Consecutive Geographic Multicasting Protocol in Large-Scale Wireless Sensor Networks

Size: px
Start display at page:

Download "Consecutive Geographic Multicasting Protocol in Large-Scale Wireless Sensor Networks"

Transcription

1 21st Annual IEEE International Symposium on Personal, Indoor and Mobile Radio Communications Consecutive Geographic Multicasting Protocol in Large-Scale Wireless Sensor Networks Jeongcheol Lee, Euisin Lee, Soochang Park, Seungmin Oh, and Sang-Ha Kim Department of Computer Engineering Chungnam National University 22 Gung-dong, Yuseong-gu, Daejeon, , Republic of Korea {jclee, eslee, winter, and Abstract For multicast applications with large-scale groups in large-scale wireless sensor networks, it is an important issue for energy saving in geographic multicasting both to obtain location information of destination nodes and to construct the geographic multicast tree efficiently. To address this issue, there have been proposed global search based hierarchical geographic multicasting protocols. Such protocols divide the whole network into many multiple small areas and a leader node in each area manages the location information of destination nodes in its area. However, since they find location information of such leader nodes through global location search at a source, they consume much energy. Also, since they exploit hierarchical geographic multicast trees that have a higher tree consisting of the source node and the leader nodes and a lower tree consisting of a leader node and destination nodes in the area of the leader node, they consume more energy due to data detouring. To solve the problems of global search based hierarchical geographic multicasting protocols, we propose a local search based consecutive geographic multicasting scheme. Through avoiding the global search and removing the data detouring, the proposed protocol saves much energy of sensor nodes. Simulation results show that the proposed protocol is superior to the existing protocols. Index Terms local search, consecutive multicasting, largescale, wireless sensor networks I. INTRODUCTION In wireless sensor networks, geographic multicasting routing is considered as attractive approach because it can route data from a source node to multiple destination nodes through only location information instead of topology information of the network. Such geographic multicasting routing needs two requirements. One is that the source node obtains the location information of all destination nodes and the other one is that the source node constructs a multicast tree through the obtained location information. If the sensor network has a large-scale multicast group which has a number of destination nodes, it needs much energy consumption to achieve the two requirements. However, since the sensor network consists of sensor nodes with constrained energy, both obtaining the location information of destination nodes and constructing the multicast tree energy-efficiently is an important issue to save the energy of sensor nodes and thus to enhance the network lifetime of sensor network [1]. For multicast applications with large-scale groups in largescale wireless sensor networks, there have been recently proposed protocols [2-4] to reduce the energy consumption for obtaining location information of destination nodes and to efficiently construct the multicast tree. Such protocols divide the whole network into many multiple small areas and a leader node in each area manages the location information of destination nodes in its area. A source node collects the location information of leader nodes that has destination nodes in their own area, through global location search, and constructs a higher geographic multicast tree which is rooted at its location and is spanning all of their locations. Each leader node constructs a lower geographic multicasting tree which is rooted at its location and is spanning locations of destination nodes that belong to its area. In other words, the protocols use global search based hierarchical geographic multicasting tree construction approach. Nevertheless, such global search based hierarchical multicasting approach still remains the following problems. Firstly, as shown in Fig. 1, since a source uses global location search to get the location information of leader nodes in the areas that have destination nodes, such protocols excessively pay for the cost for the location service. Secondly, as shown in Fig. 2, since such protocols uses hierarchical geographic multicasting trees consisting a higher tree and a lower tree, multicast data from the source node to destinations detour due to the hierarchical characteristic of geographic multicasting tree. Moreover, if there are multiple n-tier hierarchies because of the increase of network size, the data detour has longer paths. Lastly, since leader nodes in such protocols provide the location service of destination nodes to a source node and the data delivery service from the source node to destination nodes, they consume energy excessively. In order to solve the problems of the global search based hierarchical geographic multicasting protocols, we propose a local search based consecutive geographic multicasting protocol. In the proposed protocol, a source node obtains the location information of destination nodes in its own area from the leader node of the area; then, the source node constructs a multicast tree that is spanning all the destination nodes. After that, some nodes that are involved in the source-based tree in the area and located edges of the area obtain the location /1/$ IEEE 2192

2 Grid Header Node Request & Reply Source Source-header tree (High-tier tree) Detour occurs! Grid Header Node Header-destination tree (Low-tier tree) Destination Figure 2. Source Destination A data detour problem in the previous hierarchical approach. Figure An example of global search based hierarchical multicast. information of destination nodes from leader nodes in their neighborhood areas in order to progressively extend the multicast tree to the neighborhood areas. Finally, through the local search per an area, the multicast tree would be globally established. Since the proposed utilizes the local search to obtain location information of all destination nodes in the whole sensor network, the proposed protocol may not consume energy in proportion to increase of the network size, i.e. the protocol can provide scalability in terms of the network size. In addition, because the multicast tree is progressively constructed on the whole sensor network, the proposed protocol could solve the detour problem of the global search based hierarchical geographic multicasting protocols. Simulation results show that the proposed protocol is more efficient than the global search based hierarchical geographic multicasting protocols in terms of the energy consumption and the data delivery hop counts. The remainder of the paper is organized as follows. Section II presents the related work. Proposed protocol is presented in Section III. Section IV presents the performance evaluation of the proposed protocol. Section V concludes this paper. II. RELATED WORK There have been proposed protocols [5-7] for supporting efficiently multicasting through only position information without the topology information of a whole sensor field in wireless sensor networks. GMR [5] selects the next hop neighbor nodes which have the shortest distance from a current node to destinations with localized calculation per each transmitting node while a multicast data of a source is forwarding to destinations. Therefore, a data packet should include a multicast data from a source as well as location information of all destinations. GMP [6] processes an effective multicast data delivery with heuristic Steiner method from a source to multiple destinations. Since a whole multicast tree is calculated in advance by a source, a data packet includes a multicast data as well as this tree information. SEAD [7] constructs an energy-efficient multicast tree, D-tree, through replica nodes and a source. A source attempts the Steiner method to construct multicast tree, and replicas manage information of sinks through access nodes. However, they are not scalable to large groups because of the packet encoding overhead and a large number of location services of multicast members. Recently, several multicast protocols for large-scale sensor networks, e.g. [2] and [3], are proposed by the requests. tries to enable lightweight membership management, which reduces the packet encoding overhead by using distributed geographic hashing and hierarchical decomposition of large multicast groups. When a grid header has one or more multicast members, the grid header sends its position information to a node which is closed to the pre-defined rendezvous point, and a source constructs data delivery paths between the source and grid headers through periodical message exchanges with the rendezvous node. A grid header which receives sources data constructs a local data delivery path between its members and itself, so it could effectively deliver the sources data to the multicast members. tries to enable efficient multicast data delivery to sinks by using grid-based shared tree and hierarchical location servers. A sink updates its location information to a low-tier location server, and then it is forwarded to a high-tier location server. The source constructs an efficient multicast tree through information exchanges with these location servers. also considers a multi-source scenario, and it thus could share an entire multicast tree between multiple sources. However, all of them fail to reduce the costs that are required for member location services. Also, these grid-level tree constructions lead to the inevitable inefficiencies of the multicast tree. Moreover, the problems become more serious with respect to the large-scale networks. As a result, a new type of scalable multicast protocol is required for large-scale wireless sensor networks. III. PROPOSED PROTOCOL In this section, we propose a local search based Consecutive 2193

3 P b Grid Header Node Destination Source Figure 3. The multicast tree construction in the proposed scheme. Geographic Multicasting (CGM) scheme. To design efficient multicast protocol for large-scale wireless sensor networks, our goals are 1) to minimize the searching costs for location acquisitions of multicast members, and 2) to avoid the data detour problem, therefore it enables to delivery the source s data with shorter paths. A. Network Initialization and Registration of Multicast Member We divide an entire network into multiple virtual grids for efficient management of large-scale WSNs which have a number of sensor nodes and multiple destinations. All sensor nodes are aware of own location information by GPS technologies [8] or other localization techniques [9], and grid structure (own cell belonged on grid structure) by the predefined rule through the following two parameters: the grid size α and the reference coordinate (x r, y r ). A sensor node which is the closest from the center point of a grid is selected as a grid header by local signaling within the grid such as the local flooding. After the grid header selection, each multicast member registers own location to own grid header. In the previous studies, leader nodes do not only work as location servers that notify registered location information of multicast members to other members or a parent leader, but also is used to data delivery paths. By contrast, in the proposed scheme, grid headers only work as location servers. This distributed method which distinguishes data delivery path and location service path could solve the packet converging problem, so it has an advantage that it effectively reduces the overhead of grid header. B. Local Multicast Tree Construction Given a multicast message generated by a source node, the source node requests location information of multicast members to its grid header as shown in Fig. 3. It then constructs the local multicast tree with location information from the grid header by the Steiner method such as the TM P a Request P c heuristic [1]. In other words, at first, the multicast tree is constructed within the local grid where the source node is located; that is, the source of CGM does not make an effort to send its data to other grids. For example, the source in Fig. 3 requests location of multicast members to its grid header in the grid 11, then it constructs the local multicast tree. C. Consecutive Multicast Tree Construction In this section, we explain a tree expansion algorithm for delivering the multicast data to all multicast members. Through the local member acquisition above mentioned, the source node selects a member where is the closest to neighbor grid as a proxy member node. The source node can also select multiple proxy member nodes, or a proxy member node which is the closest to multiple girds according to where the grid of the source is located in the entire network. For example, as shown in Fig. 3, P a is selected for the grid 14 and 15, P b is selected for the grid 6, and P c is selected for the grid 7 as proxy member nodes, of all multicast members in the grid 11 by the source. A proxy member node requests member location to its target grid headers, constructs its local multicast tree, and chooses proxy member nodes for next target grids. Since the performance of the proposed scheme is affected by the target grid selection, we explain it in the next section. Note that the proxy member node works like the source node. However, the source node obtains location information of the member nodes from its grid header only, while the proxy member node obtains the information from adjacent target grid headers. At first, the source puts pairs of location information of a picked proxy member node and its target grid headers into the header of multicast data packet. When a member node receives the data packet, it compares between location information in the data packet header and its own location information, so that the member node could knows whether it is the proxy member node or not. If the node is selected as the proxy member node, the node stores location information of its target grid headers and it then works as the proxy member node above mentioned. These consecutive local searches and local tree constructions continue until global location service and global tree construction are completed. However, the consecutive process might be interrupted when they meet a non-member grid. Therefore, the grid header of this grid relays a received location query to its next target grid. As shown in Fig. 3, the proxy member node P c sends a location query to the grid header in the grid 7. Since the grid 7 is nonmember grid, the grid header relays to the next target grid, the grid 3. The grid header in the grid 3 sends its member location to P c. P c therefore could construct the local multicast tree using this member location information. D. Target Grids Selection In the proposed scheme, both a source and a proxy member node construct a local multicast tree using its own location information. A source node only request to its grid header, while a proxy member node could request to multiple adjacent 2194

4 A B C Figure 4. The target grid selection mechanism in the proposed scheme. grid headers. Here, the consideration we are facing is that: which grid headers are selected as target grids for the efficient expansion of multicast tree. If all grid headers in the network allow one-way local request, the costs for location search would be minimized. By contrast, if they allow multi-way local request, e. g., duplicated location requests from multiple proxy member nodes, the costs for location search would be increased, but the probability of optimal path selecting would be increased. To facilitate expression, the proposed scheme chooses the mechanism that allows one location request per grid. Basically, except a beginning grid where a source is located, the rest grids locally search with a regular direction. In detail, the beginning grid requests location services to all adjacent grids (maximum 8 grids), and the rest each grid requests location service to an adjacent grid that is located at the same direction from previous location query is sent. For example, as shown in Fig. 4, the grid B requests to the grid C because the grid B is received a location query from the grid A. However, there exists an exceptional case such as a grid which receives a diagonal query. In this case, the grid does not only request to next grid that is located at the same diagonal direction, but it also requests to two grids that is located at the straight line: horizontal and vertical. In other words, the grid sends three location queries. As shown in Fig. 4, the grid D requests to the grid E, F and G because the grid D is received a diagonal query from the beginning grid. These target grid selection mechanism enables local location services to all grids in the network without duplicated location requests. E. Multicast Member Management In this section, we describe the multicast member management in the proposed scheme. We classify it into the following four cases: joining a grid with existing other members, joining a grid without other members, leaving a grid with existing other members, and leaving a grid without other members. D G F E 1) Joining a grid with existing other members If a new multicast member appears in a grid where other members exist, the new member node gets the information of grid header from its neighbor nodes. It then registers its location information to the grid header. The grid header delivers information of the new member node to its parent proxy member node. The parent proxy member node reconstructs its local multicast tree after it receives the information. If a new member node is closer to target grids than a proxy member node in the grid, the proxy member node would be changed to the new member node. 2) Joining a grid without other members If a new multicast member appears in a grid where other members does not exist, the new member node also registers to its grid header, updates to the parent member node, and reconstructs the local multicast tree. However, against to the preceding case, the new member node or one of the other member nodes would become a child proxy member node, so that a local multicast tree is divided into two multicast trees with hierarchy when the local multicast tree is reconstructed by the parent proxy member node. 3) Leaving a grid existing other members When a member node wants to leave from a grid where other members exist, the member node notifies a leaving message to its grid header and a parent proxy member node. If the leaving member node is a proxy member node in the grid, the parent proxy member node selects a new child proxy member node, and then notifies location information of the new child proxy member node to the leaving member node. When the leaving member node receives this message, the leaving member node sends its local tree information such as location information of its child members to the new child proxy member node. These mechanisms enables to effective proxy member node replacement. 4) Leaving a grid without other members When only one member exists in a grid, if the member node wants to leave from the grid, it notifies a leaving message to its grid header. If the leaving member node only has a parent proxy member node, that is, the leaf of a local multicast tree, it sends the leaving message to the parent proxy member node. By contrast, if the leaving member node has both a parent and child proxy member nodes, the leaving member node sends its local tree information to the parent proxy members. Therefore, multicast data could be delivered, continuously. IV. PERFORMANCE EVALUATION In this section, we first describe the methodology and metrics of our study. We then present the simulation results. We evaluate the proposed scheme by comparing it with [2] and [3]. A. Methodology and Metrics We implement CGM in the Qualnet 4. network simulator [11]. The model of sensor nodes are followed by the specification of MICA2 [12]. The default simulation settings 2195

5 Total control overhead (packets) Total hop count Total control overhead (packets) Network Size(m 2 ) Network size (m 2 ) Grid size (m) (a) (b) (c) Total hop count Total control overhead (packets) way -3 way -1 way Total hop count way -3 way -1 way Grid size(m) Network size (m 2 ) Network size (m 2 ) (d) (e) (f) Figure 5. Simulation results. have 5 destinations and 1 sensor nodes randomly distributed in a 1 m 1 m fields. The entire network region is divided into 5 5 grids, where the grid size α is 2 m. The transmission range of sensor nodes is 5 m. We use GPSR [13] as the underlying geographic routing protocol. We use two metrics to evaluate CGM. The total control overhead is defined as sum of location service costs for all multicast members and tree construction overhead. The total hop count is defined as the number of transmission of sensor nodes from a source to all multicast members. This metric helps to know how efficient a multicast tree is by comparing other multicast trees. B. Impact of network sizes We evaluate the total control overhead and the total hop count in different network sizes from 1 m 2 to 2 m 2. For each network size, we also vary the number of sensor nodes from 1 to 2, so we respectively maintain the same node density. For each network size, we also vary the number of destinations from 5 to 2. Figure 5(a) shows the total control overhead for network size. From the results, we can see that growth of the total control overhead of is larger than the other protocols. The finding is caused by the following reasons. As the network size grows, the number of the grids proportionally increases. In, since all grid headers exchange the global location search message with a source node, the cost for exchanging is raised very much. is more robust than in terms of increasing network size. Nevertheless, has the detour problem of location query message which is always forwarded via the parent location server to the child location server. The proposed scheme has the lowest growth of overhead since the location search of member nodes is locally distributed although the network size increases. Figure 5(b) indicates the total hop count for increasing network size. As the network size increases, the total hop count also increases. It is because that increasing network size makes proportional increase of the number of the destinations. The proposed scheme has lower growth of total hop count than the other protocol. In both of and, since they configure the 2-tier multicast tree (between source and grid header, between grid header and multicast members), the data from a source node are forwarded to the multicast members of the tree via the grid header. The more the numbers of grid and members increase, the more the probability of the detour problem increases. C. Impact of grid size We evaluate the total control overhead and the total hop count in different grid size α from 5 m to 5 m when the network size is 1 1 m 2. In other words, the entire network region varies from 2 2 grids to 2 2 grids. Figure 5(c) shows the result of total control overhead impacted by increasing grid size. From the results, we could see that the grid size is inversely proportional to the total control overhead in all protocols. It is because that the smaller 2196

6 the grid size is, the more grids the network has. In the figure, when the grid is small, has the largest control overhead. It is because that increasing network size also makes the number of the grids increase. achieves the better performance than as it has the higher probability of location service message aggregation due to the hierarchy of location server. However, the figure shows that the total control overhead does not decrease greatly although the grid size increases. The reason is that the messages of location service are detoured unnecessarily when the grid size increases too much. In case of the grid size at 5 m, the proposed scheme has similar control overhead to. Since the entire network is divided into four grids, there is no difference between local search and global search. Figure 5(d) shows the result of hop count impacted by grid size. The total hop count of the proposed protocol does not increase sharply due to increasing grid size. On the contrary, the other protocols have highest hop count as the size of grid increase. It is because that the problem of detour path via grid header is more serious as the grid size increases in the other protocols. D. Impact of multi-way location search In this scenario, we investigate the effect of multi-way location search mechanism that allows multiple location queries in a grid. We evaluate the total control overhead and the total hop count in different network sizes with 1-way (basic mechanism), 3-way, and 5-way location search mechanism. Note that the 1-way mechanism is a basic scheme which allows only one location request per grid. The 3-way mechanism is extended from the 1-way mechanism with additional left and right side template queries. We also extend the 3-way mechanism to 5-way mechanism that additionally includes two diagonal template queries. To avoid infinite query creation, we define the additional query as a template query which do not allow consecutive location search. The simulation settings follow in Section IV. B. As shown in Fig. 5(e), we can see that the multiple location queries could cause the high total overhead. As the network size increases, growth of the total overhead also is larger. It is because that the cost for location search is increased as the number of target grids increases; also, these messages would be more duplicated as the network size increases. However, as shown in Fig. 5(f), we can see that if the number of target grids increases, the total hop count would be decreases as well as the growth would be lower with respect to the network size. Because they select the better proxy member node that makes the whole multicast paths to more optimal. In other words, the probability of optimal path selecting would be increased. In this graph, we could find the fact that is more interesting. There is no significant difference between 3-way and 5-way mechanism from 1 m 2 to 14 m 2 although 5-way search costs the more for the location service as shown in previous simulation. It means that the increase of the number of target grids is not always provides the more optimal multicast path. In other words, there is an upper bound of the number of target grids that enables to construct an optimized multicast tree as well as to take the least costs for location service according to the network conditions. V. CONCLUSION In this paper, we propose CGM, which exploits local search based member location service and consecutive multicast tree expansion algorithm. The local search based member location service is efficiently minimizing the searching costs for location acquisitions of multicast members, and the consecutive multicast tree expansion algorithm enables to avoid the data detour problem, therefore source s multicast data would be delivered with shorter paths. Our simulation results show that CGM is more scalable than other protocols in terms of network size, it also constructs efficient multicast tree that reduces the data detouring. For the future work, we will find an optimal value of the grid size to reduce the total hop count of an entire multicast tree. This is because that if the grid size increases, the costs for location search decreases, but the number of destinations per grid relatively increases, so an encoding overhead of a grid header might increases. We are also interested for supporting mobile destinations using CGM. REFERENCES [1] I. F. Akyildiz et al., A survey on sensor networks, IEEE Communications Magazine, Vol. 4, pp , Aug. 22. [2] S. M. Das, H. Pucha, and Y. C. Hu, Distributed Hashing for Scalable Multicast in Wireless Ad Hoc Networks, IEEE TRANSACTION ON PARALLEL AND DISTRIBUTED SYSTEMS, VOL. 19, NO. 3, Mar. 28. [3] S. Hwang, K. Lu, Y. Su, C. Hsien, and C. Dow, Hierarchical multicast in wireless sensor networks with mobile sinks, WIRELESS COMMUNICATIONS AND MOBILE COMPUTING, 21. [4] X. Zhu, and H. Gupta, Fault-Tolerant Manycast to Mobile Destinations in Sensor Networks, in Proc. of the IEEE Int l Conf. on Communications (ICC 7), pp , Jun. 27. [5] J. Sanchez, P. Ruiz, J. Liu, and I. Stojmenovic, Bandwidth-Efficient Geographic Multicast Routing for Wireless Sensor Networks, IEEE Sensors Journal, VOL.7, NO. 5, pp , May 27. [6] S. Wu and K. S. Candan, Demand-scalable geographic multicasting in wireless sensor networks, Computer Communications, vol. 3, pp , Oct. 27. [7] H. S. Kim, T. F. Abdelzaher, and W. H. Kwon, Minimum-energy asynchronous dissemination to mobile sinks in wireless sensor networks, in Proc. of the 1st ACM Int l Conf. on Embedded Networked Sensor Systems (SenSys 3), pp , Nov. 23. [8] USCG Navigation Center GPS page, Jan. 2. [9] N. Bulusu, J. Heidemann, and D. Estrin, Gps-less low cost outdoor localization for very small devices, IEEE Personal Communications Magazine, vol.7, no. 5, pp.28-34, Oct. 2. [1] H. Takahashi and A. Matsuyama, An Approximate Solution for the Steiner Problem in Graphs, Math. Japonica, vol. 24, pp , 198. [11] Scalable Network Technologies, Qualnet, [online] available: [12] J. Polastre, R. Szewczyk, and D. Culler, Telos: Enabling Ultra-Low Power Wireless Research, IEEE IPSN 25, pp , Apr. 25. [13] B. Karp and H. T. Kung, GPSR: Greedy perimeter stateless routing for wireless networks, in Proc. of the 6th ACM/IEEE Annual Int'l Conf. on Mobile Computing and Networking (MobiCom ), pp , Aug

DAG based In-Network Aggregation for Sensor Network Monitoring

DAG based In-Network Aggregation for Sensor Network Monitoring DAG based In-Network Aggregation for Sensor Network Monitoring Shinji Motegi, Kiyohito Yoshihara and Hiroki Horiuchi KDDI R&D Laboratories Inc. {motegi, yosshy, hr-horiuchi}@kddilabs.jp Abstract Wireless

More information

A Novel Multi Ring Forwarding Protocol for Avoiding the Void Nodes for Balanced Energy Consumption

A Novel Multi Ring Forwarding Protocol for Avoiding the Void Nodes for Balanced Energy Consumption International Journal of Computer Sciences and Engineering Open Access Review Paper Volume-4, Issue-4 E-ISSN: 2347-2693 A Novel Multi Ring Forwarding Protocol for Avoiding the Void Nodes for Balanced Energy

More information

EFFICIENT DETECTION IN DDOS ATTACK FOR TOPOLOGY GRAPH DEPENDENT PERFORMANCE IN PPM LARGE SCALE IPTRACEBACK

EFFICIENT DETECTION IN DDOS ATTACK FOR TOPOLOGY GRAPH DEPENDENT PERFORMANCE IN PPM LARGE SCALE IPTRACEBACK EFFICIENT DETECTION IN DDOS ATTACK FOR TOPOLOGY GRAPH DEPENDENT PERFORMANCE IN PPM LARGE SCALE IPTRACEBACK S.Abarna 1, R.Padmapriya 2 1 Mphil Scholar, 2 Assistant Professor, Department of Computer Science,

More information

Power Efficiency Metrics for Geographical Routing In Multihop Wireless Networks

Power Efficiency Metrics for Geographical Routing In Multihop Wireless Networks Power Efficiency Metrics for Geographical Routing In Multihop Wireless Networks Gowthami.A, Lavanya.R Abstract - A number of energy-aware routing protocols are proposed to provide the energy efficiency

More information

A Hierarchical Structure based Coverage Repair in Wireless Sensor Networks

A Hierarchical Structure based Coverage Repair in Wireless Sensor Networks A Hierarchical Structure based Coverage Repair in Wireless Sensor Networks Jie Wu Computer Science & Engineering Department Florida Atlantic University Boca Raton, FL 3343, USA E-mail: jie@cse.fau.edu

More information

QUALITY OF SERVICE METRICS FOR DATA TRANSMISSION IN MESH TOPOLOGIES

QUALITY OF SERVICE METRICS FOR DATA TRANSMISSION IN MESH TOPOLOGIES QUALITY OF SERVICE METRICS FOR DATA TRANSMISSION IN MESH TOPOLOGIES SWATHI NANDURI * ZAHOOR-UL-HUQ * Master of Technology, Associate Professor, G. Pulla Reddy Engineering College, G. Pulla Reddy Engineering

More information

A Graph-Center-Based Scheme for Energy-Efficient Data Collection in Wireless Sensor Networks

A Graph-Center-Based Scheme for Energy-Efficient Data Collection in Wireless Sensor Networks A Graph-Center-Based Scheme for Energy-Efficient Data Collection in Wireless Sensor Networks Dajin Wang Department of Computer Science Montclair State University, Upper Montclair, NJ 07043, USA wang@pegasus.montclair.edu

More information

AN EFFICIENT STRATEGY OF AGGREGATE SECURE DATA TRANSMISSION

AN EFFICIENT STRATEGY OF AGGREGATE SECURE DATA TRANSMISSION INTERNATIONAL JOURNAL OF REVIEWS ON RECENT ELECTRONICS AND COMPUTER SCIENCE AN EFFICIENT STRATEGY OF AGGREGATE SECURE DATA TRANSMISSION K.Anusha 1, K.Sudha 2 1 M.Tech Student, Dept of CSE, Aurora's Technological

More information

How To Balance Network Load In A Wireless Sensor Network

How To Balance Network Load In A Wireless Sensor Network Balancing Network Traffic Load in Geographic Hash Table (GHT) R. Asha, V.Manju, Meka Sindhu & T. Subha Department of Information Technology, Sri Sai Ram Engineering College, Chennai. E-mail : ashaniteesh@gmail.com,

More information

Some Security Trends over Wireless Sensor Networks

Some Security Trends over Wireless Sensor Networks Some Security Trends over Wireless Sensor Networks ZORAN BOJKOVIC, BOJAN BAKMAZ, MIODRAG BAKMAZ Faculty of Transport and Traffic Engineering University of Belgrade Vojvode Stepe 305 SERBIA Abstract: -

More information

An Energy Efficient Location Service for Mobile Ad Hoc Networks

An Energy Efficient Location Service for Mobile Ad Hoc Networks An Energ Efficient Location Service for Mobile Ad Hoc Networks Zijian Wang 1, Euphan Bulut 1 and Boleslaw K. Szmanski 1, 1 Department of Computer Science, Rensselaer Poltechnic Institute, Tro, NY 12180

More information

Position and Velocity Aided Routing Protocol in Mobile Ad Hoc Networks

Position and Velocity Aided Routing Protocol in Mobile Ad Hoc Networks Position and Velocity Aided Routing Protocol in Mobile Ad Hoc Networks 1 Taifei Zhao, 2 Xizheng Ke, 3 Peilin Yang *1,Corresponding Author Department of Electronics Engineering, Xi an University of Technology,

More information

An Empirical Approach - Distributed Mobility Management for Target Tracking in MANETs

An Empirical Approach - Distributed Mobility Management for Target Tracking in MANETs An Empirical Approach - Distributed Mobility Management for Target Tracking in MANETs G.Michael Assistant Professor, Department of CSE, Bharath University, Chennai, TN, India ABSTRACT: Mobility management

More information

OPTIMIZED SENSOR NODES BY FAULT NODE RECOVERY ALGORITHM

OPTIMIZED SENSOR NODES BY FAULT NODE RECOVERY ALGORITHM OPTIMIZED SENSOR NODES BY FAULT NODE RECOVERY ALGORITHM S. Sofia 1, M.Varghese 2 1 Student, Department of CSE, IJCET 2 Professor, Department of CSE, IJCET Abstract This paper proposes fault node recovery

More information

Study of Different Types of Attacks on Multicast in Mobile Ad Hoc Networks

Study of Different Types of Attacks on Multicast in Mobile Ad Hoc Networks Study of Different Types of Attacks on Multicast in Mobile Ad Hoc Networks Hoang Lan Nguyen and Uyen Trang Nguyen Department of Computer Science and Engineering, York University 47 Keele Street, Toronto,

More information

Location Information Services in Mobile Ad Hoc Networks

Location Information Services in Mobile Ad Hoc Networks Location Information Services in Mobile Ad Hoc Networks Tracy Camp, Jeff Boleng, Lucas Wilcox Department of Math. and Computer Sciences Colorado School of Mines Golden, Colorado 841 Abstract In recent

More information

Repairing Sensor Network Using Mobile Robots

Repairing Sensor Network Using Mobile Robots Repairing Sensor Network Using Mobile Robots 1 Yongguo Mei, Changjiu Xian, Saumitra Das, Y. Charlie Hu and Yung-Hsiang Lu Purdue University, West Lafayette {ymei, cjx, smdas, ychu, yunglu}@purdue.edu Abstract

More information

Implementation of Energy Efficient Adaptive Load Balancing Algorithm by Rainbow Mechanism in Wireless Sensor Networks

Implementation of Energy Efficient Adaptive Load Balancing Algorithm by Rainbow Mechanism in Wireless Sensor Networks Implementation of Energy Efficient Adaptive Load Balancing Algorithm by Rainbow Mechanism in Wireless Sensor Networks Gowthami.V.R, Divya Sharma M.Tech, Dept. of E&C. NHCE, VTU, Bengaluru India. Assistant

More information

Wireless Sensor Network: Improving the Network Energy Consumption

Wireless Sensor Network: Improving the Network Energy Consumption Wireless Sensor Network: Improving the Network Energy Consumption Ingrid Teixeira, José Ferreira de Rezende and Aloysio de Castro P. Pedroza Abstract-- In a remote sensor application it is desirable that

More information

Mobile Network Analysis - Hole Healing

Mobile Network Analysis - Hole Healing , pp.143-150 http://dx.doi.org/10.14257/ijfgcn.2013.6.6.15 Decentralized Mobile Sensor Navigation for Hole Healing Policy in Wireless Hybrid Sensor Networks Fu-Tian Lin 1, 2, Chu-Sing Yang 1, Tien-Wen

More information

Recent advances in microelectromechanical

Recent advances in microelectromechanical COVER FEATURE Energy-Efficient Area Monitoring for Sensor Networks The nodes in sensor networks must self-organize to monitor the target area as long as possible. Optimizing energy consumption in area

More information

PERFORMANCE STUDY AND SIMULATION OF AN ANYCAST PROTOCOL FOR WIRELESS MOBILE AD HOC NETWORKS

PERFORMANCE STUDY AND SIMULATION OF AN ANYCAST PROTOCOL FOR WIRELESS MOBILE AD HOC NETWORKS PERFORMANCE STUDY AND SIMULATION OF AN ANYCAST PROTOCOL FOR WIRELESS MOBILE AD HOC NETWORKS Reza Azizi Engineering Department, Bojnourd Branch, Islamic Azad University, Bojnourd, Iran reza.azizi@bojnourdiau.ac.ir

More information

Load Balancing Geo-routing and routing around Holes in Wireless Sensor Networks Ashwini S R 1, Dr.Nataraj K R 2 1 PG Student, DCN, SJBIT, Bangalore

Load Balancing Geo-routing and routing around Holes in Wireless Sensor Networks Ashwini S R 1, Dr.Nataraj K R 2 1 PG Student, DCN, SJBIT, Bangalore Load Balancing Geo-routing and routing around Holes in Wireless Sensor Networks Ashwini S R 1, Dr.Nataraj K R 2 1 PG Student, DCN, SJBIT, Bangalore 2 Professor and HOD, SJBIT, Bangalore Email: ashwinigowda@gmail.com,

More information

GPS (Global positioning system) enables a device to determine

GPS (Global positioning system) enables a device to determine 1 Application of GPS to Mobile IP and Routing in Wireless Networks Mustafa Ergen,Sinem Coleri,Baris Dundar,Rahul Jain, Anuj Puri Dept. of Electrical Eng. and Computer Sci. University of California, Berkeley

More information

Isolines: Energy-efficient Mapping in Sensor Networks

Isolines: Energy-efficient Mapping in Sensor Networks Isolines: Energy-efficient Mapping in Sensor Networks Ignacio Solis and Katia Obraczka {isolis, katia}@cse.ucsc.edu Computer Engineering Department University of California, Santa Cruz April 15, 2005 Abstract

More information

International Journal of Advanced Research in Computer Science and Software Engineering

International Journal of Advanced Research in Computer Science and Software Engineering Volume 2, Issue 9, September 2012 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com An Experimental

More information

A Security Architecture for. Wireless Sensor Networks Environmental

A Security Architecture for. Wireless Sensor Networks Environmental Contemporary Engineering Sciences, Vol. 7, 2014, no. 15, 737-742 HIKARI Ltd, www.m-hikari.com http://dx.doi.org/10.12988/ces.2014.4683 A Security Architecture for Wireless Sensor Networks Environmental

More information

A Scalable Multicasting with Group Mobility Support in Mobile Ad Hoc Networks

A Scalable Multicasting with Group Mobility Support in Mobile Ad Hoc Networks International Journal of Information Processing Systems, Vol.3, No.1, June 2007 1 A Scalable Multicasting with Group Mobility Support in Mobile Ad Hoc Networks Kap-Dong Kim*, Kwangil Lee**, Jun-Hee Park**,

More information

An Efficient Hybrid Data Gathering Scheme in Wireless Sensor Networks

An Efficient Hybrid Data Gathering Scheme in Wireless Sensor Networks An Efficient Hybrid Data Gathering Scheme in Wireless Sensor Networks Ayon Chakraborty 1, Swarup Kumar Mitra 2, and M.K. Naskar 3 1 Department of CSE, Jadavpur University, Kolkata, India 2 Department of

More information

Bandwidth Management Framework for Multicasting in Wireless Mesh Networks

Bandwidth Management Framework for Multicasting in Wireless Mesh Networks Bandwidth Management Framework for Multicasting in Wireless Mesh Networks Manaswi Saha and P. Venkata Krishna Abstract Wireless mesh networks (WMNs) provide a reliable and a scalable solution for multicasting.

More information

Detecting Multiple Selfish Attack Nodes Using Replica Allocation in Cognitive Radio Ad-Hoc Networks

Detecting Multiple Selfish Attack Nodes Using Replica Allocation in Cognitive Radio Ad-Hoc Networks Detecting Multiple Selfish Attack Nodes Using Replica Allocation in Cognitive Radio Ad-Hoc Networks Kiruthiga S PG student, Coimbatore Institute of Engineering and Technology Anna University, Chennai,

More information

Architectural Framework for Large- Scale Multicast in Mobile Ad Hoc Networks

Architectural Framework for Large- Scale Multicast in Mobile Ad Hoc Networks Architectural Framework for Large- Scale Multicast in Mobile Ad Hoc Networks Ahmed Helmy Electrical Engineering Department University of Southern California (USC) helmy@usc.edu http://ceng.usc.edu/~helmy

More information

Energy Efficient Data Management for Wireless Sensor Networks with Data Sink Failure

Energy Efficient Data Management for Wireless Sensor Networks with Data Sink Failure Energy Efficient Data Management for Wireless Sensor Networks with Data Sink Failure Hyunyoung Lee Andreas Klappenecker Kyungsook Lee Lan Lin Abstract This paper proposes an energy efficient protocol for

More information

IEQGOR to Increase the Quality of Service in Wireless Sensor Network

IEQGOR to Increase the Quality of Service in Wireless Sensor Network IEQGOR to Increase the Quality of Service in Wireless Sensor Network K.Mythilipriya 1, B.Arunkumar 2 III M.E., Dept of CSE, Karpagam University, Coimbatore, India 1 Assistant Professor, Dept of CSE, Karpagam

More information

Implementation of a Lightweight Service Advertisement and Discovery Protocol for Mobile Ad hoc Networks

Implementation of a Lightweight Service Advertisement and Discovery Protocol for Mobile Ad hoc Networks Implementation of a Lightweight Advertisement and Discovery Protocol for Mobile Ad hoc Networks Wenbin Ma * Department of Electrical and Computer Engineering 19 Memorial Drive West, Lehigh University Bethlehem,

More information

Towards Efficient Routing in Vehicular Ad Hoc Networks

Towards Efficient Routing in Vehicular Ad Hoc Networks Towards Efficient Routing in Vehicular Ad Hoc Networks Moez Jerbi*, Sidi-Mohammed Senouci* and Yacine Ghamri-Doudane** *France Telecom R&D, Core Network Laboratories, Lannion, France **Networks and Multimedia

More information

Evaluation of Unlimited Storage: Towards Better Data Access Model for Sensor Network

Evaluation of Unlimited Storage: Towards Better Data Access Model for Sensor Network Evaluation of Unlimited Storage: Towards Better Data Access Model for Sensor Network Sagar M Mane Walchand Institute of Technology Solapur. India. Solapur University, Solapur. S.S.Apte Walchand Institute

More information

Forced Low latency Handoff in Mobile Cellular Data Networks

Forced Low latency Handoff in Mobile Cellular Data Networks Forced Low latency Handoff in Mobile Cellular Data Networks N. Moayedian, Faramarz Hendessi Department of Electrical and Computer Engineering Isfahan University of Technology, Isfahan, IRAN Hendessi@cc.iut.ac.ir

More information

ssumathy@vit.ac.in upendra_mcs2@yahoo.com

ssumathy@vit.ac.in upendra_mcs2@yahoo.com S. Sumathy 1 and B.Upendra Kumar 2 1 School of Computing Sciences, VIT University, Vellore-632 014, Tamilnadu, India ssumathy@vit.ac.in 2 School of Computing Sciences, VIT University, Vellore-632 014,

More information

Efficient Load Balancing Routing in Wireless Mesh Networks

Efficient Load Balancing Routing in Wireless Mesh Networks ISSN (e): 2250 3005 Vol, 04 Issue, 12 December 2014 International Journal of Computational Engineering Research (IJCER) Efficient Load Balancing Routing in Wireless Mesh Networks S.Irfan Lecturer, Dept

More information

Secure Data Transmission in Wireless Sensor Network Using Randomized Dispersive Routing Algorithm

Secure Data Transmission in Wireless Sensor Network Using Randomized Dispersive Routing Algorithm Secure Data Transmission in Wireless Sensor Network Using Randomized Dispersive Routing Algorithm Pallavi Motharkar 1, Dr.P.R.Deshmukh 2 and Prof.G.S.Thakare 3 1 M.E. (Computer Engineering), 2,3 Department

More information

International journal of Engineering Research-Online A Peer Reviewed International Journal Articles available online http://www.ijoer.

International journal of Engineering Research-Online A Peer Reviewed International Journal Articles available online http://www.ijoer. RESEARCH ARTICLE ISSN: 2321-7758 GLOBAL LOAD DISTRIBUTION USING SKIP GRAPH, BATON AND CHORD J.K.JEEVITHA, B.KARTHIKA* Information Technology,PSNA College of Engineering & Technology, Dindigul, India Article

More information

Dynamic Antenna Mode Selection for Link Maintenances in Mobile Ad Hoc Network

Dynamic Antenna Mode Selection for Link Maintenances in Mobile Ad Hoc Network Dynamic Antenna Mode Selection for Link Maintenances in Mobile Ad Hoc Network P. Shiva Kumar $, Rinki Sharma *, G.Varaprasad # $ Department of Information Technology Acharya Institute of Management and

More information

The Monitoring of Ad Hoc Networks Based on Routing

The Monitoring of Ad Hoc Networks Based on Routing The Monitoring of Ad Hoc Networks Based on Routing Sana Ghannay, Sonia Mettali Gammar, Farouk Kamoun CRISTAL Laboratory ENSI, University of Manouba 21 Manouba - Tunisia {chnnysn,sonia.gammar}@ensi.rnu.tn,

More information

Control overhead reduction: A Hierarchical Routing Protocol In Mobile Ad hoc Networks

Control overhead reduction: A Hierarchical Routing Protocol In Mobile Ad hoc Networks Control overhead reduction: A Hierarchical Routing Protocol In Mobile Ad hoc Networks Dr.G.Mary Jansi Rani Professor / Department of Electronics and Communication Engineering, Sri Ramakrishna Engineering

More information

A Survey about Routing Protocols with Mobile Sink for Wireless Sensor Network

A Survey about Routing Protocols with Mobile Sink for Wireless Sensor Network , pp.221-228 http://dx.doi.org/10.14257/ijfgcn.2014.7.5.18 A Survey about Routing Protocols with Mobile Sink for Wireless Sensor Network Jin Wang 1, Xiaoqin Yang 2, Zhongqi Zhang 2, Bin Li 1 and Jeong-Uk

More information

Improvisation of The Quality Of Service In ZigBee Cluster Tree Network

Improvisation of The Quality Of Service In ZigBee Cluster Tree Network Improvisation of The Quality Of Service In ZigBee Cluster Tree Network Trupti Satavse, Vijyalaxmi Kadrolli Information Technology Terna College of Engineering Nerul, Navi-Mumbai, India Trupti1814@gmail.com

More information

DESIGN AND DEVELOPMENT OF LOAD SHARING MULTIPATH ROUTING PROTCOL FOR MOBILE AD HOC NETWORKS

DESIGN AND DEVELOPMENT OF LOAD SHARING MULTIPATH ROUTING PROTCOL FOR MOBILE AD HOC NETWORKS DESIGN AND DEVELOPMENT OF LOAD SHARING MULTIPATH ROUTING PROTCOL FOR MOBILE AD HOC NETWORKS K.V. Narayanaswamy 1, C.H. Subbarao 2 1 Professor, Head Division of TLL, MSRUAS, Bangalore, INDIA, 2 Associate

More information

Cluster-based Multi-path Routing Algorithm for Multi-hop Wireless Network

Cluster-based Multi-path Routing Algorithm for Multi-hop Wireless Network International Journal of Future Generation Communication and Networking 67 Cluster-based Multi-path Routing Algorithm for Multi-hop Wireless Network Jie Zhang, Choong Kyo Jeong, Goo Yeon Lee, Hwa Jong

More information

Simulation of Heuristic Usage for Load Balancing In Routing Efficiency

Simulation of Heuristic Usage for Load Balancing In Routing Efficiency Simulation of Heuristic Usage for Load Balancing In Routing Efficiency Nor Musliza Mustafa Fakulti Sains dan Teknologi Maklumat, Kolej Universiti Islam Antarabangsa Selangor normusliza@kuis.edu.my Abstract.

More information

CROSS LAYER BASED MULTIPATH ROUTING FOR LOAD BALANCING

CROSS LAYER BASED MULTIPATH ROUTING FOR LOAD BALANCING CHAPTER 6 CROSS LAYER BASED MULTIPATH ROUTING FOR LOAD BALANCING 6.1 INTRODUCTION The technical challenges in WMNs are load balancing, optimal routing, fairness, network auto-configuration and mobility

More information

A Dynamically Configurable Topology Control for Hybrid Ad Hoc Networks with Internet Gateways

A Dynamically Configurable Topology Control for Hybrid Ad Hoc Networks with Internet Gateways ynamically onfigurable Topology ontrol for Hybrid d Hoc Networks with Internet ateways eun-hee ho and Young-ae Ko raduate School of Information & ommunication, jou University, Republic of Korea {khzho,

More information

A Scalable Location Management Scheme in Mobile Ad-hoc Networks

A Scalable Location Management Scheme in Mobile Ad-hoc Networks Scalable Location Management Scheme in Mobile d-hoc Networks Yuan Xue Baochun Li Klara Nahrstedt bstract n ad-hoc networks, geographical routing protocols take advantage of location information so that

More information

A Fast Path Recovery Mechanism for MPLS Networks

A Fast Path Recovery Mechanism for MPLS Networks A Fast Path Recovery Mechanism for MPLS Networks Jenhui Chen, Chung-Ching Chiou, and Shih-Lin Wu Department of Computer Science and Information Engineering Chang Gung University, Taoyuan, Taiwan, R.O.C.

More information

A UBIQUITOUS PROTOCOL FOR ADDRESS DYNAMICALLY AUTO CONFIGURATION FOR MOBILE AD HOC NETWORKS

A UBIQUITOUS PROTOCOL FOR ADDRESS DYNAMICALLY AUTO CONFIGURATION FOR MOBILE AD HOC NETWORKS A UBIQUITOUS PROTOCOL FOR ADDRESS DYNAMICALLY AUTO CONFIGURATION FOR MOBILE AD HOC NETWORKS Chandanpreet Kaur Global Institute of Management and Emerging Technologies, Amritsar, Punjab, India, lpu_chandan@yahoo.co.in

More information

Preventing Resource Exhaustion Attacks in Ad Hoc Networks

Preventing Resource Exhaustion Attacks in Ad Hoc Networks Preventing Resource Exhaustion Attacks in Ad Hoc Networks Masao Tanabe and Masaki Aida NTT Information Sharing Platform Laboratories, NTT Corporation, 3-9-11, Midori-cho, Musashino-shi, Tokyo 180-8585

More information

Minimum-Hop Load-Balancing Graph Routing Algorithm for Wireless HART

Minimum-Hop Load-Balancing Graph Routing Algorithm for Wireless HART Minimum-Hop Load-Balancing Graph Routing Algorithm for Wireless HART Abdul Aziz Memon and Seung Ho Hong Abstract In this paper load-balancing routing algorithm for WirelessHART standard is proposed. WirelessHART

More information

LBN: Load-balancing Network for Data Gathering Wireless Sensor Networks

LBN: Load-balancing Network for Data Gathering Wireless Sensor Networks LBN: Load-balancing Network for Data Gathering Wireless Sensor Networks Wenlu Yang 1, 2, Chongqing Zhang 2, Minglu Li 2 1 Department of Electronic Engineering, Shanghai Maritime University, Shanghai, China

More information

Detecting Malicious Beacon Nodes for Secure Location Discovery in Wireless Sensor Networks

Detecting Malicious Beacon Nodes for Secure Location Discovery in Wireless Sensor Networks Detecting Malicious Beacon Nodes for Secure Location Discovery in Wireless Sensor Networks Donggang Liu Peng Ning North Carolina State University {dliu,pning}@ncsu.edu Wenliang Du Syracuse University wedu@ecs.syr.edu

More information

Gossiping using the Energy Map in Wireless Sensor Networks

Gossiping using the Energy Map in Wireless Sensor Networks Gossiping using the Energy Map in Wireless Sensor Networks Max do Val Machado 1, Raquel A.F. Mini 2, Antonio A.F. Loureiro 1, Daniel L. Guidoni 1 and Pedro O.S.V. de Melo 1 1 Federal University of Minas

More information

3-12 Autonomous Access Control among Nodes in Sensor Networks with Security Policies

3-12 Autonomous Access Control among Nodes in Sensor Networks with Security Policies 3-12 Autonomous Access Control among Nodes in Sensor Networks with Security Policies This paper describes a new framework of policy control sensor networks. Sensor networks are shared by various applications,

More information

Wireless Sensor Networks Database: Data Management and Implementation

Wireless Sensor Networks Database: Data Management and Implementation Sensors & Transducers 2014 by IFSA Publishing, S. L. http://www.sensorsportal.com Wireless Sensor Networks Database: Data Management and Implementation Ping Liu Computer and Information Engineering Institute,

More information

On Reliability of Dynamic Addressing Routing Protocols in Mobile Ad Hoc Networks

On Reliability of Dynamic Addressing Routing Protocols in Mobile Ad Hoc Networks On Reliability of Dynamic Addressing Routing Protocols in Mobile Ad Hoc Networks Marcello Caleffi, Giancarlo Ferraiuolo, Luigi Paura Department of Electronic and Telecommunication Engineering (DIET) University

More information

Optimized Load Balancing Mechanism Using Carry Forward Distance

Optimized Load Balancing Mechanism Using Carry Forward Distance Optimized Load Balancing Mechanism Using Carry Forward Distance Ramandeep Kaur 1, Gagandeep Singh 2, Sahil 3 1 M. Tech Research Scholar, Chandigarh Engineering College, Punjab, India 2 Assistant Professor,

More information

A Routing Algorithm Designed for Wireless Sensor Networks: Balanced Load-Latency Convergecast Tree with Dynamic Modification

A Routing Algorithm Designed for Wireless Sensor Networks: Balanced Load-Latency Convergecast Tree with Dynamic Modification A Routing Algorithm Designed for Wireless Sensor Networks: Balanced Load-Latency Convergecast Tree with Dynamic Modification Sheng-Cong Hu r00631036@ntu.edu.tw Jen-Hou Liu r99631038@ntu.edu.tw Min-Sheng

More information

Entropy-Based Collaborative Detection of DDoS Attacks on Community Networks

Entropy-Based Collaborative Detection of DDoS Attacks on Community Networks Entropy-Based Collaborative Detection of DDoS Attacks on Community Networks Krishnamoorthy.D 1, Dr.S.Thirunirai Senthil, Ph.D 2 1 PG student of M.Tech Computer Science and Engineering, PRIST University,

More information

G.Vijaya kumar et al, Int. J. Comp. Tech. Appl., Vol 2 (5), 1413-1418

G.Vijaya kumar et al, Int. J. Comp. Tech. Appl., Vol 2 (5), 1413-1418 An Analytical Model to evaluate the Approaches of Mobility Management 1 G.Vijaya Kumar, *2 A.Lakshman Rao *1 M.Tech (CSE Student), Pragati Engineering College, Kakinada, India. Vijay9908914010@gmail.com

More information

Babel: Using a Common Bridge Node to Deliver Multiple Keys in Wireless Sensor Networks

Babel: Using a Common Bridge Node to Deliver Multiple Keys in Wireless Sensor Networks Babel: Using a Common Bridge Node to Deliver Multiple Keys in Wireless Sensor Networks Jing Deng Department of Computer Science University of New Orleans New Orleans, LA 7048, USA jing@cs.uno.edu Yunghsiang

More information

A NOVEL OVERLAY IDS FOR WIRELESS SENSOR NETWORKS

A NOVEL OVERLAY IDS FOR WIRELESS SENSOR NETWORKS A NOVEL OVERLAY IDS FOR WIRELESS SENSOR NETWORKS Sumanta Saha, Md. Safiqul Islam, Md. Sakhawat Hossen School of Information and Communication Technology The Royal Institute of Technology (KTH) Stockholm,

More information

Figure 1. The Example of ZigBee AODV Algorithm

Figure 1. The Example of ZigBee AODV Algorithm TELKOMNIKA Indonesian Journal of Electrical Engineering Vol.12, No.2, February 2014, pp. 1528 ~ 1535 DOI: http://dx.doi.org/10.11591/telkomnika.v12i2.3576 1528 Improving ZigBee AODV Mesh Routing Algorithm

More information

International Journal of Emerging Technologies in Computational and Applied Sciences (IJETCAS) www.iasir.net

International Journal of Emerging Technologies in Computational and Applied Sciences (IJETCAS) www.iasir.net International Association of Scientific Innovation and Research (IASIR) (An Association Unifying the Sciences, Engineering, and Applied Research) International Journal of Emerging Technologies in Computational

More information

Secured Data Transmissions In Manet Using Neighbor Position Verfication Protocol

Secured Data Transmissions In Manet Using Neighbor Position Verfication Protocol www.ijecs.in International Journal Of Engineering And Computer Science ISSN:2319-7242 Volume 3 Issue3 March, 2014 Page No. 5067-5071 Secured Data Transmissions In Manet Using Neighbor Position Verfication

More information

A ROUTING ALGORITHM FOR MPLS TRAFFIC ENGINEERING IN LEO SATELLITE CONSTELLATION NETWORK. Received September 2012; revised January 2013

A ROUTING ALGORITHM FOR MPLS TRAFFIC ENGINEERING IN LEO SATELLITE CONSTELLATION NETWORK. Received September 2012; revised January 2013 International Journal of Innovative Computing, Information and Control ICIC International c 2013 ISSN 1349-4198 Volume 9, Number 10, October 2013 pp. 4139 4149 A ROUTING ALGORITHM FOR MPLS TRAFFIC ENGINEERING

More information

Coverage Related Issues in Networks

Coverage Related Issues in Networks Coverage Related Issues in Networks Marida Dossena* 1 1 Department of Information Sciences, University of Naples Federico II, Napoli, Italy Email: marida.dossena@libero.it Abstract- Wireless sensor networks

More information

Customer Specific Wireless Network Solutions Based on Standard IEEE 802.15.4

Customer Specific Wireless Network Solutions Based on Standard IEEE 802.15.4 Customer Specific Wireless Network Solutions Based on Standard IEEE 802.15.4 Michael Binhack, sentec Elektronik GmbH, Werner-von-Siemens-Str. 6, 98693 Ilmenau, Germany Gerald Kupris, Freescale Semiconductor

More information

Load balanced and Efficient Hierarchical Data-Centric Storage in Sensor Networks

Load balanced and Efficient Hierarchical Data-Centric Storage in Sensor Networks Load balanced and Efficient Hierarchical Data-Centric Storage in Sensor Networks Yao Zhao, Yan Chen Northwestern University, Evanston IL, USA {yzhao,ychen}@cs.northwestern.edu Sylvia Ratnasamy Intel Research,

More information

CHAPTER 6 SECURE PACKET TRANSMISSION IN WIRELESS SENSOR NETWORKS USING DYNAMIC ROUTING TECHNIQUES

CHAPTER 6 SECURE PACKET TRANSMISSION IN WIRELESS SENSOR NETWORKS USING DYNAMIC ROUTING TECHNIQUES CHAPTER 6 SECURE PACKET TRANSMISSION IN WIRELESS SENSOR NETWORKS USING DYNAMIC ROUTING TECHNIQUES 6.1 Introduction The process of dispersive routing provides the required distribution of packets rather

More information

A Routing Method for Top-k Query Processing in Mobile Ad Hoc Networks

A Routing Method for Top-k Query Processing in Mobile Ad Hoc Networks 2013 IEEE 27th International Conference on Advanced Information Networking and Applications A Routing Method for Top-k Query Processing in Mobile Ad Hoc Networks Daichi Amagata, Yuya Sasaki, Takahiro Hara,

More information

David R. McIntyre CS Department, Cleveland State University Cleveland, Ohio 44101

David R. McIntyre CS Department, Cleveland State University Cleveland, Ohio 44101 Data Distribution in a Wireless Environment with Migrating Nodes David A. Johnston EECS Department, Case Western Reserve University Cleveland, Ohio 44106 David R. McIntyre CS Department, Cleveland State

More information

A-STAR: A Mobile Ad Hoc Routing Strategy for Metropolis Vehicular Communications

A-STAR: A Mobile Ad Hoc Routing Strategy for Metropolis Vehicular Communications A-STAR: A Mobile Ad Hoc Routing Strategy for Metropolis Vehicular Communications Boon-Chong Seet*, Genping Liu, Bu-Sung Lee, Chuan-Heng Foh, and Kai-Juan Wong Centre for Multimedia and Network Technology

More information

A Virtual Machine Searching Method in Networks using a Vector Space Model and Routing Table Tree Architecture

A Virtual Machine Searching Method in Networks using a Vector Space Model and Routing Table Tree Architecture A Virtual Machine Searching Method in Networks using a Vector Space Model and Routing Table Tree Architecture Hyeon seok O, Namgi Kim1, Byoung-Dai Lee dept. of Computer Science. Kyonggi University, Suwon,

More information

Adaptive Multiple Metrics Routing Protocols for Heterogeneous Multi-Hop Wireless Networks

Adaptive Multiple Metrics Routing Protocols for Heterogeneous Multi-Hop Wireless Networks Adaptive Multiple Metrics Routing Protocols for Heterogeneous Multi-Hop Wireless Networks Lijuan Cao Kashif Sharif Yu Wang Teresa Dahlberg Department of Computer Science, University of North Carolina at

More information

Mobility Management usually includes two parts: location management and handoff management.

Mobility Management usually includes two parts: location management and handoff management. Part 9: Mobile Data / Mobility Management I. Mobile Data Services/ Management This broad area involves a lot of industrial applications. Mobile data services/ management is becoming another profitable

More information

Multicast Group Management for Interactive Distributed Applications

Multicast Group Management for Interactive Distributed Applications Multicast Group Management for Interactive Distributed Applications Carsten Griwodz griff@simula.no September 25, 2008 based on the thesis work of Knut-Helge Vik, knuthelv@simula.no Group communication

More information

A Survey on Rendezvous Data Collection in Wireless Sensor Networks. Presented by Longfei Shangguan Supervisor:Dr.Yunhao Liu

A Survey on Rendezvous Data Collection in Wireless Sensor Networks. Presented by Longfei Shangguan Supervisor:Dr.Yunhao Liu A Survey on Rendezvous Data Collection in Wireless Sensor Networks Presented by Longfei Shangguan Supervisor:Dr.Yunhao Liu Roadmap Background Introduction of state-of-art solutions Future works References

More information

SIMULATION STUDY OF BLACKHOLE ATTACK IN THE MOBILE AD HOC NETWORKS

SIMULATION STUDY OF BLACKHOLE ATTACK IN THE MOBILE AD HOC NETWORKS Journal of Engineering Science and Technology Vol. 4, No. 2 (2009) 243-250 School of Engineering, Taylor s University College SIMULATION STUDY OF BLACKHOLE ATTACK IN THE MOBILE AD HOC NETWORKS SHEENU SHARMA

More information

T task De dissemination and Routing

T task De dissemination and Routing IMPLEMENTATION OF TASK DISSEMINATION IN WIRELESS SENSOR NETWORKS USING MESH TOPOLOGY 1 B.Maheswari 2 Dr.S.Karthik 3 Prof. T.Rajendran II nd M.E (CSE) Professor & Head, Department of CSE Assistant Professor,

More information

Survey on Load balancing protocols in MANET S (mobile ad-hoc networks)

Survey on Load balancing protocols in MANET S (mobile ad-hoc networks) Survey on Load balancing protocols in MANET S (mobile ad-hoc networks) Ramandeep Kaur 1, Gagandeep Singh 2, Sahil Vashist 3 1 M.tech Research Scholar, Department of Computer Science & Engineering, Chandigarh

More information

Distributed Dynamic Load Balancing for Iterative-Stencil Applications

Distributed Dynamic Load Balancing for Iterative-Stencil Applications Distributed Dynamic Load Balancing for Iterative-Stencil Applications G. Dethier 1, P. Marchot 2 and P.A. de Marneffe 1 1 EECS Department, University of Liege, Belgium 2 Chemical Engineering Department,

More information

Multiobjective Multicast Routing Algorithm

Multiobjective Multicast Routing Algorithm Multiobjective Multicast Routing Algorithm Jorge Crichigno, Benjamín Barán P. O. Box 9 - National University of Asunción Asunción Paraguay. Tel/Fax: (+9-) 89 {jcrichigno, bbaran}@cnc.una.py http://www.una.py

More information

Quality of Service Routing Network and Performance Evaluation*

Quality of Service Routing Network and Performance Evaluation* Quality of Service Routing Network and Performance Evaluation* Shen Lin, Cui Yong, Xu Ming-wei, and Xu Ke Department of Computer Science, Tsinghua University, Beijing, P.R.China, 100084 {shenlin, cy, xmw,

More information

Access Control And Intrusion Detection For Security In Wireless Sensor Network

Access Control And Intrusion Detection For Security In Wireless Sensor Network Access Control And Intrusion Detection For Security In Wireless Sensor Network Sushma J. Gaurkar, Piyush K.Ingole Abstract: In wireless sensor networks (WSN), security access is one of the key component.

More information

New Distributed Algorithm for Connected Dominating Set in Wireless Ad Hoc Networks

New Distributed Algorithm for Connected Dominating Set in Wireless Ad Hoc Networks 0-7695-1435-9/0 $17.00 (c) 00 IEEE 1 Proceedings of the 35th Annual Hawaii International Conference on System Sciences (HICSS-35 0) 0-7695-1435-9/0 $17.00 00 IEEE Proceedings of the 35th Hawaii International

More information

Load-balancing Approach for AOMDV in Ad-hoc Networks R. Vinod Kumar, Dr.R.S.D.Wahida Banu

Load-balancing Approach for AOMDV in Ad-hoc Networks R. Vinod Kumar, Dr.R.S.D.Wahida Banu Load-balancing Approach for AOMDV in Ad-hoc Networks R. Vinod Kumar, Dr.R.S.D.Wahida Banu AP/ECE HOD/ECE Sona College of Technology, GCE, Salem. Salem. ABSTRACT Routing protocol is a challenging issue

More information

International Journal of Scientific & Engineering Research, Volume 4, Issue 11, November-2013 349 ISSN 2229-5518

International Journal of Scientific & Engineering Research, Volume 4, Issue 11, November-2013 349 ISSN 2229-5518 International Journal of Scientific & Engineering Research, Volume 4, Issue 11, November-2013 349 Load Balancing Heterogeneous Request in DHT-based P2P Systems Mrs. Yogita A. Dalvi Dr. R. Shankar Mr. Atesh

More information

Hybrid Energy Efficient Distributed Protocol for Heterogeneous Wireless Sensor Network

Hybrid Energy Efficient Distributed Protocol for Heterogeneous Wireless Sensor Network International Journal of Computer Applications (975 8887) Volume 4 No.6, July 21 Hybrid Energy Efficient Distributed Protocol for Heterogeneous Wireless Sensor Network Harneet Kour Department of Computer

More information

A NETWORK CONSTRUCTION METHOD FOR A SCALABLE P2P VIDEO CONFERENCING SYSTEM

A NETWORK CONSTRUCTION METHOD FOR A SCALABLE P2P VIDEO CONFERENCING SYSTEM A NETWORK CONSTRUCTION METHOD FOR A SCALABLE P2P VIDEO CONFERENCING SYSTEM Hideto Horiuchi, Naoki Wakamiya and Masayuki Murata Graduate School of Information Science and Technology, Osaka University 1

More information

A Novel Routing and Data Transmission Method for Stub Network of Internet of Things based on Percolation

A Novel Routing and Data Transmission Method for Stub Network of Internet of Things based on Percolation IEEE INFOCO 2011 Workshop on 2CN-2011 A Novel Routing and Data Transmission ethod for Stub Network of Internet of Things based on Percolation Xiangming Li, Jihua Lu, Jie Yang, and Jianping An School of

More information

Load Balancing Routing Algorithm for Data Gathering Sensor Network

Load Balancing Routing Algorithm for Data Gathering Sensor Network Load Balancing Routing Algorithm for Data Gathering Sensor Network Evgeny Bakin, Grigory Evseev State University of Aerospace Instrumentation Saint-Petersburg, Russia {jenyb, egs}@vu.spb.ru Denis Dorum

More information

Understanding and Exploiting the Tradeoffs between Broadcasting and Multicasting in Mobile Ad Hoc Networks*

Understanding and Exploiting the Tradeoffs between Broadcasting and Multicasting in Mobile Ad Hoc Networks* Understanding and Exploiting the Tradeoffs between Broadcasting and Multicasting in Mobile Ad Hoc Networks* Lap Kong Law, Srikanth V. Krishnamurthy, and Michalis Faloutsos Department of Computer Science

More information