Document Type : Primary Research paper
Associate Professor, Department of Computer Science & Engineering, Koneru Lakshmaiah Education Foundation (KLEF),Greenfields, Vaddeswaram, Guntur-522502.
Associate Professor, Department of Electronics and Communications Engineering, R.V.R and J.C College of Engineering, Chowdavaram, Andhra Pradesh – 522019.
Associate Professor, Department of Electronics and Communications Engineering, Chaitanya Bharathi Institute of Technology, Gandipet, Hyderabad – 500075.
Assistant Professor, Department of Electronics and Communications Engineering, CMR Technical Campus , Kandlakoya, Medchal, Hyderabad, Telangana, 50140.
Assistant Professor, Department of Electronics and Communication Engineering, Erode Sengunthar Engineering College, Perundurai, Erode, Tamilnadu, India – 638057.
Assistant Professor, Department of Information Technology, Sri Krishna College of Engineering and Technology, Kuniamuthur, Coimbatore-641008.
– In the creation of smart networks, the Internet of Things (IoT) has advanced
across the globe. The goal is to add a network edge for IoT computers to use intelligent
networks and computation. In addition , in the event of a crisis, this implementation will
not only improve the consumer service but also offer company reliability. IoT distributed
infrastructure and end-user proximity are used by Edge computing to allow quick response
and increase service quality. The security dilemma, however, is mostly discussed in order to
resolve the possibility of attacks (VoA). In recent studies, choosing sensor nodes or
guardian nodes has become a difficult operation. Often, to address their individual
positions within the network, the opponents switch from one location to another. We
therefore advise the institution to use the symmetrical two-fish key approach to identify and
escape opponents in the global sensor network to provide flexible security using a stable
routing and tracking protocol with multi-variant tuples. With the Qualifying Weight
Function (EWF), using a complex symmetric key, the sensor guard nodes are selected and
concealed. By inheriting both the Multipath Optimized Connection State Routing (OLSR)
and Ad hoc On-Demand Multipath Distance Vector (AOMDV) functionality, a stable
hybrid routing protocol is selected to be developed. Compared to present routing systems,
the result of the planned solution shows a vast number of control nodes. In contrast, the
routing technique adopted is robust and makes the delivery of multipath, including
adversaries of mobile applications.