Data Centric Storage of Data Management in Wireless Sensor Network Dr Col (Retd) Narendra Kumar #1

Size: px
Start display at page:

Download "Data Centric Storage of Data Management in Wireless Sensor Network Dr Col (Retd) Narendra Kumar #1"

Transcription

1 Data Centric Storage of Data Management in Wireless Sensor Network Dr Col (Retd) Narendra Kumar #1 # Director Principal, Swami Devi Dyal Institute of Engineering Technology, Panchkula, Haryana, India Abstract : Wireless Sensor Networks (WSNs) have matured as the technology most suited for monitoring of the environment and data collection. But harnessing the powers of a WSN presents innumerable challenges. Issues related to networking (routing), storage, and transport of the huge data flooding the Network needs to be planned in advance before the data reaches the sink and one has to minimise creation of hotspot on the sensors around the sink. Salient aspects are analysed in this paper. Keywords : DCS - Data Centric Storage QoS - Quality of Service WSN Wireless Sensor Networks GHT - Geographic Hash Table GPSR Greedy Perimeter Stateless Routing Sensornet Network of Sensor Equipment/ Devices. Q-NiGHT - System based on geographical routing QoS. I. INTRODUCTION A sensornet is a distributed sensing network consisting of a large number of small devices, each having some computational, storage and communication capability. Such networks best operated in an unattended mode to record detailed information about their surroundings. They are thus well suited to applications such as location tracking and habitat monitoring, etc. Communication between nodes requires the expenditure of energy, a scarce commodity for most sensornets. Thus, making effective use of sensornet data needs scalable, self-organizing as well as energy-efficient data dissemination algorithms. Making effective use of the vast amounts of data gathered by large-scale sensor networks (sensornets) needs scalable, self-organizing, as well as energy-efficient data dissemination algorithms. The requests for data are normally broadcast to all the sensors, since the sink can hardly know in advance the identity of the sensors that eventually manages to sends the relevant data that sink needs on regular basis. Communication abstractions that are data-centric become the best model, as the data are named and the communication abstractions refer to these names rather than to the node network addresses. The directed diffusion datacentric routing scheme is most promising and energyefficient data dissemination method for sensornet environments. The three canonical methods described in the previous section certainly do not exhaust the design space; combinations of them yield hybrid methods specialized for particular needs. For example : Data-Centric Storage for location guidance. For certain applications, one might combine LS and DCS by storing detailed event information locally and using DCS to inform a querier of an event s location so that subsequent queries can be directed to the proper local store. Data-Centric Storage for context. In the course of processing local data, nodes may find it useful to have some context about global parameters. For instance, data-centric storage could give nodes access to the number of other animals sighted when a node is trying to determine if a migration is underway using simple gadgets as shown below consisting of hardware available off the shelf : Directed queries (geographically targeted). The canonical methods are designed for cases where one does not a priori know the event location. If one already knows the location of the event through out-ofband techniques, then one can direct queries to that location using geographic routing methods. This LS variant stores data locally, and queries are sent (at cost O( n)) to the relevant locations to retrieve the desired data. It avoids the cost of flooding in the canonical LS approach, and the cost of storing each event in the canonical DCS approach. In-network storage and in particular Data Centric Storage (DCS) stores data on a set of sensors that depend on a meta-datum describing the data. DCS is a paradigm that is promising for Data Management in WSNs, since it addresses the problem of scalability (DCS employs unicast communications to manage WSNs), allows in-network data pre-processing and can mitigate hot-spots insurgence. The use of DCS for Data Management in middleware for WSNs. Since WSNs can feature different paradigms for data routing (geographical routing and more ISSN: Page 48

2 traditional tree routing), this thesis introduces two different DCS protocols for these two kinds of WNSs. Q-NiGHT involves geographical routing and manages the quantity of resources assigned to the storage of different meta-data. It implements a load balance for storage of the data over the sensors in the WSN. II. THE ROLE OF WSN The design of WSN applications is challenging since they have to deal with their own business logic, and with the issues that naturally arise when WSNs are taken into account, such as network formation, data transport and data management, security and energy saving. This last requirement arises since nodes are typically battery-powered, and the energy budget of the nodes is limited, hence energy saving techniques are to be implemented to avoid energy starvation and the subsequent death of nodes. Dealing with these issues can be done either explicitly, thus adding complexity to the applications, or implicitly by means of a middleware, that is a software layer that abstracts from common issues of the WSNs. III. FACTS OF WSN In WSN, the particular routing protocol that is used becomes a middleware parameter and the application developer can switch between different routing mechanisms at network creation time, instead at the application design time. Distilling a given high-level behavior from a set of sensors is a challenging problem, especially when explicitly dealing with WSN issues, since the complexity can be overwhelming. Complex scenarios can arise in WSN applications, and a number of theoretical and practical problems blossom when the level of the abstraction of the middleware is deeply pinpointed. Some of them are analyzed here. For example, if an application wants to deliver data to more than one sink, or if the sink is inaccessible for some time, it may be useful to cache data into the network before sending them to the user application which is essentially a scenario of Data Centric Storage (DCS). The paradigm states that data are stored inside the network, in a subset of the sensors that is dependent on a meta-datum that describes the data, and the sinks query the WSN to retrieve the data they are interested in. DCS in general is considered as a useful mechanism to decouple data production from data collection. IV. APPLICATIONS OF WIRELESS SENSOR NETWORKS A large number of low-capacity sensors must be orchestrated into a common behaviour to give support to complex WSN applications. Despite the complexity that must be faced during the development, several kinds of applications are supported by WSNs, since they are flexible enough to be applied in diverse areas, such as: Critical Infrastructure Protection, Tracking. According to the European Commission, Critical Infrastructures consist of those physical and information technology facilities, networks, services and assets which, if disrupted or destroyed, would have a serious impact on the health, safety, security or economic well-being of citizens or the effective functioning of governments in the Member States. Home systems and health monitoring. A smart house is usually made up of several intelligent devices that can control home appliances or feel their surroundings, and it can feature devices that intermix control on intelligent furniture and that monitor user position and/or state. This kind of infrastructure can lead to applications supporting rehabilitation after illness, such as providing assistive technology for cognitive rehabilitation and independent aging. Their technique incorporates a node s residual energy into the cost metric that is computed when determining what route to send packets on. The applications for such networks include inventory management, product quality monitoring, factory process monitoring, disaster area monitoring, biometrics monitoring, and surveillance. V. PERFECT DATA CENTRIC STORAGE A middleware based on DCS represent a novelty into the WSN scene that could expand current WSN capabilities. On the other hand, the most studied implementations of DCS have limitations: The set of sensors that store the data depends on the topology of the WSN, and it is not selectable by the WSN application developer. The storage primitive of DCS assumes uniform distribution of the sensors, thus it is inefficient when the sensors have a different distribution. Dependability is ensured by means of pure replication, in the sense that all the sensors that store a given meta-datum, have to store a copy of all related data. Such issues have been addressed by introducing new mechanisms for the Data Management layer of WSN middleware. Dependability mechanisms used for WSNs, introduce a new way of exploiting erasure coding that can enrich the Data Management layer without increasing the complexity of DCS. A novel Data Management layer mechanism combines gossip routing and erasure coding to disseminate data in WSN efficiently. DCS systems can implement effective innetwork data storage and retrieval, since they require only unicast communications. However existing approaches disregard issues related to load balancing of the sensors, and QoS. The work on Q-NiGHT addressed these issues in WSNs that use a geographical routing protocol. In particular, Q-NiGHT uses a rejection hashing technique that produces pairs of coordinates by taking into account the actual sensor density, and then relies on a novel dispersal technique that enforces QoS and provides load balance. Simulation results show that Q-NiGHT significantly balances the storage load on the sensors and it adapts to different sensors distributions. The Data Centric Storage systems can be combined with memoryefficient erasure codes. The use of erasure codes is however not immediate, since it requires the sensors to perform the encoding of the data before the storage ISSN: Page 49

3 (encoding that is not necessary in traditional DCS since they exploit pure replication). In fact it is necessary that each sensor be assigned with a coding parameter, and this assignment is critical from the point of view of correct data coding and decoding. For this reason a probabilistic model was proposed, and it allowed the estimation of correct coding and decoding probability; this model was adapted to estimate this probability in three cases of study: local storage, DCS-GHT, and Q- NiGHT. From the analytical and simulative results, it emerged that correct coding/ decoding can be achieved with high probability with the three systems for different network configurations. Further, the application of erasure coding to spatial gossiping, showed that by using spatial gossip, it is possible to quickly establish an in-network erasure coding of the generated data. The gossip algorithm has a near linear message cost. Using erasure codes, generated data can be recovered from a subset of the nodes with high probability. The application of this storage scheme is useful to combat node failures and to help with efficient data collections with data mules. A variation of the basic gossip algorithm has data mules that can effectively reconstruct data as soon as it collects the code words. Futuristic DCS systems may take into account sensor distribution, as in the case of Q-NiGHT, or the on-the-fly estimation of the distribution of the sensors, can be exploited to better fashion or tailor the generalized hash function that associates meta-data to locations in the sensing area and to deal with topology changes due to sensors failures and/or sensors mobility VI. THE DCS PROBLEM We have argued for the utility of a DCS service for sensornets. Now we will define the data-centric storage problem in more detail: the storage abstraction DCS provides, the design goals a robust, scalable DCS system must meet, and our geographic hashing approach to DCS architecture that meets these design goals. Storage abstraction Like the many distributed hash table systems before it.dcs provides a (key, value)-based associative memory. Events are named with keys. Both the storage of an event and its retrieval are performed using these keys. DCS is naming-agnostic; any naming scheme that distinguishes events that users of the sensornet wish to identify distinctly suffices. The two operations DCS supports are: Put(k, v) stores v (the observed data) according to the key k, the name of the data. Get(k) retrieves whatever value is stored associated with key k. Design criteria The challenge in any design for a DCS system is to meet scalability and robustness criteria despite the system s fundamentally distributed nature. Sensornets represent a particularly challenging environment for a distributed storage system: Node failures may be routine; exhaustion of battery power and permanent or transient failure in a harsh environment are problems in any realistic sensornet deployment. Topology changes will be more frequent than on traditional wired networks. Node failures, node mobility, and received signal strength variations in real radio deployments each independently cause neighbor relationships among nodes to change over time. System scale in nodes may be very great. Sensor nodes may be deployed extremely densely (consider the limit case of smart dust [1]), and may be deployed over a very wide physical region, such that the total number of devices participating in the DCS system may be on the order of 106 or more nodes. Energy constraints will often be severe; nodes will operate from battery power. These challenges suggest several specific, important design criteria for ensuring scalability and robustness in the distributed storage system we envision: Persistence: a (k, v) pair stored in the system must remain available to queries, despite sensor node failures and changes in the sensor network topology. Consistency: a query for k must be routed correctly to a node where (k, v) pairs are currently stored; if this node changes (e.g., to maintain persistence after a node failure), queries and stored data must choose a new node consistently. Scaling in database size: as the number of (k, v) pairs stored in the system increases, whether for the same or different ks, storage should not concentrate at any one node. Scaling in node count: as the number of nodes in the system increases, the system s total storage capacity should increase, and the communication cost of the system should not grow unduly. Nor should any node become a concentration point of communication. Topological generality: the system should work well on a broad range of network topologies. VII. GHT: A GEOGRAPHIC HASH TABLE The DCS system architecture we describe in this paper to meet the above-enumerated design criteria is GHT, a Geographic Hash Table. The core step in GHT is the hashing of a key k into geographic coordinates. Both a Put() operation and a Get() operation on the same key k hash k to the same location. A key value pair is stored at a node in the vicinity of the location to which its key hashes. Choosing this node consistently is central to building a GHT. If we assume a perfectly static network topology and a network routing system that can deliver packets to positions, such a GHT will cause storage requests and queries for the same k to be routed to the same node, and will distribute the storage request and query load for distinct k values evenly across the area covered by a network. ISSN: Page 50

4 The service provided by GHT is similar in character to those offered by other distributed hash table systems [2,6,]. However, as is the case with those systems, much of the nuance to the GHT system design arises specifically to ensure robustness and scalability in the face of the many sorts of failures possible in a distributed system. GHT uses a novel perimeter refresh protocol to provide both persistence and consistency when nodes fail or move. This protocol replicates stored data for key k at nodes around the location to which k hashes, and ensures that one node is chosen consistently as the home node for that k, so that all storage requests and queries for k can be routed to that node. Yet the protocol is efficient; it typically uses highly local communication, especially on networks where nodes are deployed densely. By hashing keys, GHT spreads storage and communication load between different keys evenly throughout the sensornet. When many events with the same key are stored, GHT avoids creating a hotspot of communication and storage at their shared home node by employing structured replication, whereby events that hash to the same home node can be divided among multiple mirrors. VIII. ALGORITHMS We proceed now to describe the algorithms that comprise GHT. GHT is built atop GPSR [14 16], a geographic routing system for multi-hop wireless networks. After briefly reviewing the features of GPSR s design relevant to GHT, we identify a previously unexploited characteristic of GPSR that allows all packets destined for an arbitrary location (unoccupied by a node) to be routed consistently to the same node in the vicinity of that location. GHT leverages this characteristic to route storage requests and queries for the same key to the same node, despite the ignorance of the hash function that maps keys into locations of the placement of nodes in the network. We then describe algorithms and implementations of the perimeter refresh protocol and structured replication, which allow GHT to achieve the DCS design criteria for scalability and robustness discussed in the previous section GPSR Under GPSR, packets are routed geographically. All packets are marked with the positions of their destinations. All nodes know their own positions, and the positions of the nodes a single hop away from them. Using only this local knowledge, GPSR can forwarding behavior of the various canonical mechanisms. This simulator may be used to examine the number and pattern of packet transmissions (as a measure of energy consumption) as the size and nature of the sensornet and workload vary, to illuminate the relative performance of the canonical data dissemination algorithms. We do not count PRP packets in these simulations. route a packet to any connected destination. Performance of such systems are strained in actual scenario depending on the operational efficiency of hardware and algorithms that executes the onerous tasks of reducing the redundancies in the livestreaming data. IX. CONCLUSION The live streaming Data received in a WSN is voluminous. The Nodes have to act as supervisors to reduce the redundancies in order to enhance their efficiency and longevity / survival of Sensors, and thereby the WSN. GHT works well in sensornets with stable and static nodes. But failures (and movement, in some cases) are inevitable, and thus the robustness of design against these factors becomes paramount. Various robustness tests, subject design to very harsh environments. Most generous run with failing nodes use mean cycle-times of the order of minutes, far worse than for most projected sensornet systems, yet, as long as the fraction of failing nodes is not overly high, or the cycle times are tens of minutes, the system performs fairly well. Similarly, if the extent and rate of movement in the mobile node case is significant; nodes rest only a minute between movements, and the movements are large excursions (half the size of the sensornet, on average), not slight adjustments. Here, too, availability remains high. GHT algorithm replicates a key value pair at nodes in the immediate vicinity of the home node. Localized replication of this form is of little use if all the nodes in an area fail at the same time (e.g., a fire destroys all nodes in a region). Resilience against these clustered failures could be provided by storing each eventmultiple times at dispersed locations (using multiple hash functions). The detailed ns-2 simulations verify the correctness and robustness of the GHT system in a realistic wireless environment, including MAC-layer behavior, packet loss, node dynamics, etc. However, they are limited to system sizes of the order of 100 nodes. Less detailed simulations are used to compare the three canonical mechanisms external storage (ES), local storage (LS), and data-centric storage (DCS) in much larger systems. By building special-purpose simulator that assumes that nodes are stable and stationary and that packet delivery to neighboring nodes is instantaneous and error-free. This simulator thus faithfully represents the packet generation and The length of a perimeter is purely determined by the density of the network, and only vary system scale in nodes, not density, in the large-scale simulations. Two metrics may be used to evaluate the performance namely : - total number of packets generated, - and the hotspot usage, ISSN: Page 51

5 The hotspot usage is the maximum number of packets transmitted by any single node. Latency is not measured, as that is approximately the same across the algorithms, assuming that all other factors (such as the fidelity of the data) are held fixed across the various algorithms. The relevant system parameters are: n, the number of nodes in the system; T, the number of event types; Q, the number of event types queried for; Di, the number of detected events of event type i. A typical WSN, may have T = 100 and Di = 100 for all i, then by varying n and Q three tests may be done. In test #1, hold n fixed (n = 10000) and vary Q. In test #2, set Q = 50 and vary n; or hold the system density fixed and increase the sensornet size as n increases. In Test #3, use parameters as in test #1, but employ further optimization of in-network aggregation. All these results when averaged across ten different topologies, with ten runs on each topology of these tests, shows the results pertaining to the ES, the LS, and the following three versions of DCS: Normal DCS (N-DCS). A query returns a separate message for each detected event. Summarized DCS (S-DCS). A query returns a single message regardless of the number of detected events. Structured Replication DCS (SR-DCS). An optimal level of SR provides a lower bound. Summarization may be feasible. In fact, Other Researchers have predicted analytically and verified in simulations of networks of 100,000 nodes that the cases where DCS offers reduced total network load and hotspot network usage as compared with external storage and local storage are appreciable. Analysis reveals that these benefits occur on sensornets comprised of large node populations, and where many events are detected, but not all event types are queried. GHT leverages the GPSR geographic routing system to offer an efficient DCS service that maintains persistence of data when nodes fail or move, while scalably spreading the load of (key, value) pairs evenly throughout the sensornet. Some aspects need further investigation. Foremost among these is the effect of varying node density. GHT fundamentally requires that a node know it s own geographic position. Under GHT, keys are uniformly hashed over the geographic space. Hence, as nodes are distributed increasingly non-uniformly, we expect the storage and forwarding load across nodes to be correspondingly skewed. Consequent performance implications and developing mechanisms that can adapt to such non-uniformity need further research work to achieve higher efficiency in the field ACKNOWLEDGMENT I acknowledge the Management of Swami Devi Dyal Group of Institutions for providing me the opportunity to write this technical paper and the resources to conduct the National Conference. REFERENCES [1] Y.F. Hu: Wireless Sensor Networks: a Survey on the State of the Art and the and ZigBee Standards. In: Computer Communications, vol. 30, n. 7, pp (2007) [2] E. Cayirci: A survey on sensor networks. In:IEEE Communications Magazine vol. 40, n. 8 (2002) [3] S. Chessa: Sensor Network Standards. book chapter in: J. Zheng and A. Jamalipour, Wireless Sensor Networks: A Networking Perspective, Wiley-IEEE Press, ISBN: , p , September 2009 [4] P.A. Dinda: Archetype-based design: Sensor network programming for application experts, not just programming experts. In: IPSN 09: Proceedings of the 2009 International Conference on Information Processing in Sensor Networks, p (2009) [5] R.K. Gupta: Programming Models for Sensor Networks: A Survey. In: ACM Transactions on Sensor Networks vol. 4, n. 2, 1-28, March 2008 [6] R. Buyya: Service Oriented Sensor Web. In: Sensor Networks and Configuration: Fundamentals, Standards, Platforms and Applications, Springer- Verlag, pp (2007) [7] T. Braun: Programmability Models for Sensor Networks. In: First International Conference on Autonomous Infrastructure, Management and Security, AIMS 2007, p. 233, June 21-22, 2007 [8] S.K. Dasi: Middleware for wireless sensor networks: A survey. In: Journal of Computer Science and Technology 23(3) (May 2008) [9] Middleware for wireless sensor networks: Challenges and Approaches. In: Seminar on Internetworking, Helsinki University of Technology, Finland, April 27th [10] An Evaluation Framework for middleware approaches on Wireless Sensor Networks. In: Seminar on Internetworking, Helsinki University of Technology, Finland, April 27th 2009 ISSN: Page 52

QUALITY OF SERVICE METRICS FOR DATA TRANSMISSION IN MESH TOPOLOGIES

QUALITY OF SERVICE METRICS FOR DATA TRANSMISSION IN MESH TOPOLOGIES QUALITY OF SERVICE METRICS FOR DATA TRANSMISSION IN MESH TOPOLOGIES SWATHI NANDURI * ZAHOOR-UL-HUQ * Master of Technology, Associate Professor, G. Pulla Reddy Engineering College, G. Pulla Reddy Engineering

More information

How To Balance Network Load In A Wireless Sensor Network

How To Balance Network Load In A Wireless Sensor Network Balancing Network Traffic Load in Geographic Hash Table (GHT) R. Asha, V.Manju, Meka Sindhu & T. Subha Department of Information Technology, Sri Sai Ram Engineering College, Chennai. E-mail : ashaniteesh@gmail.com,

More information

LOAD BALANCING AND EFFICIENT CLUSTERING FOR IMPROVING NETWORK PERFORMANCE IN AD-HOC NETWORKS

LOAD BALANCING AND EFFICIENT CLUSTERING FOR IMPROVING NETWORK PERFORMANCE IN AD-HOC NETWORKS LOAD BALANCING AND EFFICIENT CLUSTERING FOR IMPROVING NETWORK PERFORMANCE IN AD-HOC NETWORKS Saranya.S 1, Menakambal.S 2 1 M.E., Embedded System Technologies, Nandha Engineering College (Autonomous), (India)

More information

A Novel Multi Ring Forwarding Protocol for Avoiding the Void Nodes for Balanced Energy Consumption

A Novel Multi Ring Forwarding Protocol for Avoiding the Void Nodes for Balanced Energy Consumption International Journal of Computer Sciences and Engineering Open Access Review Paper Volume-4, Issue-4 E-ISSN: 2347-2693 A Novel Multi Ring Forwarding Protocol for Avoiding the Void Nodes for Balanced Energy

More information

Load Balancing in Periodic Wireless Sensor Networks for Lifetime Maximisation

Load Balancing in Periodic Wireless Sensor Networks for Lifetime Maximisation Load Balancing in Periodic Wireless Sensor Networks for Lifetime Maximisation Anthony Kleerekoper 2nd year PhD Multi-Service Networks 2011 The Energy Hole Problem Uniform distribution of motes Regular,

More information

Wireless Sensor Networks Chapter 14: Security in WSNs

Wireless Sensor Networks Chapter 14: Security in WSNs Wireless Sensor Networks Chapter 14: Security in WSNs António Grilo Courtesy: see reading list Goals of this chapter To give an understanding of the security vulnerabilities of Wireless Sensor Networks

More information

AN EFFICIENT STRATEGY OF AGGREGATE SECURE DATA TRANSMISSION

AN EFFICIENT STRATEGY OF AGGREGATE SECURE DATA TRANSMISSION INTERNATIONAL JOURNAL OF REVIEWS ON RECENT ELECTRONICS AND COMPUTER SCIENCE AN EFFICIENT STRATEGY OF AGGREGATE SECURE DATA TRANSMISSION K.Anusha 1, K.Sudha 2 1 M.Tech Student, Dept of CSE, Aurora's Technological

More information

Ad hoc and Sensor Networks Chapter 1: Motivation & Applications

Ad hoc and Sensor Networks Chapter 1: Motivation & Applications Ad hoc and Sensor Networks Chapter 1: Motivation & Applications Holger Karl Computer Networks Group Universität Paderborn Goals of this chapter Give an understanding what ad hoc & sensor networks are good

More information

Research Article ISSN 2277 9140 Copyright by the authors - Licensee IJACIT- Under Creative Commons license 3.0

Research Article ISSN 2277 9140 Copyright by the authors - Licensee IJACIT- Under Creative Commons license 3.0 INTERNATIONAL JOURNAL OF ADVANCES IN COMPUTING AND INFORMATION TECHNOLOGY An international, online, open access, peer reviewed journal Volume 2 Issue 2 April 2013 Research Article ISSN 2277 9140 Copyright

More information

Energy Efficient Load Balancing among Heterogeneous Nodes of Wireless Sensor Network

Energy Efficient Load Balancing among Heterogeneous Nodes of Wireless Sensor Network Energy Efficient Load Balancing among Heterogeneous Nodes of Wireless Sensor Network Chandrakant N Bangalore, India nadhachandra@gmail.com Abstract Energy efficient load balancing in a Wireless Sensor

More information

Protocols and Architectures for Wireless Sensor Netwoks. by Holger Karl and Andreas Willig

Protocols and Architectures for Wireless Sensor Netwoks. by Holger Karl and Andreas Willig Protocols and Architectures for Wireless Sensor Netwoks by Holger Karl and Andreas Willig Grade Midterm Exam. 25% Exercises 35% (5 ~ 7 times) Term Project 30% Class Attitude 10% 2 Ad hoc and Sensor Networks

More information

Figure 1. The Example of ZigBee AODV Algorithm

Figure 1. The Example of ZigBee AODV Algorithm TELKOMNIKA Indonesian Journal of Electrical Engineering Vol.12, No.2, February 2014, pp. 1528 ~ 1535 DOI: http://dx.doi.org/10.11591/telkomnika.v12i2.3576 1528 Improving ZigBee AODV Mesh Routing Algorithm

More information

Evaluation of Unlimited Storage: Towards Better Data Access Model for Sensor Network

Evaluation of Unlimited Storage: Towards Better Data Access Model for Sensor Network Evaluation of Unlimited Storage: Towards Better Data Access Model for Sensor Network Sagar M Mane Walchand Institute of Technology Solapur. India. Solapur University, Solapur. S.S.Apte Walchand Institute

More information

Consecutive Geographic Multicasting Protocol in Large-Scale Wireless Sensor Networks

Consecutive Geographic Multicasting Protocol in Large-Scale Wireless Sensor Networks 21st Annual IEEE International Symposium on Personal, Indoor and Mobile Radio Communications Consecutive Geographic Multicasting Protocol in Large-Scale Wireless Sensor Networks Jeongcheol Lee, Euisin

More information

A Secure Data Transmission for Cluster based Wireless Sensor Network Using LEACH Protocol

A Secure Data Transmission for Cluster based Wireless Sensor Network Using LEACH Protocol A Secure Data Transmission for Cluster based Wireless Sensor Network Using LEACH Protocol Vinoda B Dibbad 1, C M Parameshwarappa 2 1 PG Student, Dept of CS&E, STJIT, Ranebennur, Karnataka, India 2 Professor,

More information

Wireless Sensor Networks Chapter 3: Network architecture

Wireless Sensor Networks Chapter 3: Network architecture Wireless Sensor Networks Chapter 3: Network architecture António Grilo Courtesy: Holger Karl, UPB Goals of this chapter Having looked at the individual nodes in the previous chapter, we look at general

More information

International Journal of Scientific & Engineering Research, Volume 4, Issue 11, November-2013 349 ISSN 2229-5518

International Journal of Scientific & Engineering Research, Volume 4, Issue 11, November-2013 349 ISSN 2229-5518 International Journal of Scientific & Engineering Research, Volume 4, Issue 11, November-2013 349 Load Balancing Heterogeneous Request in DHT-based P2P Systems Mrs. Yogita A. Dalvi Dr. R. Shankar Mr. Atesh

More information

Routing and Transport in Wireless Sensor Networks

Routing and Transport in Wireless Sensor Networks Routing and Transport in Wireless Sensor Networks Ibrahim Matta (matta@bu.edu) Niky Riga (inki@bu.edu) Georgios Smaragdakis (gsmaragd@bu.edu) Wei Li (wli@bu.edu) Vijay Erramilli (evijay@bu.edu) References

More information

8 Conclusion and Future Work

8 Conclusion and Future Work 8 Conclusion and Future Work This chapter concludes this thesis and provides an outlook on future work in the area of mobile ad hoc networks and peer-to-peer overlay networks 8.1 Conclusion Due to the

More information

Applying Mesh Networking to Wireless Lighting Control

Applying Mesh Networking to Wireless Lighting Control White Paper Applying Mesh Networking to Wireless Lighting Control www.daintree.net Abstract Recent advances in wireless communications standards and energy-efficient lighting equipment have made it possible

More information

Energy Aware Load Balancing in Secure Heterogeneous Wireless Sensor Network

Energy Aware Load Balancing in Secure Heterogeneous Wireless Sensor Network Energy Aware Load Balancing in Secure Heterogeneous Wireless Sensor Network Chandrakant N Bangalore, India nadhachandra@gmail.com Abstract A Wireless Sensor Network(WSN) is a energy and security constraint

More information

Dipak Wajgi Dept. of Computer Science and Engineering Ramdeobaba College of Engg. and Management Nagpur, India

Dipak Wajgi Dept. of Computer Science and Engineering Ramdeobaba College of Engg. and Management Nagpur, India Load Balancing Algorithms in Wireless Sensor Network : A Survey Dipak Wajgi Dept. of Computer Science and Engineering Ramdeobaba College of Engg. and Management Nagpur, India Dr. Nileshsingh V. Thakur

More information

Wireless Sensor Networks Database: Data Management and Implementation

Wireless Sensor Networks Database: Data Management and Implementation Sensors & Transducers 2014 by IFSA Publishing, S. L. http://www.sensorsportal.com Wireless Sensor Networks Database: Data Management and Implementation Ping Liu Computer and Information Engineering Institute,

More information

An Efficient Hybrid Data Gathering Scheme in Wireless Sensor Networks

An Efficient Hybrid Data Gathering Scheme in Wireless Sensor Networks An Efficient Hybrid Data Gathering Scheme in Wireless Sensor Networks Ayon Chakraborty 1, Swarup Kumar Mitra 2, and M.K. Naskar 3 1 Department of CSE, Jadavpur University, Kolkata, India 2 Department of

More information

Lecture 14: Data transfer in multihop wireless networks. Mythili Vutukuru CS 653 Spring 2014 March 6, Thursday

Lecture 14: Data transfer in multihop wireless networks. Mythili Vutukuru CS 653 Spring 2014 March 6, Thursday Lecture 14: Data transfer in multihop wireless networks Mythili Vutukuru CS 653 Spring 2014 March 6, Thursday Data transfer over multiple wireless hops Many applications: TCP flow from a wireless node

More information

A Security Architecture for. Wireless Sensor Networks Environmental

A Security Architecture for. Wireless Sensor Networks Environmental Contemporary Engineering Sciences, Vol. 7, 2014, no. 15, 737-742 HIKARI Ltd, www.m-hikari.com http://dx.doi.org/10.12988/ces.2014.4683 A Security Architecture for Wireless Sensor Networks Environmental

More information

Christian Bettstetter. Mobility Modeling, Connectivity, and Adaptive Clustering in Ad Hoc Networks

Christian Bettstetter. Mobility Modeling, Connectivity, and Adaptive Clustering in Ad Hoc Networks Christian Bettstetter Mobility Modeling, Connectivity, and Adaptive Clustering in Ad Hoc Networks Contents 1 Introduction 1 2 Ad Hoc Networking: Principles, Applications, and Research Issues 5 2.1 Fundamental

More information

EFFICIENT DETECTION IN DDOS ATTACK FOR TOPOLOGY GRAPH DEPENDENT PERFORMANCE IN PPM LARGE SCALE IPTRACEBACK

EFFICIENT DETECTION IN DDOS ATTACK FOR TOPOLOGY GRAPH DEPENDENT PERFORMANCE IN PPM LARGE SCALE IPTRACEBACK EFFICIENT DETECTION IN DDOS ATTACK FOR TOPOLOGY GRAPH DEPENDENT PERFORMANCE IN PPM LARGE SCALE IPTRACEBACK S.Abarna 1, R.Padmapriya 2 1 Mphil Scholar, 2 Assistant Professor, Department of Computer Science,

More information

How To Provide Qos Based Routing In The Internet

How To Provide Qos Based Routing In The Internet CHAPTER 2 QoS ROUTING AND ITS ROLE IN QOS PARADIGM 22 QoS ROUTING AND ITS ROLE IN QOS PARADIGM 2.1 INTRODUCTION As the main emphasis of the present research work is on achieving QoS in routing, hence this

More information

Designing a Cloud Storage System

Designing a Cloud Storage System Designing a Cloud Storage System End to End Cloud Storage When designing a cloud storage system, there is value in decoupling the system s archival capacity (its ability to persistently store large volumes

More information

Wireless Sensor Network: Challenges, Issues and Research

Wireless Sensor Network: Challenges, Issues and Research ISBN 978-93-84468-20-0 Proceedings of 2015 International Conference on Future Computational Technologies (ICFCT'2015) Singapore, March 29-30, 2015, pp. 224-228 Wireless Sensor Network: Challenges, Issues

More information

An Empirical Approach - Distributed Mobility Management for Target Tracking in MANETs

An Empirical Approach - Distributed Mobility Management for Target Tracking in MANETs An Empirical Approach - Distributed Mobility Management for Target Tracking in MANETs G.Michael Assistant Professor, Department of CSE, Bharath University, Chennai, TN, India ABSTRACT: Mobility management

More information

Energy Effective Routing Protocol for Maximizing Network Lifetime of WSN

Energy Effective Routing Protocol for Maximizing Network Lifetime of WSN Energy Effective Routing Protocol for Maximizing Network Lifetime of WSN Rachana Ballal 1, S.Girish 2 4 th sem M.tech, Dept.of CS&E, Sahyadri College of Engineering and Management, Adyar, Mangalore, India

More information

Isolines: Energy-efficient Mapping in Sensor Networks

Isolines: Energy-efficient Mapping in Sensor Networks Isolines: Energy-efficient Mapping in Sensor Networks Ignacio Solis and Katia Obraczka {isolis, katia}@cse.ucsc.edu Computer Engineering Department University of California, Santa Cruz April 15, 2005 Abstract

More information

Study And Comparison Of Mobile Ad-Hoc Networks Using Ant Colony Optimization

Study And Comparison Of Mobile Ad-Hoc Networks Using Ant Colony Optimization Study And Comparison Of Mobile Ad-Hoc Networks Using Ant Colony Optimization 1 Neha Ujala Tirkey, 2 Navendu Nitin, 3 Neelesh Agrawal, 4 Arvind Kumar Jaiswal 1 M. Tech student, 2&3 Assistant Professor,

More information

Wireless Sensor Network Security. Seth A. Hellbusch CMPE 257

Wireless Sensor Network Security. Seth A. Hellbusch CMPE 257 Wireless Sensor Network Security Seth A. Hellbusch CMPE 257 Wireless Sensor Networks (WSN) 2 The main characteristics of a WSN include: Power consumption constrains for nodes using batteries or energy

More information

Content Delivery Network (CDN) and P2P Model

Content Delivery Network (CDN) and P2P Model A multi-agent algorithm to improve content management in CDN networks Agostino Forestiero, forestiero@icar.cnr.it Carlo Mastroianni, mastroianni@icar.cnr.it ICAR-CNR Institute for High Performance Computing

More information

Mobile Network Analysis - Hole Healing

Mobile Network Analysis - Hole Healing , pp.143-150 http://dx.doi.org/10.14257/ijfgcn.2013.6.6.15 Decentralized Mobile Sensor Navigation for Hole Healing Policy in Wireless Hybrid Sensor Networks Fu-Tian Lin 1, 2, Chu-Sing Yang 1, Tien-Wen

More information

Congestion Control in WSN using Cluster and Adaptive Load Balanced Routing Protocol

Congestion Control in WSN using Cluster and Adaptive Load Balanced Routing Protocol Congestion Control in WSN using Cluster and Adaptive Load Balanced Routing Protocol Monu Rani 1, Kiran Gupta 2, Arvind Sharma 3 1 M.Tech (Student), 2 Assistant Professor, 3 Assistant Professor Department

More information

An Intelligent Framework for Vehicular Ad-hoc Networks using SDN Architecture

An Intelligent Framework for Vehicular Ad-hoc Networks using SDN Architecture 435 An Intelligent Framework for Vehicular Ad-hoc Networks using SDN Architecture Balamurugan.V School of Computing Science and Engineering, VIT University Chennai Campus, 600127, Tamilnadu, India. Abstract

More information

International Journal of Emerging Technologies in Computational and Applied Sciences (IJETCAS) www.iasir.net

International Journal of Emerging Technologies in Computational and Applied Sciences (IJETCAS) www.iasir.net International Association of Scientific Innovation and Research (IASIR) (An Association Unifying the Sciences, Engineering, and Applied Research) International Journal of Emerging Technologies in Computational

More information

TOPOLOGIES NETWORK SECURITY SERVICES

TOPOLOGIES NETWORK SECURITY SERVICES TOPOLOGIES NETWORK SECURITY SERVICES 1 R.DEEPA 1 Assitant Professor, Dept.of.Computer science, Raja s college of Tamil Studies & Sanskrit,Thiruvaiyaru ABSTRACT--In the paper propose about topology security

More information

PERFORMANCE STUDY AND SIMULATION OF AN ANYCAST PROTOCOL FOR WIRELESS MOBILE AD HOC NETWORKS

PERFORMANCE STUDY AND SIMULATION OF AN ANYCAST PROTOCOL FOR WIRELESS MOBILE AD HOC NETWORKS PERFORMANCE STUDY AND SIMULATION OF AN ANYCAST PROTOCOL FOR WIRELESS MOBILE AD HOC NETWORKS Reza Azizi Engineering Department, Bojnourd Branch, Islamic Azad University, Bojnourd, Iran reza.azizi@bojnourdiau.ac.ir

More information

Optimizing Data Center Networks for Cloud Computing

Optimizing Data Center Networks for Cloud Computing PRAMAK 1 Optimizing Data Center Networks for Cloud Computing Data Center networks have evolved over time as the nature of computing changed. They evolved to handle the computing models based on main-frames,

More information

Some Security Trends over Wireless Sensor Networks

Some Security Trends over Wireless Sensor Networks Some Security Trends over Wireless Sensor Networks ZORAN BOJKOVIC, BOJAN BAKMAZ, MIODRAG BAKMAZ Faculty of Transport and Traffic Engineering University of Belgrade Vojvode Stepe 305 SERBIA Abstract: -

More information

SPY AGENT BASED SECURE DATA AGGREGATION IN WSN

SPY AGENT BASED SECURE DATA AGGREGATION IN WSN ISSN: 2229-6948(ONLINE) ICTACT JOURNAL ON COMMUNICATION TECHNOLOGY, DECEMBER 214, VOLUME: 5, ISSUE: 4 SPY AGENT BASED SECURE DATA AGGREGATION IN WSN T. Lathies Bhasker 1 and G. Arul Jagan 2 1 Department

More information

Study of Different Types of Attacks on Multicast in Mobile Ad Hoc Networks

Study of Different Types of Attacks on Multicast in Mobile Ad Hoc Networks Study of Different Types of Attacks on Multicast in Mobile Ad Hoc Networks Hoang Lan Nguyen and Uyen Trang Nguyen Department of Computer Science and Engineering, York University 47 Keele Street, Toronto,

More information

An Active Packet can be classified as

An Active Packet can be classified as Mobile Agents for Active Network Management By Rumeel Kazi and Patricia Morreale Stevens Institute of Technology Contact: rkazi,pat@ati.stevens-tech.edu Abstract-Traditionally, network management systems

More information

Wireless Sensor Network: Improving the Network Energy Consumption

Wireless Sensor Network: Improving the Network Energy Consumption Wireless Sensor Network: Improving the Network Energy Consumption Ingrid Teixeira, José Ferreira de Rezende and Aloysio de Castro P. Pedroza Abstract-- In a remote sensor application it is desirable that

More information

Mobile Security Wireless Mesh Network Security. Sascha Alexander Jopen

Mobile Security Wireless Mesh Network Security. Sascha Alexander Jopen Mobile Security Wireless Mesh Network Security Sascha Alexander Jopen Overview Introduction Wireless Ad-hoc Networks Wireless Mesh Networks Security in Wireless Networks Attacks on Wireless Mesh Networks

More information

Participatory Cloud Computing and the Privacy and Security of Medical Information Applied to A Wireless Smart Board Network

Participatory Cloud Computing and the Privacy and Security of Medical Information Applied to A Wireless Smart Board Network Participatory Cloud Computing and the Privacy and Security of Medical Information Applied to A Wireless Smart Board Network Lutando Ngqakaza ngqlut003@myuct.ac.za UCT Department of Computer Science Abstract:

More information

A Routing Algorithm Designed for Wireless Sensor Networks: Balanced Load-Latency Convergecast Tree with Dynamic Modification

A Routing Algorithm Designed for Wireless Sensor Networks: Balanced Load-Latency Convergecast Tree with Dynamic Modification A Routing Algorithm Designed for Wireless Sensor Networks: Balanced Load-Latency Convergecast Tree with Dynamic Modification Sheng-Cong Hu r00631036@ntu.edu.tw Jen-Hou Liu r99631038@ntu.edu.tw Min-Sheng

More information

Ad hoc and Sensor Networks Chapter 13: Transport Layer and Quality of Service

Ad hoc and Sensor Networks Chapter 13: Transport Layer and Quality of Service Ad hoc and Sensor Networks Chapter 13: Transport Layer and Quality of Service António Grilo Courtesy: Holger Karl, UPB Overview Dependability requirements Delivering single packets Delivering blocks of

More information

A NOVEL OVERLAY IDS FOR WIRELESS SENSOR NETWORKS

A NOVEL OVERLAY IDS FOR WIRELESS SENSOR NETWORKS A NOVEL OVERLAY IDS FOR WIRELESS SENSOR NETWORKS Sumanta Saha, Md. Safiqul Islam, Md. Sakhawat Hossen School of Information and Communication Technology The Royal Institute of Technology (KTH) Stockholm,

More information

In-Network Coding for Resilient Sensor Data Storage and Efficient Data Mule Collection

In-Network Coding for Resilient Sensor Data Storage and Efficient Data Mule Collection In-Network Coding for Resilient Sensor Data Storage and Efficient Data Mule Collection Michele Albano Jie Gao Instituto de telecomunicacoes, Aveiro, Portugal Stony Brook University, Stony Brook, USA Data

More information

Sensor Event Processing on Grid

Sensor Event Processing on Grid Sensor Event Processing on Grid Eui-Nam Huh Dept. of Computer Engineering Kyung Hee University #1 Seochon Kiheung, Yoingin, Kyunggi-Do, Korea johnhuh@khu.ac.kr Abstract. Wireless sensor networks are increasingly

More information

ssumathy@vit.ac.in upendra_mcs2@yahoo.com

ssumathy@vit.ac.in upendra_mcs2@yahoo.com S. Sumathy 1 and B.Upendra Kumar 2 1 School of Computing Sciences, VIT University, Vellore-632 014, Tamilnadu, India ssumathy@vit.ac.in 2 School of Computing Sciences, VIT University, Vellore-632 014,

More information

ROUTE MECHANISMS FOR WIRELESS ADHOC NETWORKS: -CLASSIFICATIONS AND COMPARISON ANALYSIS

ROUTE MECHANISMS FOR WIRELESS ADHOC NETWORKS: -CLASSIFICATIONS AND COMPARISON ANALYSIS International Journal of Science, Environment and Technology, Vol. 1, No 2, 2012, 72-79 ROUTE MECHANISMS FOR WIRELESS ADHOC NETWORKS: -CLASSIFICATIONS AND COMPARISON ANALYSIS Ramesh Kait 1, R. K. Chauhan

More information

Outline. Application examples. Infrastructure-based limits? Infrastructure-based wireless networks. Possible applications

Outline. Application examples. Infrastructure-based limits? Infrastructure-based wireless networks. Possible applications Outline TDDI13 Distributed embedded software and networks Infrastructure for wireless (Mobile) ad hoc networks Wireless sensor networks Comparison of mobile nets and WSN WSN Enabling technology 36 pages

More information

End-to-End Security in Wireless Sensor Networks (WSNs) Talk by Claudio Anliker Supervised by Dr. Corinna Schmitt CSG@IFI, University of Zurich

End-to-End Security in Wireless Sensor Networks (WSNs) Talk by Claudio Anliker Supervised by Dr. Corinna Schmitt CSG@IFI, University of Zurich End-to-End Security in Wireless Sensor (WSNs) Talk by Supervised by Dr. Corinna Schmitt CSG@IFI, University of Zurich Content 1. Motivation 2. Security Issues and Principles 3. Internet-of-Things and Wireless

More information

Introduction to Wireless Sensor Network Security

Introduction to Wireless Sensor Network Security Smartening the Environment using Wireless Sensor Networks in a Developing Country Introduction to Wireless Sensor Network Security Presented By Al-Sakib Khan Pathan Department of Computer Science and Engineering

More information

International Journal of Advancements in Research & Technology, Volume 3, Issue 4, April-2014 55 ISSN 2278-7763

International Journal of Advancements in Research & Technology, Volume 3, Issue 4, April-2014 55 ISSN 2278-7763 International Journal of Advancements in Research & Technology, Volume 3, Issue 4, April-2014 55 Management of Wireless sensor networks using cloud technology Dipankar Mishra, Department of Electronics,

More information

A NOVEL RESOURCE EFFICIENT DMMS APPROACH

A NOVEL RESOURCE EFFICIENT DMMS APPROACH A NOVEL RESOURCE EFFICIENT DMMS APPROACH FOR NETWORK MONITORING AND CONTROLLING FUNCTIONS Golam R. Khan 1, Sharmistha Khan 2, Dhadesugoor R. Vaman 3, and Suxia Cui 4 Department of Electrical and Computer

More information

Restricted and Mobile: Security in Mobile Wireless Sensor Networks Kısıtlı ve Hareketli: Mobil Telsiz Duyarga Ağlarında Güvenlik

Restricted and Mobile: Security in Mobile Wireless Sensor Networks Kısıtlı ve Hareketli: Mobil Telsiz Duyarga Ağlarında Güvenlik Restricted and Mobile: Security in Mobile Wireless Sensor Networks Kısıtlı ve Hareketli: Mobil Telsiz Duyarga Ağlarında Güvenlik Albert Levi levi@sabanciuniv..edu Sabancı University Computer Science and

More information

Keywords Wireless Sensor Networks, energy efficient, security, security mechanisms. Figure 1. WSN Architecture

Keywords Wireless Sensor Networks, energy efficient, security, security mechanisms. Figure 1. WSN Architecture Volume 4, Issue 5, May 2014 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Secure Energy Efficient

More information

Security Solutions for Wireless Sensor Networks

Security Solutions for Wireless Sensor Networks Dirk WESTHOFF, Joao GIRAO, Amardeo SARMA Abstract This paper describes security solutions for collecting and processing data in Wireless Sensor Networks (WSNs). Adequate security capabilities for medium

More information

15 th TF-Mobility Meeting Sensor Networks. Torsten Braun Universität Bern braun@iam.unibe.ch www.iam.unibe.ch/~rvs

15 th TF-Mobility Meeting Sensor Networks. Torsten Braun Universität Bern braun@iam.unibe.ch www.iam.unibe.ch/~rvs 15 th TF-Mobility Meeting Sensor Networks Torsten Braun Universität Bern braun@iam.unibe.ch www.iam.unibe.ch/~rvs Overview 2 Ubiquitous Computing > Vision defined by Mark Weiser in 1991 Seamless integration

More information

Event Processing Middleware for Wireless Sensor Networks

Event Processing Middleware for Wireless Sensor Networks Event Processing Middleware for Wireless Sensor Networks Selvakennedy Selvadurai University of Sydney Outline Introduction System Assumptions EPM Architecture Group Management and Centre Localisation Components

More information

Gossiping using the Energy Map in Wireless Sensor Networks

Gossiping using the Energy Map in Wireless Sensor Networks Gossiping using the Energy Map in Wireless Sensor Networks Max do Val Machado 1, Raquel A.F. Mini 2, Antonio A.F. Loureiro 1, Daniel L. Guidoni 1 and Pedro O.S.V. de Melo 1 1 Federal University of Minas

More information

Sensor network infrastructure for intelligent building monitoring and management system

Sensor network infrastructure for intelligent building monitoring and management system Sensor network infrastructure for intelligent building monitoring and management system 1 R.VENKATESH, 2 K.RADHA, 3 M.GANTHIMATHI 1.B.E-CSE, Muthayammal Engineering College, Rasipuram. 2. Assistant Professor

More information

Customer Specific Wireless Network Solutions Based on Standard IEEE 802.15.4

Customer Specific Wireless Network Solutions Based on Standard IEEE 802.15.4 Customer Specific Wireless Network Solutions Based on Standard IEEE 802.15.4 Michael Binhack, sentec Elektronik GmbH, Werner-von-Siemens-Str. 6, 98693 Ilmenau, Germany Gerald Kupris, Freescale Semiconductor

More information

Secure Data Transmission in Wireless Sensor Network Using Randomized Dispersive Routing Algorithm

Secure Data Transmission in Wireless Sensor Network Using Randomized Dispersive Routing Algorithm Secure Data Transmission in Wireless Sensor Network Using Randomized Dispersive Routing Algorithm Pallavi Motharkar 1, Dr.P.R.Deshmukh 2 and Prof.G.S.Thakare 3 1 M.E. (Computer Engineering), 2,3 Department

More information

Sensor Devices and Sensor Network Applications for the Smart Grid/Smart Cities. Dr. William Kao

Sensor Devices and Sensor Network Applications for the Smart Grid/Smart Cities. Dr. William Kao Sensor Devices and Sensor Network Applications for the Smart Grid/Smart Cities Dr. William Kao Agenda Introduction - Sensors, Actuators, Transducers Sensor Types, Classification Wireless Sensor Networks

More information

Power Efficiency Metrics for Geographical Routing In Multihop Wireless Networks

Power Efficiency Metrics for Geographical Routing In Multihop Wireless Networks Power Efficiency Metrics for Geographical Routing In Multihop Wireless Networks Gowthami.A, Lavanya.R Abstract - A number of energy-aware routing protocols are proposed to provide the energy efficiency

More information

Load-Balancing Enhancement by a Mobile Data Collector in Wireless Sensor Networks

Load-Balancing Enhancement by a Mobile Data Collector in Wireless Sensor Networks Load-Balancing Enhancement by a Mobile Data Collector in Wireless Sensor Networks Ahmad Patooghy Department of Computer Engineering Iran University of Science & Technology Tehran, Iran patooghy@iust.ac.ir

More information

Providing End-to-end Secure Communications in Wireless Sensor Networks

Providing End-to-end Secure Communications in Wireless Sensor Networks 1 Providing End-to-end Secure Communications in Wireless Sensor Networks Wenjun Gu, Neelanjana Dutta, Sriram Chellappan and Xiaole Bai Abstract In many Wireless Sensor Networks (WSNs), providing end to

More information

Load Balancing Geo-routing and routing around Holes in Wireless Sensor Networks Ashwini S R 1, Dr.Nataraj K R 2 1 PG Student, DCN, SJBIT, Bangalore

Load Balancing Geo-routing and routing around Holes in Wireless Sensor Networks Ashwini S R 1, Dr.Nataraj K R 2 1 PG Student, DCN, SJBIT, Bangalore Load Balancing Geo-routing and routing around Holes in Wireless Sensor Networks Ashwini S R 1, Dr.Nataraj K R 2 1 PG Student, DCN, SJBIT, Bangalore 2 Professor and HOD, SJBIT, Bangalore Email: ashwinigowda@gmail.com,

More information

RT-QoS for Wireless ad-hoc Networks of Embedded Systems

RT-QoS for Wireless ad-hoc Networks of Embedded Systems RT-QoS for Wireless ad-hoc Networks of Embedded Systems Marco accamo University of Illinois Urbana-hampaign 1 Outline Wireless RT-QoS: important MA attributes and faced challenges Some new ideas and results

More information

Routing Protocols for Wireless Sensor Networks

Routing Protocols for Wireless Sensor Networks Routing Protocols for Wireless Sensor Networks Chaitanya Mankar 1, Vidhya Dhamdhere 2 1 MECN, G. H. Raisoni College of Engineering and Management (GHRCEM), India 2 Faculty, Computer Department, G.H.Raisoni

More information

MAXIMIZING THE LIFETIME OF NETWORK SECURITY BY DSDV PROTOCOL USING GAME THEORY TECHNIQUES IN WIRELESS SENSOR NETWORK

MAXIMIZING THE LIFETIME OF NETWORK SECURITY BY DSDV PROTOCOL USING GAME THEORY TECHNIQUES IN WIRELESS SENSOR NETWORK MAXIMIZING THE LIFETIME OF NETWORK SECURITY BY DSDV PROTOCOL USING GAME THEORY TECHNIQUES IN WIRELESS SENSOR NETWORK 1 V. Vinoba, 2 P.Hema 1 Department of Mathematics, K.N. Government Arts college, (India)

More information

Security for Ad Hoc Networks. Hang Zhao

Security for Ad Hoc Networks. Hang Zhao Security for Ad Hoc Networks Hang Zhao 1 Ad Hoc Networks Ad hoc -- a Latin phrase which means "for this [purpose]". An autonomous system of mobile hosts connected by wireless links, often called Mobile

More information

Design of Remote data acquisition system based on Internet of Things

Design of Remote data acquisition system based on Internet of Things , pp.32-36 http://dx.doi.org/10.14257/astl.214.79.07 Design of Remote data acquisition system based on Internet of Things NIU Ling Zhou Kou Normal University, Zhoukou 466001,China; Niuling@zknu.edu.cn

More information

Evolution of OpenCache: an OpenSource Virtual Content Distribution Network (vcdn) Platform

Evolution of OpenCache: an OpenSource Virtual Content Distribution Network (vcdn) Platform Evolution of OpenCache: an OpenSource Virtual Content Distribution Network (vcdn) Platform Daniel King d.king@lancaster.ac.uk Matthew Broadbent m.broadbent@lancaster.ac.uk David Hutchison d.hutchison@lancaster.ac.uk

More information

IEQGOR to Increase the Quality of Service in Wireless Sensor Network

IEQGOR to Increase the Quality of Service in Wireless Sensor Network IEQGOR to Increase the Quality of Service in Wireless Sensor Network K.Mythilipriya 1, B.Arunkumar 2 III M.E., Dept of CSE, Karpagam University, Coimbatore, India 1 Assistant Professor, Dept of CSE, Karpagam

More information

Self-Organization in Autonomous Sensor/Actuator Networks [SelfOrg]

Self-Organization in Autonomous Sensor/Actuator Networks [SelfOrg] Self-Organization in Autonomous Sensor/Actuator Networks [SelfOrg] Dr.-Ing. Falko Dressler Computer Networks and Communication Systems Department of Computer Sciences University of Erlangen-Nürnberg http://www7.informatik.uni-erlangen.de/~dressler/

More information

Metrics for Detection of DDoS Attacks

Metrics for Detection of DDoS Attacks Chapter 3 Metrics for Detection of DDoS Attacks The DDoS attacks are trying to interfere with the physical transmission and reception of wireless communications. Attacks are caused by jamming, exhaustion,

More information

A Transport Protocol for Multimedia Wireless Sensor Networks

A Transport Protocol for Multimedia Wireless Sensor Networks A Transport Protocol for Multimedia Wireless Sensor Networks Duarte Meneses, António Grilo, Paulo Rogério Pereira 1 NGI'2011: A Transport Protocol for Multimedia Wireless Sensor Networks Introduction Wireless

More information

A Brief Analysis on Architecture and Reliability of Cloud Based Data Storage

A Brief Analysis on Architecture and Reliability of Cloud Based Data Storage Volume 2, No.4, July August 2013 International Journal of Information Systems and Computer Sciences ISSN 2319 7595 Tejaswini S L Jayanthy et al., Available International Online Journal at http://warse.org/pdfs/ijiscs03242013.pdf

More information

Hybrid Energy Efficient Distributed Protocol for Heterogeneous Wireless Sensor Network

Hybrid Energy Efficient Distributed Protocol for Heterogeneous Wireless Sensor Network International Journal of Computer Applications (975 8887) Volume 4 No.6, July 21 Hybrid Energy Efficient Distributed Protocol for Heterogeneous Wireless Sensor Network Harneet Kour Department of Computer

More information

From reconfigurable transceivers to reconfigurable networks, part II: Cognitive radio networks. Loreto Pescosolido

From reconfigurable transceivers to reconfigurable networks, part II: Cognitive radio networks. Loreto Pescosolido From reconfigurable transceivers to reconfigurable networks, part II: Cognitive radio networks Loreto Pescosolido Spectrum occupancy with current technologies Current wireless networks, operating in either

More information

Efficient Data Retrival - A Case Study on Network Coding and Recovery

Efficient Data Retrival - A Case Study on Network Coding and Recovery Sensors 2012, 12, 17128-17154; doi:10.3390/s121217128 Article OPEN ACCESS sensors ISSN 1424-8220 www.mdpi.com/journal/sensors Prioritized Degree Distribution in Wireless Sensor Networks with a Network

More information

LIST OF FIGURES. Figure No. Caption Page No.

LIST OF FIGURES. Figure No. Caption Page No. LIST OF FIGURES Figure No. Caption Page No. Figure 1.1 A Cellular Network.. 2 Figure 1.2 A Mobile Ad hoc Network... 2 Figure 1.3 Classifications of Threats. 10 Figure 1.4 Classification of Different QoS

More information

Improvisation of The Quality Of Service In ZigBee Cluster Tree Network

Improvisation of The Quality Of Service In ZigBee Cluster Tree Network Improvisation of The Quality Of Service In ZigBee Cluster Tree Network Trupti Satavse, Vijyalaxmi Kadrolli Information Technology Terna College of Engineering Nerul, Navi-Mumbai, India Trupti1814@gmail.com

More information

ISSN: 2319-5967 ISO 9001:2008 Certified International Journal of Engineering Science and Innovative Technology (IJESIT) Volume 2, Issue 5, September

ISSN: 2319-5967 ISO 9001:2008 Certified International Journal of Engineering Science and Innovative Technology (IJESIT) Volume 2, Issue 5, September Analysis and Implementation of IEEE 802.11 MAC Protocol for Wireless Sensor Networks Urmila A. Patil, Smita V. Modi, Suma B.J. Associate Professor, Student, Student Abstract: Energy Consumption in Wireless

More information

Topology Control and Mobility Strategy for UAV Ad-hoc Networks: A Survey

Topology Control and Mobility Strategy for UAV Ad-hoc Networks: A Survey Topology Control and Mobility Strategy for UAV Ad-hoc Networks: A Survey Zhongliang Zhao, Torsten Braun Institute of Computer Science and Applied Mathematics, University of Bern Neubrückstrasse 10, 3012

More information

Fair Scheduling Algorithm with Dynamic Load Balancing Using In Grid Computing

Fair Scheduling Algorithm with Dynamic Load Balancing Using In Grid Computing Research Inventy: International Journal Of Engineering And Science Vol.2, Issue 10 (April 2013), Pp 53-57 Issn(e): 2278-4721, Issn(p):2319-6483, Www.Researchinventy.Com Fair Scheduling Algorithm with Dynamic

More information

Cisco Application Networking for Citrix Presentation Server

Cisco Application Networking for Citrix Presentation Server Cisco Application Networking for Citrix Presentation Server Faster Site Navigation, Less Bandwidth and Server Processing, and Greater Availability for Global Deployments What You Will Learn To address

More information

ISSN: 2321-7782 (Online) Volume 2, Issue 2, February 2014 International Journal of Advance Research in Computer Science and Management Studies

ISSN: 2321-7782 (Online) Volume 2, Issue 2, February 2014 International Journal of Advance Research in Computer Science and Management Studies ISSN: 2321-7782 (Online) Volume 2, Issue 2, February 2014 International Journal of Advance Research in Computer Science and Management Studies Research Article / Paper / Case Study Available online at:

More information

International Journal of Advanced Research in Computer Science and Software Engineering

International Journal of Advanced Research in Computer Science and Software Engineering Volume 2, Issue 9, September 2012 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com An Experimental

More information

Using Received Signal Strength Indicator to Detect Node Replacement and Replication Attacks in Wireless Sensor Networks

Using Received Signal Strength Indicator to Detect Node Replacement and Replication Attacks in Wireless Sensor Networks Using Received Signal Strength Indicator to Detect Node Replacement and Replication Attacks in Wireless Sensor Networks Sajid Hussain* and Md Shafayat Rahman Jodrey School of Computer Science, Acadia University

More information