Abstract
Background: With the advent of IoT, the deployment of batteries with a limited lifetime in remote areas is a major concern. In certain conditions, the network lifetime gets restricted due to limited battery constraints. Subsequently, the collaborative approaches for key facilities to reduce the constraint demands of the current security protocols.
Objective: This work covers and combines a wide range of concepts linked by IoT based on security and energy efficiency. Specifically, this study examines the WSN energy efficiency problem among IoT devices and security for the management of threats in IoT through collaborative approaches and finally outlines the future. The concept of energy-efficient key protocols which clearly cover heterogeneous IoT communications among peers with different resources has been developed. Because of the low capacity of sensor nodes, the energy efficiency in WSNs has been an important concern.
Methods: In this paper, we present an algorithm for Artificial Bee Colony (ABC) which reviews security and energy consumption to discuss their constraints in the IoT scenarios.
Results: The results of a detailed experimental assessment are analyzed in terms of communication cost, energy consumption and security, which prove the relevance of a proposed ABC approach and a key establishment.
Conclusion: The validation of DTLS-ABC consists of designing an inter-node cooperation trust model for the creation of a trusted community of elements that are mutually supportive. Initial attempts to design the key methods for management are appropriate individual IoT devices. This gives the system designers, an option that considers the question of scalability.
Keywords: Energy efficiency, end-to-end security, IoT, artificial bee colony algorithm, collaborative approach, sensor nodes.
Graphical Abstract
[http://dx.doi.org/10.1016/j.comnet.2012.12.018]
[http://dx.doi.org/10.1016/j.future.2013.01.010]
[http://dx.doi.org/10.2174/1872212112666180918165944]]
[http://dx.doi.org/10.2174/1872212113666190215143537]]
[http://dx.doi.org/10.1109/HIS.2009.319]
[http://dx.doi.org/10.1109/ICICES.2013.6508193]
[http://dx.doi.org/10.1109/TWC.2012.032812.110433]
[http://dx.doi.org/10.1007/s12083-013-0220-8]
[http://dx.doi.org/10.1007/978-3-642-00306-6_4]
[http://dx.doi.org/10.1109/ICC.2007.223]
[http://dx.doi.org/10.1016/j.adhoc.2013.05.003]
[http://dx.doi.org/10.1016/j.comnet.2014.02.001]
[http://dx.doi.org/10.2174/2210327909666190401205928]