ABSTRACT
The need for a low-power reliable form of communication is ever-present in a multitude of fields. Our paper aims to develop and explore a security-oriented application of LoRa-based hop-to-hop communication, which provides low-power, large-scale, and long-range solutions to our current safety needs. It utilizes all the components of an IoT-based implementation, in to develop a network, which consists of different types of nodes. It takes input from the external environment through sensors, transports it via several intermediate nodes, using an effective routing algorithm, and provides output through the means of an actuator. The system achieved henceforth is highly scalable, reliable, portable, cheap, and easy to maintain, and provides a fresh outlook on the contemporary need of modernizing the security infrastructure using a growing non-cellular form of communication, LoRa technology.
- U. Noreen, A. Bounceur and L. Clavier, "A study of LoRa low power and wide area network technology," 2017 International Conference on Advanced Technologies for Signal and Image Processing (ATSIP), 2017, pp. 1-6, doi: 10.1109/ATSIP.2017.8075570.Google Scholar
- Augustin, A., Yi, J., Clausen, T., and Townsley, W., 2016. A Study of LoRa: Long Range & Low Power Networks for the Internet of Things. Sensors, 16(9), p.1466.Google Scholar
- Dias and A. Grilo, “LoRaWAN multi-hop uplink extension,” Procedia Computer Science, vol. 130, pp. 424–431, 2018, doi: 10.1016/j.procs.2018.04.063.Google ScholarDigital Library
- R. Berto, P. Napoletano, and M. Savi, “A LoRa-based mesh network for peer-to-peer long-range communication,” Sensors, vol. 21, no. 13, 2021, doi: 10.3390/s21134314.Google Scholar
- Y. Lalle, M. Fourati, L. C. Fourati, and J. P. Barraca, "Routing strategies for lorawan multi-hop networks: a survey and an sdn-based solution for smart water grid," in IEEE Access, vol. 9, pp. 168624-168647, 2021, doi: 10.1109/ACCESS.2021.3135080.Google ScholarCross Ref
- G. Peruzzi and A. Pozzebon, “Combining LoRaWAN and NB-IoT for edge-to-cloud low power connectivity leveraging on fog computing,” Applied Sciences, vol. 12, no. 3, 2022, doi: 10.3390/app12031497.Google Scholar
- E. Aras, G. S. Ramachandran, P. Lawrence, and D. Hughes, "Exploring the security vulnerabilities of LoRa," 2017 3rd IEEE International Conference on Cybernetics (CYBCONF), 2017, pp. 1-6, doi: 10.1109/CYBConf.2017.7985777.Google Scholar
- Singal, G., Laxmi, V., Gaur, M., Rao, D., Kushwaha, R., Garg, D., and Kumar, N., 2022. QoS–aware Mesh-based Multicast Routing Protocols in Edge Ad Hoc Networks: Concepts and Challenges. ACM Transactions on Internet Technology, 22(1), pp.1-27.Google ScholarDigital Library
- Singal, G., Laxmi, V., Rao, V., Todi, S., and Gaur, M., 2016. Improved multicast routing in MANETs using link stability and route stability. International Journal of Communication Systems, 30(11), p.e3243.Google ScholarCross Ref
- Singal, Gaurav, Vijay Laxmi, Manoj Singh Gaur, Swati Todi, Vijay Rao, and Akka Zemmari. "MCLSPM: Multi-constraints link stable multicast routing protocol in adhoc networks." In 2016 Wireless Days (WD), pp. 1-6. IEEE, 2016.Google Scholar
- Brahmbhatt, S., Kulshrestha, A. and Singal, G., 2015. SSLSM: Signal Strength Based Link Stability Estimation in MANETs. 2015 International Conference on Computational Intelligence and Communication Networks (CICN).Google Scholar
- Singal, G., Garg, H., Laxmi, V., Gaur, M., and Lai, C., 2014. Impact analysis of attacks in multicast routing algorithms in MANETs. 2014 9th International Conference on Industrial and Information Systems (ICIIS).Google Scholar
- “Wireless, Sensing & Timing DATASHEET - Adafruit Industries,” SX1276/77/78/79 - 137 MHz to 1020 MHz Low Power Long Range Transceiver. [Online]. Available: https://cdn-shop.adafruit.com/product-files/3179/sx1276_77_78_79.pdf. [Accessed: 26-Apr-2022].Google Scholar
- Kumar, Rakesh, Mayank Swarnkar, Gaurav Singal, and Neeraj Kumar. "IoT Network Traffic Classification using Machine Learning Algorithms: An Experimental Analysis." IEEE Internet of Things Journal (2021).Google Scholar
- Ahuja, Nisha, Gaurav Singal, and Debajyoti Mukhopadhyay. "DLSDN: Deep learning for DDOS attack detection in software defined networking." In 2021 11th International Conference on Cloud Computing, Data Science & Engineering (Confluence), pp. 683-688. IEEE, 2021.Google Scholar
- Thomas, Ashish, Vijay Kr Sharma, and Gaurav Singhal. "Secure link establishment method to prevent jelly fish attack in MANET." In 2015 International Conference on Computational Intelligence and Communication Networks (CICN), pp. 1153-1158. IEEE, 2015.Google Scholar
- Patel, Narendra Kumar, and Gaurav Singal. "Selective Forwarding Attack In Leach In Wsn." Int. J. Electron. Electr. Comput. Syst. Ijeecs 1, no. 1 (2013): 1-5.Google Scholar
- Ahuja, Nisha, Gaurav Singal, Debajyoti Mukhopadhyay, and Ajay Nehra. "Ascertain the efficient machine learning approach to detect different ARP attacks." Computers and Electrical Engineering 99 (2022): 107757.Google ScholarDigital Library
- Jain, Shreyansh Sharad, Gaurav Singal, Deepak Garg, and Suneet Kumar Gupta. "SecureDorm: Sensor-Based Girls Hostel Surveillance System." In Smart Systems and IoT: Innovations in Computing, pp. 327-337. Springer, Singapore, 2020.Google Scholar
Index Terms
- De-Fence: LoRa based Hop-to-Hop Communication
Recommendations
Research on Time Synchronization and Routing Maintenance for Narrowband Ad Hoc Networks
AISS '22: Proceedings of the 4th International Conference on Advanced Information Science and SystemNarrowband communication technology has a wide range of applications in the field of Internet of Things (IoT), but in a network with high-dynamic topologies, the direct application of existing time synchronization and routing protocols has problems such ...
A hop-by-hop delay-constrained routing algorithm with explicit loop avoidance and backup routing information: Research Articles
QoS Routing is crucial for QoS provisioning in high-speed networks. In general, QoS routing can be classified into two paradigms: source routing and hop-by-hop routing. In source routing, the entire path to the destination node of a communication ...
The MauMe network - A LoRa multi-hop collaborative protocol and low-cost implementation example
Highlights- There is no collaborative multihop LoRa protocol. Users ’nodes cannot relay each-other's messages.
AbstractLow-cost low-power long-distance LoRa radio devices recently made available on the market allow the emerging of a new generation of networking paradigms on the Internet of Things. While the LoRaWan offers an efficient way of connecting ...
Comments