj2τ22τiτj)2pτiτj,if|τiτj|<τ<τi+τj,0,othewise (16)

If the change of direction and velocity is selected uniformly from (vmin, vmax), then the PDF of the average relay velocity under the RD2DMM is the expected value as depicted by (17).

IE[V]=02τmaxfV(τ)dτ (17)

2.5 Relay Nodes Travelling At Constant Velocity

For two IoT nodes travelling at the same velocity, the CDF of the relay velocity for the random direction is given by (18).

P(Vτ|Vi=τ=Vj)=2psin1(τ2τ) (18)

The distribution function is,

fV(τ|Vi=τ=Vj)=11(τ/2τ)2pτ=24τ2τ2p

The average relay velocity is shown in (19).

IE[V|Vi=τ=Vj]=4τp (19)

When Vi = v = Vj as in (20),

P(Vτ|Vi=τ=Vj)=1pcos1(12(τ2τ)2) (20)

P(Vτ|Vi=τ=Vj)=12pcos1(τ2τ)=2psin1(τ2τ) (21)

The average relay velocity which is given in (18) is greater than v, the velocity of every node. The average relay velocity is equal to v.

2.6 IoT Node Meeting Times And Random Direction

The IoT node meeting time for the RD2DMM for r << M and is approximately exponentially (λRD) distributed, where λRD is

λRD2rIE[V]M2 (22)

The expected time until nodes i and j meet is given by (23).

IE[FRD]M22rIE[V] (23)

The average relay velocity has been calculated using (14) and (15). If the velocities of i and j IoT nodes are same and constant, i.e., V1 = v = V2, then as shown in (24),

λRD8rυpM2

IE[FRD]=pM28rυ (24)

IoT relay velocity is shows in (25).

V2=(τi+τjcos(πΓ))2+(τjsin(πΓ))2=τi2+τj22τiτjcos(Γ) (25)

The relationship to derive the CDF is shown in (26).

P(V*τ*|Vi=τi;Vj=τj)=P(τi2+τj22τiτjcos(Γ)τ*2|Vi=τi;Vj=τj)            =P(cos(Γ)τi2+τj2τ*22τiτj)|Vi=τi;Vj=τj )            =P(| Γ |cos1(τi2+τj2τ*22τiτj)Vi=τi;Vj=τj)(26)

The velocity of an IoT node at a random-model in time to unconditional position is shown in (15). If the velocity of a node that is designated is uniform [vmin, vmax], then the velocity of a node under the RD2DMM is uniformly distributed and so fVi(vi) = 1/(vmax – vmin).

3  Dynamic Alternate Route Handling Techniques

The present algorithm has been implemented using dynamic alternate routing handling techniques. It follows different models such as direction, positions changes, IoT nodes within range and out of transmission range. The evaluation of the IoT node meeting time between nodes i and j1 has transmitting packets while other nodes are out of the range. These out of range nodes may in future come within the range as showed in Fig. 3.

images

Figure 3: IoT node meeting time between i and j1

In Fig. 2, IoT nodes j2 have various direction at t = 0. The position of IoT nodes; i = 1, 2….N, j = 1, 2….N at that moment be given by (xi, yi),(xj, yj). The direction is denoted by αi, αj and the speed is denoted by si, sj,. The IoT node i and j at t ≥ 0 is shown in (8).

xi(t)=xi+t sicos(αi), (27)

yi(t)=yi+t sisin(αi). (28)

xj(t)=xj+t sjcos(αj), (29)

yj(t)=yi+t sjsin(αj). (30)

The IoT node is considered to have met or discrete since each other at t time and is of the distance R. Substituting in eqs. (27)(30).

R=x1+ts1cos(α1)x2+ts2cos(α2))2+y1+ts1sin(α1)y2+ts2sin(α2))2

=((x1x2)+t(s1cos(α1)s2cos(α2)))2+((y1y2)+t(s1sin(α1)s2sin(α2)))2

=(x1x2)2+(y1y2)2

+2t((x1x2)(s1cos(α1)s2cos(α2))+(y1y2)(s1sin(α1)s2sin(α2)))+t2(s1cos(α1)s2cos(α2))2+(s1sin(α1)s2sin(α2))2

Resolving this 2 degree polynomial in t gives Eqs. (31) and (32)

t1=bb24ac/2a (31)

t2=b+b24ac/2a. (32)

where;

a:=h21+h22,h1:=s1cos(α1)s2cos(α2),

b:=2(x1x2)h1+2(y1y2)h2,h2:=s1sin(α1)s2sin(α2),

c:=(x1x2)2+(y1y2)2R2.

Here t1and t2, give the mobility’s of in time nodes when the IoT Nodes sends data into the range with one another and when it is range with each other. If;

1. if(b24ac<0)

The two IoT nodes never meet in the range;

2. elseif(ti1<0&&tj1<0)

IoT node meeting and separate in the past;

3. elseif(ti1<0&&tj10)

The IoT node in range at t = 0 and discrete future at tj

4. elseif(ti10&&tj10)

IoT nodes meet in future at t1 and discrete at tj. The IoT nodes t1and t2 as compared to the time until the next-change of direction or suitable event can be scheduled in the IoT networks.

4  Experimental Results and Discussion

The present work results have been evaluated using NS3. Based on these results, measures for regulating IoT battery power consumption, bandwidth consumption, increasing the PDR, residual energy of IoT nodes and reducing the control overhead is carried out. The parameter has considered in simulation as shown in Tab. 1.

images

Fig. 4 shows the IoT node meeting time vs. PDR for Decentralized Links Failure Prevention Routing (DLFPR) and other existing algorithm. When the IoT meeting nodes increase from 10 to 100, the PDR was obtained as 99.5% for DLFPR in IoT network. For Energy Efficient Delay Tolerant Routing (EEDTR), the PDR was obtained as 80.12% and for DSR it was 70.2%. Hence proposed algorithm shows 29.3% improved over DSR. The DSR is relatively less efficient when PDR is considered. Also, the IoT nodes are scalable without any performance issues.

images

Figure 4: No. of IoT-nodes meeting vs. PDR

Fig. 5 shows the IoT meeting nodes vs. Control overhead for DLFPR and other existing algorithm. Control overhead is significant to gauging the performance and latency. When the IoT meeting nodes increase from 10 to 100, the control overhead was obtained by 498 for DLFPR in IoT. For EEDTR it was obtained as 1010 and for DSR is 1200. Hence, the proposed algorithm shows 51.2% improved over EEDTR and 20.5%.over DSR. Also, as the number of IoT nodes increases we can observe that there is no performance degradation in PDR.

images

Figure 5: Number of IoT-nodes meeting time vs. control overhead

Fig. 6 shows the IoT nodes meeting time in speed(m/s) vs. average residual energy for DLFPR and other existing algorithm. When the speed increases from 2 to 10 m/s, the average residual energy was observed as 3750 mwhr for DLFPR for IoT, while the same was obtained by 3250 mwhr for EEDFT and for DSR was obtained by 2550 mwhr. Hence the proposed DLFPR shows the 37.6% improved over DSR and 14.5 over DSR.

images

Figure 6: IoT-nodes meeting time in speed(m/s) vs. residual energy

5  Conclusion

This work proposes a statistical analysis of stochastic properties of RD2DMM. It has investigated the length and duration of IoT nodes mobility between two way-points. Also, the spatial IoT-node and its dependence on the pause- time was analyzed. The selection of direction angle at the start of a IoT nodes mobility transition, and the number of position changes for an random-way-point model used in a IoT network were discussed. Results indicated PDR as 99.5%, Control Overhead was 51.2% and speed vs. average residual energy of IoT meeting nodes was obtained as 37.6%. These were good numbers when compared with existing algorithm. Also, this work is highly scalable to accommodate more nodes without any performance degradation. All the results analysis and simulation has been carried out using IoT wireless networks. Future work will be focused towards experimenting with more nodes and evaluating the performance with more Quality of Service (QoS) parameters.

Acknowledgement: The authors wish to express their thanks to one and all who supported them during this work.

Funding Statement: The authors received no specific funding for this study.

Conflicts of Interest: The authors declare that they have no conflicts of interest to report regarding the present study.

References

  1. V. Mahendran and C. Sivarammurthy, “Buffer dimensioning of DNT replication-based routing nodes,” IEEE Communications Letters, vol. 17, no. 1, pp. 11–25, 2013.
  2. R. Aggarwal, S. Manickam and C. Sivarammurthy, “Cross-Layer user pairing for CSM in IEEE 8016 networks,” IEEE Communications Letters, vol. 15, no. 5, pp. 37–52, 2011.
  3. M. Lee, R. Zhang, C. Zhu, T. T. Park, C. Shin et al., “Meshing wireless personal area networks: Introducing IEEE 802.15.5,” IEEE Communications Magazine, vol. 11, no. 5, pp. 73–91, 2010.
  4. R. Groenevelt, Stochastic models for mobile Ad Hoc networks. University of Nice Sophia Antipolis, Nice, France, 2005.
  5. M. J. Lee, R. Zhang, J. Zheng, G. S. Ahn, C. Zhu et al., “IEEE 802.15 WPAN mesh standard-low rate part: Meshing the wireless sensor networks,” IEEE Journal on Selected Areas in Communications, vol. 28, no. 7, pp. 34–49, 2010.
  6. D. Kothandaraman and C. Chellappan, “Direction detecting system of indoor smartphone users using BLE in IoT,” Circuits and Systems, vol. 7, no. 8, pp. 1492–1503, 201
  7. D. Kothandaraman and C. Chellappan, “Human movement tracking system with smartphone sensing and bluetooth low energy in internet of things,” Asian Journal of Information Technology, vol. 15, no. 4, pp. 661–669, 2016.
  8. D. Kothandaraman and C. Chellappan, “Human activity detection system using internet of things,” International Journal on Computer Science and Engineering, vol. 9, no. 11, pp. 657–665, 2017.
  9. D. Kothandaraman and C. Chellappan, “Node rank based energy efficient routing algorithm for mobile Ad-Hoc network,” International Journal of Computer Networks & Communications, vol. 11, no. 1, pp. 45–61, 201
  10. A. Balasundaram, S. Ashokkumar, D. Kothandaraman, E. Sudarshan and A. Harshaverdhan, “Computer vision based fatigue detection using facial parameters,” IOP Conference Series: Materials Science and Engineering, vol. 981, no. 2, pp. 21–37, 2020.
  11. A. Balasundaram, D. Kothandaraman, P. J. Sathish Kumar and S. Ashokkumar, “An approach to secure capacity optimization in cloud computing using cryptographic hash function and data de-duplication,” in 2020 3rd Int. Conf. on Intelligent Sustainable Systems (ICISS), Chennai, India, pp. 1256–1262, 2020.
  12. A. Harshavardhan, D. Ramesh, S. N. Pasha, S. Shwetha, S. Mohmmad et al., “IOP conference series: Materials science and engineering,” Lifting Wheelchair for Limbless People, vol. 981, no. 2, pp. 43–61, 2020.
  13. M. Pushpalatha, R. Venkataraman and T. Ramarao, “Trust based energy aware reliable reactive protocol in mobile ad hoc networks,” World Academy of Science, Engineering and Technology, vol. 56, no. 68, pp. 356–359, 2020.
  14. T. Senthilmurugan and K. Eswariah, “Link stability with energy aware ad hoc on demand multipath routing protocol in mobile ad hoc networks,” American Journal of Applied Sciences, vol. 10, no. 8, pp. 844–848, 2013.
  15. K. Vishant, J. S. Chauhan and K. Ankit, “A comparative study of broadcast based routing protocols in mobile ad hoc networks,” International Journal of Application or Innovation in Engineering & Management (IJAIEM), vol. 2, no. 12, pp. 277–282, 2013.
  16. A. Alhemyari, I. Mahamod, R. Hassan and S. Saeed, “Improving link stability of multicasting routing protocol in MANETs,” Journal of Theoretical and Applied Information Technology, vol. 55, no. 1, pp. 109–116, 2013.
  17. A. Whitmore, A. Agarwal and L. Da Xu, “The internet of things – A survey of topics and trends,” Information Systems Frontiers, vol. 17, no. 2, pp. 261–274, 2015.
  18. F. Liu, Y. Wang, M. Liu, K. Liu and D. Wu, “A distributed routing algorithm for data collection in low-duty-cycle wireless sensor network,” IEEE Internet of Things Journal, vol. 4, no. 5, pp. 1420–1433, 2017.
  19. A. Shashank, R. Vincent, A. K. Sivaraman, A. Balasundaram, M. Rajesh et al., “Power analysis of household appliances using IoT,” in 2021 Int. Conf. on System, Computation, Automation and Networking (ICSCAN), Puducherry, India, pp. 1–5, 2021.
  20. H. Kharrufa, H. A. Al-Kashoash and A. H. Kemp, “RPL-based routing protocols in IoT applications: A review,” IEEE Sensors Journal, vol. 19, no. 15, pp. 5952–5967, 2019.
  21. E. Ahmed, I. Yaqoob and A. Gani, “Internet-of-Things based smart environments: State of the art, taxonomy, and open research challenges,” IEEE Wireless Communications, vol. 23, no. 5, pp. 10–16, 2016.
  22. A. Surjeet, A. Parkash and R. Tripathi, “QoS bandwidth estimation scheme for delay sensitive applications in MANETs,” Communications and Network, vol. 5, no. 1, pp. 1–8, 2013.
  23. M. Pushpavalli, A. M. Natarajan and N. Annitha, “A quality of service based AODV with QoS-aware routing algorithms for MANETs,” International Journal of Application or Innovation in Engineering & Management (IJAIEM), vol. 2, no. 2, pp. 199–204, 2013.
  24. D. Kothandaraman, A. Balasundaram, R. Dhanalakshmi, A. K. Sivaraman, S. Ashokkumar et al., “Energy and bandwidth based link stability routing algorithm for IoT,” Computers, Materials & Continua (CMC), vol. 70, no. 2, pp. 3875–3890, 2021.
  25. S. S. Dhenakaran and A. Parvathavarthini, “An overview of routing protocols in mobile ad hoc network,” International Journal of Advanced Research in Computer Science and Software Engineering, vol. 3, no. 2, pp. 251–259, 2013.
  26. P. Pramod Kumar, C. H. Sandeep and S. Nareshkumar, “An overview of the factors affecting handovers and effective highlights of handover techniques for next generation wireless networks,” Indian Journal of Public Health Research & Development, vol. 9, no. 11, pp. 12–25, 2018.
  27. Bura Vijay Kumar, S. N. Korra, N. Swathi, D. Kothandaraman, N. Yamsani et al., “Traffic control system for vehicles on indian roads using raspberry PI,” IOP Conference Series: Materials Science and Engineering, vol. 981, no. 3, pp. 67–81, 2020.
  28. V. Thirupathi and K. Sagar, “Web of Things an intelligent approach to solve interoperability issues of Internet of Things communication protocols,” IOP Conf. Series: Materials Science and Engineering, vol. 981, no. 5, pp. 23–31, 2020.
images This work is licensed under a Creative Commons Attribution 4.0 International License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.