Collaborative Wireless Sensor Network Simulation

Size: px
Start display at page:

Download "Collaborative Wireless Sensor Network Simulation"

Transcription

1 Collaborative Wireless Sensor Network Simulation KHEMAKHEM Ramzy BODENAN Julien SALIM Eliass ENSEIRB, T3, January {khemakhe, bodenan, Abstract. Wireless sensor networks (WSNs) are attracting increased interest for a wide range of applications such as environmental monitoring and vehicle tracking. Resource constraints on nodes in the network and unreliability of radio communication mean that applications have to be developed with an eye on maximizing energy efficiency in order to extend network life [1]. Our goal is to work on an autonomic architecture in order to minimize the energy consumption of the nodes within the network with an adapted distributed algorithm [2] for a WSN environment that enables nodes to stop useless communications between each other. Indeed, sensing and communications consume energy, therefore judicious power management and sensor scheduling can effectively extend network lifetime. This report presents our approach towards this particular problem, the algorithm we worked on and finally its implementation with a simplified distributed knowledge sharing model within a Visidia environment [3]. 1 Introduction Recent advances in digital electronics, embedded systems, and wireless communications have motivated a lot of research in the direction of distributed wireless sensor networks. A wireless sensor network is a wireless network consisting of spatially distributed autonomous devices using sensors to cooperatively monitor physical or environmental conditions, such as temperature, sound, vibration, pressure, motion or pollutants, at different locations [1]. Originally, wireless sensor network was designed for military applications such as battlefield surveillance. Though, wireless sensor networks are now used in many civilian applications areas, including environment, traffic control, and even in health. Wireless sensor networks differ from conventional network systems in many aspects. They usually involve a large number of spatially distributed, energy-constrained, and self-configuring nodes. The wireless sensor networks are bringing a lot of new challenges and design considerations. One of these challenges is the energy consumption. Indeed, as we have said before, due to limited energy resources, it is vital to maximize the lifetime of sensors in order to operate over a long period of time (from 6 months to 1 year) within a difficult environment such as military zones. Because without energy the network cannot do anything, the problem of energy consumption is the most significant one. That s why WSNs require careful management of energy resources. Thus, we tried in this project to find a way that enables to limit the energy consumption in WSNs. Thus, an autonomic management solution based on distributed algorithms for knowledge sharing was provided within the LABRI laboratory, so the solution outcome seems interesting to be studied and applied to the problematic we have chosen that is to say the energy consumption on WSNs. For this purpose, the simulation tool VISIDIA (Visualization and Simulation of Distributed Algorithms) was used to test the algorithm. 2 State of the art 2.1 Architecture There are two sorts of sensor network architectures, layered architecture and clustered architecture that are shown in Figure 1. The first one has a single powerful base station (BS), and the layers of sensor nodes around it correspond to the nodes that have the same hop-count to the BS. About the clustered architecture, the sensor network is divided into small areas called clusters.

2 Each cluster has a cluster-head (which functions like a base station) which is elected to manage these resources like the communication between sensors. Within each cluster, ordinary node communicates with the cluster head and the cluster head form a backbone network to forward the data to the remote BS. Furthermore, with this architecture, aggregation of data is easier, the management of the network is simplified and it permits to reduce the energy consummation. (a) (b) Figure 1. Layered (a) and clustered (b) architecture Because it s the most used architecture, we have considered in this work a WSN with a clustered architecture. 2.2 Research Challenges in WSN As we have seen before, wireless sensor network problems are not the same as those we can encounter in classical networks. Because the nodes that constituted this kind of network have small size, low battery capacity nonrenewable power supply, small processing power, limited buffer capacity, a low-power radio and lack unique identifiers, WSNs provide new communication and networking paradigms. In order to realize system that can support extreme situations, several obstacles need to be overcome. - Coverage problem: ensure that sensors provide sufficient coverage of the sensing field - Limited source energy and therefore limited communications: Because it is impractical to recharge a depleted battery we need for example to use specific protocols (energy-aware protocols) in order to prolong the network lifetime. Energy is not only spent for communication, but also when sensors are moving around the network - How to decide which sensors need to remain active so that the area is covered as possible and we can save energy - Hot spot problem: It is the long-term connectivity maintenance of networks. Some nodes work more than others and so they deplete their energy faster. It s because nodes that are closer to the sink also transmit others data and not only theirs - Ad hoc deployment, for example when sensors are dropped by a plane above a forest that needs to be staked out - Free maintenance operation, which requires an automatic configuration (for example when the topology of the network changes) - Node identification: Because of the high density of nodes, we need a long ID to avoid the ID conflict. But most WSNs can t afford the large overhead introduced by a long ID - The security in sensor networks: It s the same problems as those we can encounter with wireless ad hoc networks, like availability, confidentiality, integrity, and authentication - Dynamic adaptation, especially for the arrival or fall of sensors, or the case where there is a stimuli modification - Location in a repository in relation to other nodes or absolutely: How to efficiently deliver the message without or with less location information

3 - Quality of service: the aim is to provide better services than just best effort services Most of these problems enounced above have not been entirely resolved and it represents a real challenge for researchers. The bibliographical analysis on the wireless sensor networks we have done in the first phase of this project has enabled us to become aware of the energetic problem. Thus, because it is impractical to recharge a depleted battery we need for example to use specific protocols (energy-aware protocols) or specific algorithm in order to prolong the network lifetime. We also noticed that other problematic of this field are more or less linked with the energy one. So, if we success to minimize the energy consumption of sensors it would open many barriers. 2.3 Energy consumption problem The energy consumption problem in wireless sensor networks is investigated. Because of constrained battery, the problem is to expend as little energy as possible receiving and transmitting data. Several works have been done in the last few years in order to find a way to improve the routing performance, especially the lifetime for WSNs. The authors in [4] present a taxonomy about most of the routing protocols for WSNs and categorize them into three classes which are data-centric [5, 6], hierarchical [7-9], and location based [10, 11] protocols. To reduce the energy consumption, an important technique is the data aggregation which is a technique adopted by the data-centric routing protocols [5, 6]. It uses the fact that that many nearby sensor nodes might sense and collect similar information. This method enables to reduce both the size and the number of transmissions. SPIN (Sensor Protocols for Information via Negotiation [6]) can be viewed as the first data-centric routing protocol which uses data negotiation method among sensor nodes to reduce data redundancy and save energy. Direct Diffusion [6] is a famous and representative data-centric routing protocol for WSNs. In WSNs with hierarchical structure [7-9], the whole network is further divided into smaller areas called clusters. In this way, the energy consumption can be greatly reduced since the communication range is largely reduced within one cluster and the ordinary sensor nodes can be set to sleeping mode according to certain Time Division Multiple Access (TDMA) schedule, which is sent by cluster head. Location-based routing protocols [10, 11] require sensor location information which can be gained either through global positioning system (GPS) devices or through certain estimation algorithms based on received signal strength. The advantage of this type of routing protocols is that there is no need to make blind broadcasting, so the routing overhead can be largely reduced, and so it reduces the energy consumption. 3 Our Approach The major stake of WSN technology is to deploy this kind of network on a large scale environment, and to make sensors cooperating while taking into account problematic we can encounter in this environment, but to do so we need to introduce an autonomic notion. IBM was the first to develop an autonomic architecture [13]. However, in all autonomic architectures which have been developed there was no cognitive infrastructure for knowledge management, a knowledge plane. This knowledge plan would provide the ability to the networks elements to be self-organizing and to follow the global objectives provided by administrators while optimizing network resources like energy. As we said before, communication between nodes is the main energy consumer, that s why we tried in a clustered architecture to limit useless communications between nodes. To do so, we have adapted a distributed algorithm for knowledge sharing in the context of wireless sensor network.

4 3.1 Initial Algorithm Having a self-organized sensor network implies designing a distributed collaborative environment in which all the component should be able to share their knowledge and to take decisions according to the information they received from other components. Those components should also be able to analyze shared knowledge and eventually reject it if it is necessary. To realize the knowledge sharing, a distributed algorithm that is shown Figure 2 is proposed. The main objective of this algorithm is to define the situated view of the knowledge that a component wants to share with the others. The situated view means the domain limits where a piece of knowledge is useful and then should be propagated. The notion of situated view is similar to the notion of neighborhood. Figure 2: Knowledge sharing algorithm with situated view In fact, when receiving knowledge, a component decides either to be the neighbor of the root component by accepting the knowledge and by propagating it, or not by stopping it propagation. This is the notion of acceptance. This notion is necessary to avoid useless information exchanges between nodes, and by this way the knowledge plan is constructed progressively. Then, there is the notion of neighborhood. It is necessary that elements have the ability to identify their direct neighbors. Several criteria can be used to define the neighborhood. Without going into details there is the physical neighborhood and the logical one (based on similarities between nodes, e.g. the type of equipment, the role of the equipment). 3.2 Adapted algorithm In our work, we have considered that this notion of neighborhood corresponds to the physical neighbor that is somewhat reducing but sufficient for our simulation. So, when a sensor gets an information that it picks up from its area coverage or from another node, it decides or not to spread it to its neighborhood. Thus, before the node retransmits the knowledge (or the information) to all its neighbors, it first has to determine if the knowledge is coherent with its state and if the knowledge is pertinent or not. The criterion we used to check if the knowledge is pertinent or not will be seen in the next part. So, the procedure defined in Figure 2 is executed by all nodes when receiving the knowledge and it is according to this procedure that the knowledge is propagated in the network.

5 4 Implementation 4.1 The chosen scenario The performance of the algorithm is not yet approved. Thus, to come over this, a concrete scenario of a sensor network use should be fixed in order to measure its auto-organization performance. The chosen scenario deals with a fire scenario in forest. The architecture envisaged for this scenario consists of a network composed by several temperatures sensors and one based station. In our simulation, at a given instant one temperature sensor detects an abnormal high temperature and decides to transmit this information. As we have said before, we want here to reduce the energy consumption by limiting communications. Thus, we have to compare the propagation of the information in the wireless sensor network with and without the algorithm. To do so we have used a model of fire propagation. That is to say, that according to this model we assigned a given temperature to each node in the network as a function of its position from the node where the fire has been detected. So, we know how far the information needs to be spread from the fire source, and we know which nodes are not concerned by this event. The model of fire propagation we used is shown in Figure 3. Figure 3: Model of fire propagation In our simulation, we have considered that the knowledge was the information of a detected fire by a given sensor (or node). So what we propagate in the network is that the sensor number X (each sensor is defined by an Id number) has detected an abnormal temperature. Then, each node that receives this information checks if this information is pertinent, and if it needs to be propagated, the criterion we have chosen is to compare the temperature that the node receives with the temperature it gets from its area coverage. Thus, if the difference between temperatures is to important, the information is considered as not pertinent, and so it is not spread to the neighborhood. To test the algorithm and to set up our scenario, we had to use a network simulator that has specific criteria. 4.2 The chosen simulator We needed a tool that can visualize distributed algorithms not necessarily a Network Simulator like NS-2. Thus, we just need a middleware vision which means that we need to simulate the logical network. To do so, there are lots of tools that can fit, but we chose Visidia mostly because it has many properties that aren t found in other applications, and for its good performance with distributed algorithmic. VISIDIA is a software tool for the visualization and the simulation of distributed algorithms based on a solid theoretical base. It is kitted up by a graphical user interface which will be used to draw the sensor network architecture of our scenario.

6 After we had learnt how the VISIDIA graphical interface works and how we can create a graph, we had to learn how we can execute the algorithm on it. To do so, we needed first to implement in java the algorithm on our favorite editor (we used eclipse), and then we needed to generate the.class file. And this is that.class file that is used on VISIDIA to launch the algorithm on each node. But as we have said before, we first have had to adapt and implement the algorithm to our scenario. This part of our work is explained in the next section. 4.3 The implementation of the algorithm VISIDIA is implemented in Java, so we worked on the VISIDIA package, and we used the VISIDIA API. We encountered some difficulties to establish relationships between classes, in order to use the methods that we needed to implement the algorithm. We defined a class EnergyAlgo that inherit from the class Algorithm, the main function of our class is the method init()that is executed by a thread launched by the class simulator which takes the algorithm as a parameter. As we have said before, we used the model of fire propagation. To do so, we defined four ellipses in order to get the level lines we needed for the model. These ellipses are defined according to the hearth, that is to say the first sensor that detects the fire. When the sensor detects the fire it sends a message to its neighborhood. Then, its neighbors decide if the information is pertinent or not, and if so they send it to their neighbors (except the node they received the information from). To check if the information is pertinent or note we compare the temperature that the local node detects to the temperature of the sensor that detects the fire. If the difference between the two temperatures is inferior to 20 degrees, the information is considered as pertinent and is transmitted. Each ellipsis defines a space that has a specific temperature, in other word, to attribute a temperature to a node, we have to check if it is inside an ellipsis, and if so we need to find to which one it belongs. //check if the point is inside an ellipse public boolean isinellipse(int x,int y,int a, int b){ System.out.println((Math.pow((float)((float)(Math.PI/4)*(x-y))/a,2)+ Math.pow((float)(float)(Math.PI/4)*(x+y)/b, 2))); return ((Math.pow((float)((float)(Math.PI/4)*(x-y))/a, 2)+ Math.pow((float)(float)(Math.PI/4)*(x+y)/b, 2)) < 1); } Thus, the four ellipses define 5 temperatures areas, four are inside an ellipsis and a last one is outside and represents the rest of the network that is not concerned by the fire. With the method isinellipse()defined below, it is easy to check if the node is inside an ellipsis or not. But some nodes can be inside two or more ellipses, that is why we defined for each ellipsis a specific table that contains the IDs of the nodes that are inside of it. Hashtable<Integer, Integer> zone3 = new Hashtable<Integer, Integer>(); for(int i = 0;i < netsize; i++){ if( i!= this.getid() && isinellipse(vuegraphe.recherchersommet(integer.tostring(i)).centrex(), vuegraphe.recherchersommet(integer.tostring(i)).centrey(), 600, 600)){ if(!zone1.containskey(i) &&!zone2.containskey(i)) zone3.put(i, i); } } By this way we can attributes a temperature for all the nodes according to its position in the network and according to the model fire propagation.

7 5 Experimentations and Results (a) (b) Figure 4. Knowledge Sharing Algorithm (a) and Spread all knowledge Algorithm (b) simulation The figures above show the simulation of the knowledge sharing and the spread all algorithms. The second algorithm does not attribute spread rule to nodes. Thus, the knowledge shared by the starter node has been transmitted to all nodes on the graph. The main difference between those two algorithms is that in the first one, 117 messages have been exchanged whereas in the second one, we count 184 messages. Therefore, as the energy consumption is proportionate to the number of message send, we can conclude that the knowledge Sharing Algorithm is more efficient toward the problem energy dissipation. In fact, especially in large sensor networks, this algorithm limits the area in which a specific knowledge should be shared by establishing criteria of neighborhood. Those neighbors are the only node that can take profits from the content of the knowledge. If we refer to figure4, the neighbors of the starter node are distributed in for zone having respectively red, yellow, orange and black node s color. The blue nodes represent the neighborhood area bounds. However, in the figure5, the neighborhood area of the starter node is not bounded due to the fact that all nodes are neighbors.

8 6 Conclusion The implementation of a simple adaptation of the knowledge share algorithm was sufficient to show the efficacy of this algorithm toward the problem of energy consumption in a WSN. In fact, by introducing the neighborhood concept, this algorithm decrease the number of message exchanged to spread a knowledge and preserve, as a result, the node s energy in an auto-management process. The implementation of such algorithm was not much easy. Indeed, we have faced some difficulties to take profits from the code of VISIDIA in order to implement our algorithm notably, to establish the relationship between the simulation software classes and the algorithm class. Although, it was a very interesting project that necessitated an important personal devotion to come over all the new notions and specificity of WSN and it constitutes a real value-added. References [1] Mbaye Maissa, Krief Francine : Distributed Knowledge Sharing Algorithm for Autonomic Networking. [2] The ViSiDiA Project: Visualization and Simulation of Distributed Algorithms. Please see [3] K. Akkaya and M. Younis, "A Survey of Routing Protocols in Wireless Sensor Networks, in the Elsevier Ad Hoc Network, Vol. 3(3), 2005, pp [4] J. Kulik, W. R. Heinzelman, H. Balakrishnan, "Negotiation-based protocols for disseminat-ing information in wireless sensor networks", ACM/IEEE Int. Conf. on Mobile Computing and Networking, Aug [5] C. Intanagonwiwat, R. Govindan and D. Estrin, "Directed diffusion: A scalable and robust communication paradigm for sensor networks", in the Proceedings of the 6th Annual ACM/IEEE International Conference on Mobile Computing and Networking (MobiCom'00), Boston, MA, August [6] W. Heinzelman, A. Chandrakasan, and H. Balakrishnan, "Energy-efficient communication protocol for wireless sensor networks," in the Proceeding of the Hawaii International Con-ference System Sciences, Hawaii, January [7] S. Lindsey and C. S. Raghavendra, "PEGASIS: Power Efficient GAthering in Sensor Infor-mation Systems," in the Proceedings of the IEEE Aerospace Conference, Big Sky, Montana, March [8] Wang Jin, Shu Lei, Jinsung Cho, Young-Koo Lee, Sungyoung Lee, Yonil Zhong. "A Load-balancing and Energyaware Clustering Algorithm in Wireless Ad-hoc Networks". The 1st International Workshop on RFID and Ubiquitous Sensor Networks (USN'2005), 2005, pp [9] V. Rodoplu and T.H. Ming, "Minimum energy mobile wireless networks," IEEE Journal of Selected Areas in Communications, Vol. 17, No. 8, 1999, pp [10] IBM Corporation, An architectural blueprint for autonomic computing, White Paper [11] Clark, D. D., Partridge, C., Ramming, J. C., and Wroclawski, J. T A knowledge plane for the internet. In Proceedings of the 2003 Conference on Applications, Technologies, Architectures, and Protocols For Computer Communications (Karlsruhe, Germany, August 25-29, 2003). SIGCOMM '03. ACM, New York, NY, 3-10.

QUALITY OF SERVICE METRICS FOR DATA TRANSMISSION IN MESH TOPOLOGIES

QUALITY OF SERVICE METRICS FOR DATA TRANSMISSION IN MESH TOPOLOGIES QUALITY OF SERVICE METRICS FOR DATA TRANSMISSION IN MESH TOPOLOGIES SWATHI NANDURI * ZAHOOR-UL-HUQ * Master of Technology, Associate Professor, G. Pulla Reddy Engineering College, G. Pulla Reddy Engineering

More information

Hybrid Energy Efficient Distributed Protocol for Heterogeneous Wireless Sensor Network

Hybrid Energy Efficient Distributed Protocol for Heterogeneous Wireless Sensor Network International Journal of Computer Applications (975 8887) Volume 4 No.6, July 21 Hybrid Energy Efficient Distributed Protocol for Heterogeneous Wireless Sensor Network Harneet Kour Department of Computer

More information

Dynamic and Adaptive Organization of Data-Collection Infrastructures in Sustainable Wireless Sensor Networks

Dynamic and Adaptive Organization of Data-Collection Infrastructures in Sustainable Wireless Sensor Networks 928 Dynamic and Adaptive Organization of Data-Collection Infrastructures in Sustainable Wireless Sensor Networks Rui Teng, Shirazi N. Mehdad and Bing Zhang National institute of information and communications

More information

Evaluation of Unlimited Storage: Towards Better Data Access Model for Sensor Network

Evaluation of Unlimited Storage: Towards Better Data Access Model for Sensor Network Evaluation of Unlimited Storage: Towards Better Data Access Model for Sensor Network Sagar M Mane Walchand Institute of Technology Solapur. India. Solapur University, Solapur. S.S.Apte Walchand Institute

More information

LOAD BALANCING AND EFFICIENT CLUSTERING FOR IMPROVING NETWORK PERFORMANCE IN AD-HOC NETWORKS

LOAD BALANCING AND EFFICIENT CLUSTERING FOR IMPROVING NETWORK PERFORMANCE IN AD-HOC NETWORKS LOAD BALANCING AND EFFICIENT CLUSTERING FOR IMPROVING NETWORK PERFORMANCE IN AD-HOC NETWORKS Saranya.S 1, Menakambal.S 2 1 M.E., Embedded System Technologies, Nandha Engineering College (Autonomous), (India)

More information

DAG based In-Network Aggregation for Sensor Network Monitoring

DAG based In-Network Aggregation for Sensor Network Monitoring DAG based In-Network Aggregation for Sensor Network Monitoring Shinji Motegi, Kiyohito Yoshihara and Hiroki Horiuchi KDDI R&D Laboratories Inc. {motegi, yosshy, hr-horiuchi}@kddilabs.jp Abstract Wireless

More information

Routing and Transport in Wireless Sensor Networks

Routing and Transport in Wireless Sensor Networks Routing and Transport in Wireless Sensor Networks Ibrahim Matta (matta@bu.edu) Niky Riga (inki@bu.edu) Georgios Smaragdakis (gsmaragd@bu.edu) Wei Li (wli@bu.edu) Vijay Erramilli (evijay@bu.edu) References

More information

Wireless Sensor Network: Improving the Network Energy Consumption

Wireless Sensor Network: Improving the Network Energy Consumption Wireless Sensor Network: Improving the Network Energy Consumption Ingrid Teixeira, José Ferreira de Rezende and Aloysio de Castro P. Pedroza Abstract-- In a remote sensor application it is desirable that

More information

Maximum Lifetime Data Gathering and Aggregation in Wireless Sensor Networks

Maximum Lifetime Data Gathering and Aggregation in Wireless Sensor Networks August 26, 2002 TR CS-02-12 Maximum Lifetime Data Gathering and Aggregation in Wireless Sensor Networks Konstantinos Kalpakis 1,2, Koustuv Dasgupta 1, and Parag Namjoshi 1 Computer Science and Electrical

More information

Enhanced Dual Level Fuzzy based Cluster Head Selection for Energy Efficient Wireless Sensor Networks

Enhanced Dual Level Fuzzy based Cluster Head Selection for Energy Efficient Wireless Sensor Networks Enhanced Dual Level Fuzzy based Cluster Head Selection for Energy Efficient Wireless Sensor Networks Sangeeta Rao Department of Computer Science Central University of Haryana Mahendergarh, Haryana, India

More information

The Interoperability of Wireless Sensor Networks

The Interoperability of Wireless Sensor Networks The Interoperability of Wireless Sensor Networks Daniela Ballari, Miguel Angel Manso-Callejo, Monica Wachowicz Technical University of Madrid daniela@topografia.upm.es; m.manso@upm.es; m.wachowicz@topografia.upm.es

More information

A NOVEL OVERLAY IDS FOR WIRELESS SENSOR NETWORKS

A NOVEL OVERLAY IDS FOR WIRELESS SENSOR NETWORKS A NOVEL OVERLAY IDS FOR WIRELESS SENSOR NETWORKS Sumanta Saha, Md. Safiqul Islam, Md. Sakhawat Hossen School of Information and Communication Technology The Royal Institute of Technology (KTH) Stockholm,

More information

Routing Protocols for Wireless Sensor Networks

Routing Protocols for Wireless Sensor Networks Routing Protocols for Wireless Sensor Networks Chaitanya Mankar 1, Vidhya Dhamdhere 2 1 MECN, G. H. Raisoni College of Engineering and Management (GHRCEM), India 2 Faculty, Computer Department, G.H.Raisoni

More information

A Secure Data Transmission for Cluster based Wireless Sensor Network Using LEACH Protocol

A Secure Data Transmission for Cluster based Wireless Sensor Network Using LEACH Protocol A Secure Data Transmission for Cluster based Wireless Sensor Network Using LEACH Protocol Vinoda B Dibbad 1, C M Parameshwarappa 2 1 PG Student, Dept of CS&E, STJIT, Ranebennur, Karnataka, India 2 Professor,

More information

A Graph-Center-Based Scheme for Energy-Efficient Data Collection in Wireless Sensor Networks

A Graph-Center-Based Scheme for Energy-Efficient Data Collection in Wireless Sensor Networks A Graph-Center-Based Scheme for Energy-Efficient Data Collection in Wireless Sensor Networks Dajin Wang Department of Computer Science Montclair State University, Upper Montclair, NJ 07043, USA wang@pegasus.montclair.edu

More information

A Survey on Lifetime Maximization of Wireless Sensor Network using Load Balancing

A Survey on Lifetime Maximization of Wireless Sensor Network using Load Balancing A Survey on Lifetime Maximization of Wireless Sensor Network using Load Balancing Radhika Sarad, Kiran Bhame, Vaibhav Wabale, Amol Katake B.E. Students, Dept. of Computer Engineering, KJCOEMR, Pune, Maharashtra,

More information

Preface. Book Origin and Overview

Preface. Book Origin and Overview Preface The field of wireless sensor networks continues to evolve and grow in both practical and research domains. More and more wireless sensor networks are being used to gather information in real life

More information

Survey on Network Lifetime Enhancement Method

Survey on Network Lifetime Enhancement Method International Journal of Computer Sciences and Engineering Open Access Survey Paper Volume-4, Issue-03 E-ISSN: 2347-2693 Survey on Network Lifetime Enhancement Method Abdul Jawad 1* and P. B. Mali 2 1*,2

More information

A SECURE DATA TRANSMISSION FOR CLUSTER- BASED WIRELESS SENSOR NETWORKS IS INTRODUCED

A SECURE DATA TRANSMISSION FOR CLUSTER- BASED WIRELESS SENSOR NETWORKS IS INTRODUCED A SECURE DATA TRANSMISSION FOR CLUSTER- BASED WIRELESS SENSOR NETWORKS IS INTRODUCED J Karunamayi 1, Annapurna V K 2 1 Student, Computer Network and Engineering,The National Institute of Engineering, Mysuru,

More information

An Efficient Hybrid Data Gathering Scheme in Wireless Sensor Networks

An Efficient Hybrid Data Gathering Scheme in Wireless Sensor Networks An Efficient Hybrid Data Gathering Scheme in Wireless Sensor Networks Ayon Chakraborty 1, Swarup Kumar Mitra 2, and M.K. Naskar 3 1 Department of CSE, Jadavpur University, Kolkata, India 2 Department of

More information

Role of Clusterhead in Load Balancing of Clusters Used in Wireless Adhoc Network

Role of Clusterhead in Load Balancing of Clusters Used in Wireless Adhoc Network International Journal of Electronics Engineering, 3 (2), 2011, pp. 283 286 Serials Publications, ISSN : 0973-7383 Role of Clusterhead in Load Balancing of Clusters Used in Wireless Adhoc Network Gopindra

More information

OPTIMIZED SENSOR NODES BY FAULT NODE RECOVERY ALGORITHM

OPTIMIZED SENSOR NODES BY FAULT NODE RECOVERY ALGORITHM OPTIMIZED SENSOR NODES BY FAULT NODE RECOVERY ALGORITHM S. Sofia 1, M.Varghese 2 1 Student, Department of CSE, IJCET 2 Professor, Department of CSE, IJCET Abstract This paper proposes fault node recovery

More information

A Network Stability Monitoring Mechanism of Cluster-Oriented

A Network Stability Monitoring Mechanism of Cluster-Oriented A Network Stability Monitoring Mechanism of Cluster-Oriented Wireless Sensor Network Kuo-Qin Yan Shu-Ching Wang Yu-Ping Tung Chaoyang University of Technology, Taiwan ABSTRACT In wireless sensor network

More information

Design of a Web-based Application for Wireless Sensor Networks

Design of a Web-based Application for Wireless Sensor Networks Design of a Web-based Application for Wireless Sensor Networks Sajid Hussain, Nick Schofield, and Abdul W. Matin Jodrey School of Computer Science, Acadia University Wolfville, Nova Scotia, Canada {Sajid.Hussain,

More information

Isolines: Energy-efficient Mapping in Sensor Networks

Isolines: Energy-efficient Mapping in Sensor Networks Isolines: Energy-efficient Mapping in Sensor Networks Ignacio Solis and Katia Obraczka {isolis, katia}@cse.ucsc.edu Computer Engineering Department University of California, Santa Cruz April 15, 2005 Abstract

More information

Minimum-Hop Load-Balancing Graph Routing Algorithm for Wireless HART

Minimum-Hop Load-Balancing Graph Routing Algorithm for Wireless HART Minimum-Hop Load-Balancing Graph Routing Algorithm for Wireless HART Abdul Aziz Memon and Seung Ho Hong Abstract In this paper load-balancing routing algorithm for WirelessHART standard is proposed. WirelessHART

More information

International Journal of Emerging Technologies in Computational and Applied Sciences (IJETCAS) www.iasir.net

International Journal of Emerging Technologies in Computational and Applied Sciences (IJETCAS) www.iasir.net International Association of Scientific Innovation and Research (IASIR) (An Association Unifying the Sciences, Engineering, and Applied Research) International Journal of Emerging Technologies in Computational

More information

Protocol Design for Neighbor Discovery in AD-HOC Network

Protocol Design for Neighbor Discovery in AD-HOC Network International Journal of Electronic and Electrical Engineering. ISSN 0974-2174 Volume 7, Number 9 (2014), pp. 915-922 International Research Publication House http://www.irphouse.com Protocol Design for

More information

AN EFFICIENT STRATEGY OF AGGREGATE SECURE DATA TRANSMISSION

AN EFFICIENT STRATEGY OF AGGREGATE SECURE DATA TRANSMISSION INTERNATIONAL JOURNAL OF REVIEWS ON RECENT ELECTRONICS AND COMPUTER SCIENCE AN EFFICIENT STRATEGY OF AGGREGATE SECURE DATA TRANSMISSION K.Anusha 1, K.Sudha 2 1 M.Tech Student, Dept of CSE, Aurora's Technological

More information

An Efficient Energy-Aware Coverage- Preserving Hierarchical Routing Protocol for WSN

An Efficient Energy-Aware Coverage- Preserving Hierarchical Routing Protocol for WSN An Efficient Energy-Aware Coverage- Preserving Hierarchical Routing Protocol for WSN S.Taruna 1, Sakshi Shringi 2 1,2 Banasthali Vidyapith, Jaipur, Rajasthan, India ABSTRACT Wireless sensor networks (WSN)

More information

Some Security Trends over Wireless Sensor Networks

Some Security Trends over Wireless Sensor Networks Some Security Trends over Wireless Sensor Networks ZORAN BOJKOVIC, BOJAN BAKMAZ, MIODRAG BAKMAZ Faculty of Transport and Traffic Engineering University of Belgrade Vojvode Stepe 305 SERBIA Abstract: -

More information

3-12 Autonomous Access Control among Nodes in Sensor Networks with Security Policies

3-12 Autonomous Access Control among Nodes in Sensor Networks with Security Policies 3-12 Autonomous Access Control among Nodes in Sensor Networks with Security Policies This paper describes a new framework of policy control sensor networks. Sensor networks are shared by various applications,

More information

Energy Efficient Load Balancing among Heterogeneous Nodes of Wireless Sensor Network

Energy Efficient Load Balancing among Heterogeneous Nodes of Wireless Sensor Network Energy Efficient Load Balancing among Heterogeneous Nodes of Wireless Sensor Network Chandrakant N Bangalore, India nadhachandra@gmail.com Abstract Energy efficient load balancing in a Wireless Sensor

More information

The Monitoring of Ad Hoc Networks Based on Routing

The Monitoring of Ad Hoc Networks Based on Routing The Monitoring of Ad Hoc Networks Based on Routing Sana Ghannay, Sonia Mettali Gammar, Farouk Kamoun CRISTAL Laboratory ENSI, University of Manouba 21 Manouba - Tunisia {chnnysn,sonia.gammar}@ensi.rnu.tn,

More information

Load Balancing Routing Algorithm for Data Gathering Sensor Network

Load Balancing Routing Algorithm for Data Gathering Sensor Network Load Balancing Routing Algorithm for Data Gathering Sensor Network Evgeny Bakin, Grigory Evseev State University of Aerospace Instrumentation Saint-Petersburg, Russia {jenyb, egs}@vu.spb.ru Denis Dorum

More information

Congestion Control in WSN using Cluster and Adaptive Load Balanced Routing Protocol

Congestion Control in WSN using Cluster and Adaptive Load Balanced Routing Protocol Congestion Control in WSN using Cluster and Adaptive Load Balanced Routing Protocol Monu Rani 1, Kiran Gupta 2, Arvind Sharma 3 1 M.Tech (Student), 2 Assistant Professor, 3 Assistant Professor Department

More information

Gossiping using the Energy Map in Wireless Sensor Networks

Gossiping using the Energy Map in Wireless Sensor Networks Gossiping using the Energy Map in Wireless Sensor Networks Max do Val Machado 1, Raquel A.F. Mini 2, Antonio A.F. Loureiro 1, Daniel L. Guidoni 1 and Pedro O.S.V. de Melo 1 1 Federal University of Minas

More information

A RFID Data-Cleaning Algorithm Based on Communication Information among RFID Readers

A RFID Data-Cleaning Algorithm Based on Communication Information among RFID Readers , pp.155-164 http://dx.doi.org/10.14257/ijunesst.2015.8.1.14 A RFID Data-Cleaning Algorithm Based on Communication Information among RFID Readers Yunhua Gu, Bao Gao, Jin Wang, Mingshu Yin and Junyong Zhang

More information

PEDAMACS: Power efficient and delay aware medium access protocol for sensor networks

PEDAMACS: Power efficient and delay aware medium access protocol for sensor networks PEDAMACS: Power efficient and delay aware medium access protocol for sensor networks Sinem Coleri and Pravin Varaiya Department of Electrical Engineering and Computer Science University of California,

More information

Control overhead reduction: A Hierarchical Routing Protocol In Mobile Ad hoc Networks

Control overhead reduction: A Hierarchical Routing Protocol In Mobile Ad hoc Networks Control overhead reduction: A Hierarchical Routing Protocol In Mobile Ad hoc Networks Dr.G.Mary Jansi Rani Professor / Department of Electronics and Communication Engineering, Sri Ramakrishna Engineering

More information

15 th TF-Mobility Meeting Sensor Networks. Torsten Braun Universität Bern braun@iam.unibe.ch www.iam.unibe.ch/~rvs

15 th TF-Mobility Meeting Sensor Networks. Torsten Braun Universität Bern braun@iam.unibe.ch www.iam.unibe.ch/~rvs 15 th TF-Mobility Meeting Sensor Networks Torsten Braun Universität Bern braun@iam.unibe.ch www.iam.unibe.ch/~rvs Overview 2 Ubiquitous Computing > Vision defined by Mark Weiser in 1991 Seamless integration

More information

Keywords Wireless Sensor Network (WSN), Low Energy adaptive Clustering Hierarchy (LEACH), Cuckoo Search, Cluster Head (CH), Base Station (BS).

Keywords Wireless Sensor Network (WSN), Low Energy adaptive Clustering Hierarchy (LEACH), Cuckoo Search, Cluster Head (CH), Base Station (BS). Volume 4, Issue 11, November 2014 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Relative Analysis

More information

MULTIHOP CLUSTERING ALGORITHM FOR LOAD BALANCING IN WIRELESS SENSOR NETWORKS.

MULTIHOP CLUSTERING ALGORITHM FOR LOAD BALANCING IN WIRELESS SENSOR NETWORKS. MULTIHOP CLUSTERING ALGORITHM FOR LOAD BALANCING IN WIRELESS SENSOR NETWORKS. NAUMAN ISRAR and IRFAN AWAN Mobile Computing Networks and Security Research group School of Informatics University of Bradford,

More information

MAXIMIZING THE LIFETIME OF NETWORK SECURITY BY DSDV PROTOCOL USING GAME THEORY TECHNIQUES IN WIRELESS SENSOR NETWORK

MAXIMIZING THE LIFETIME OF NETWORK SECURITY BY DSDV PROTOCOL USING GAME THEORY TECHNIQUES IN WIRELESS SENSOR NETWORK MAXIMIZING THE LIFETIME OF NETWORK SECURITY BY DSDV PROTOCOL USING GAME THEORY TECHNIQUES IN WIRELESS SENSOR NETWORK 1 V. Vinoba, 2 P.Hema 1 Department of Mathematics, K.N. Government Arts college, (India)

More information

Load-Balancing Enhancement by a Mobile Data Collector in Wireless Sensor Networks

Load-Balancing Enhancement by a Mobile Data Collector in Wireless Sensor Networks Load-Balancing Enhancement by a Mobile Data Collector in Wireless Sensor Networks Ahmad Patooghy Department of Computer Engineering Iran University of Science & Technology Tehran, Iran patooghy@iust.ac.ir

More information

A Slow-sTart Exponential and Linear Algorithm for Energy Saving in Wireless Networks

A Slow-sTart Exponential and Linear Algorithm for Energy Saving in Wireless Networks 1 A Slow-sTart Exponential and Linear Algorithm for Energy Saving in Wireless Networks Yang Song, Bogdan Ciubotaru, Member, IEEE, and Gabriel-Miro Muntean, Member, IEEE Abstract Limited battery capacity

More information

TOPOLOGIES NETWORK SECURITY SERVICES

TOPOLOGIES NETWORK SECURITY SERVICES TOPOLOGIES NETWORK SECURITY SERVICES 1 R.DEEPA 1 Assitant Professor, Dept.of.Computer science, Raja s college of Tamil Studies & Sanskrit,Thiruvaiyaru ABSTRACT--In the paper propose about topology security

More information

Design of Remote data acquisition system based on Internet of Things

Design of Remote data acquisition system based on Internet of Things , pp.32-36 http://dx.doi.org/10.14257/astl.214.79.07 Design of Remote data acquisition system based on Internet of Things NIU Ling Zhou Kou Normal University, Zhoukou 466001,China; Niuling@zknu.edu.cn

More information

A STUDY ON SECURE DATA TRANSMISSION IN CLUSTER BASED WIRELESS SENSOR NETWORKS

A STUDY ON SECURE DATA TRANSMISSION IN CLUSTER BASED WIRELESS SENSOR NETWORKS A STUDY ON SECURE DATA TRANSMISSION IN CLUSTER BASED WIRELESS SENSOR NETWORKS C.Priya, M.Phil Scholar, Department Of Computer Science, Dr. R.A.N.M. Arts & Science College, Erode, Tamilnadu, India. M.Suriya,

More information

LBN: Load-balancing Network for Data Gathering Wireless Sensor Networks

LBN: Load-balancing Network for Data Gathering Wireless Sensor Networks LBN: Load-balancing Network for Data Gathering Wireless Sensor Networks Wenlu Yang 1, 2, Chongqing Zhang 2, Minglu Li 2 1 Department of Electronic Engineering, Shanghai Maritime University, Shanghai, China

More information

ISSN: 2319-5967 ISO 9001:2008 Certified International Journal of Engineering Science and Innovative Technology (IJESIT) Volume 2, Issue 5, September

ISSN: 2319-5967 ISO 9001:2008 Certified International Journal of Engineering Science and Innovative Technology (IJESIT) Volume 2, Issue 5, September Analysis and Implementation of IEEE 802.11 MAC Protocol for Wireless Sensor Networks Urmila A. Patil, Smita V. Modi, Suma B.J. Associate Professor, Student, Student Abstract: Energy Consumption in Wireless

More information

EFFICIENT DETECTION IN DDOS ATTACK FOR TOPOLOGY GRAPH DEPENDENT PERFORMANCE IN PPM LARGE SCALE IPTRACEBACK

EFFICIENT DETECTION IN DDOS ATTACK FOR TOPOLOGY GRAPH DEPENDENT PERFORMANCE IN PPM LARGE SCALE IPTRACEBACK EFFICIENT DETECTION IN DDOS ATTACK FOR TOPOLOGY GRAPH DEPENDENT PERFORMANCE IN PPM LARGE SCALE IPTRACEBACK S.Abarna 1, R.Padmapriya 2 1 Mphil Scholar, 2 Assistant Professor, Department of Computer Science,

More information

A NOVEL RESOURCE EFFICIENT DMMS APPROACH

A NOVEL RESOURCE EFFICIENT DMMS APPROACH A NOVEL RESOURCE EFFICIENT DMMS APPROACH FOR NETWORK MONITORING AND CONTROLLING FUNCTIONS Golam R. Khan 1, Sharmistha Khan 2, Dhadesugoor R. Vaman 3, and Suxia Cui 4 Department of Electrical and Computer

More information

Recent advances in microelectromechanical

Recent advances in microelectromechanical COVER FEATURE Energy-Efficient Area Monitoring for Sensor Networks The nodes in sensor networks must self-organize to monitor the target area as long as possible. Optimizing energy consumption in area

More information

Service Management in Wireless Sensors Network

Service Management in Wireless Sensors Network Service Management in Wireless Sensors Network Linnyer Beatrys Ruiz 1,, Thais Regina M. Braga 1, Fabrício A. Silva 1 José Marcos S. Nogueira 1, Antônio Alfredo F. Loureiro 1 1 Department of Computer Science

More information

Applying Mesh Networking to Wireless Lighting Control

Applying Mesh Networking to Wireless Lighting Control White Paper Applying Mesh Networking to Wireless Lighting Control www.daintree.net Abstract Recent advances in wireless communications standards and energy-efficient lighting equipment have made it possible

More information

Wireless Sensor Networks Database: Data Management and Implementation

Wireless Sensor Networks Database: Data Management and Implementation Sensors & Transducers 2014 by IFSA Publishing, S. L. http://www.sensorsportal.com Wireless Sensor Networks Database: Data Management and Implementation Ping Liu Computer and Information Engineering Institute,

More information

Dipak Wajgi Dept. of Computer Science and Engineering Ramdeobaba College of Engg. and Management Nagpur, India

Dipak Wajgi Dept. of Computer Science and Engineering Ramdeobaba College of Engg. and Management Nagpur, India Load Balancing Algorithms in Wireless Sensor Network : A Survey Dipak Wajgi Dept. of Computer Science and Engineering Ramdeobaba College of Engg. and Management Nagpur, India Dr. Nileshsingh V. Thakur

More information

Node Degree based Clustering for WSN

Node Degree based Clustering for WSN Node Degree based Clustering for WSN Sanjeev Kumar Gupta Dept. of Electronics & Comm. SCOPE College of Engineering,NH-12, Hoshangabad Road, Bhopal (INDIA) Neeraj Jain Dept. of Computer Science SCOPE College

More information

Prediction of DDoS Attack Scheme

Prediction of DDoS Attack Scheme Chapter 5 Prediction of DDoS Attack Scheme Distributed denial of service attack can be launched by malicious nodes participating in the attack, exploit the lack of entry point in a wireless network, and

More information

in Health Care and Sensor Networks

in Health Care and Sensor Networks 16 th FFV Workshop Web Services in Health Care and Sensor Networks Fahad Aijaz Department of Communication Networks RWTH Aachen University, Germany FFV Workshop, March 13, 2009 Outline Wireless Sensor

More information

MAP : A Balanced Energy Consumption Routing Protocol for Wireless Sensor Networks

MAP : A Balanced Energy Consumption Routing Protocol for Wireless Sensor Networks Journal of Information Processing Systems, Vol.6, No.3, September 2010 DOI : 10.3745/JIPS.2010.6.3.295 MAP : A Balanced Energy Consumption Routing Protocol for Wireless Sensor Networks Mohamed Mostafa

More information

Energy Aware Load Balancing in Secure Heterogeneous Wireless Sensor Network

Energy Aware Load Balancing in Secure Heterogeneous Wireless Sensor Network Energy Aware Load Balancing in Secure Heterogeneous Wireless Sensor Network Chandrakant N Bangalore, India nadhachandra@gmail.com Abstract A Wireless Sensor Network(WSN) is a energy and security constraint

More information

Adaptive Medium Access Control (MAC) for Heterogeneous Mobile Wireless Sensor Networks (WSNs).

Adaptive Medium Access Control (MAC) for Heterogeneous Mobile Wireless Sensor Networks (WSNs). 2008 Adaptive Medium Access Control (MAC) for Heterogeneous Mobile Wireless Sensor Networks (WSNs). Giorgio Corbellini 1 Challenges of the Ph.D. Study of urgency in sensed data Study of mobility in WSNs

More information

An Empirical Approach - Distributed Mobility Management for Target Tracking in MANETs

An Empirical Approach - Distributed Mobility Management for Target Tracking in MANETs An Empirical Approach - Distributed Mobility Management for Target Tracking in MANETs G.Michael Assistant Professor, Department of CSE, Bharath University, Chennai, TN, India ABSTRACT: Mobility management

More information

Topology Control and Mobility Strategy for UAV Ad-hoc Networks: A Survey

Topology Control and Mobility Strategy for UAV Ad-hoc Networks: A Survey Topology Control and Mobility Strategy for UAV Ad-hoc Networks: A Survey Zhongliang Zhao, Torsten Braun Institute of Computer Science and Applied Mathematics, University of Bern Neubrückstrasse 10, 3012

More information

Study And Comparison Of Mobile Ad-Hoc Networks Using Ant Colony Optimization

Study And Comparison Of Mobile Ad-Hoc Networks Using Ant Colony Optimization Study And Comparison Of Mobile Ad-Hoc Networks Using Ant Colony Optimization 1 Neha Ujala Tirkey, 2 Navendu Nitin, 3 Neelesh Agrawal, 4 Arvind Kumar Jaiswal 1 M. Tech student, 2&3 Assistant Professor,

More information

A Security Architecture for. Wireless Sensor Networks Environmental

A Security Architecture for. Wireless Sensor Networks Environmental Contemporary Engineering Sciences, Vol. 7, 2014, no. 15, 737-742 HIKARI Ltd, www.m-hikari.com http://dx.doi.org/10.12988/ces.2014.4683 A Security Architecture for Wireless Sensor Networks Environmental

More information

Securing wireless sensor networks

Securing wireless sensor networks Securing wireless sensor networks ODU Sensor Network Research Group Stephan Olariu Ashraf Wadaa Larry Wilson Kennie Jones ODU ODU ODU NASA LANGLEY Agenda What are wireless sensor networks (WSNs)? Security

More information

From reconfigurable transceivers to reconfigurable networks, part II: Cognitive radio networks. Loreto Pescosolido

From reconfigurable transceivers to reconfigurable networks, part II: Cognitive radio networks. Loreto Pescosolido From reconfigurable transceivers to reconfigurable networks, part II: Cognitive radio networks Loreto Pescosolido Spectrum occupancy with current technologies Current wireless networks, operating in either

More information

Research Article ISSN 2277 9140 Copyright by the authors - Licensee IJACIT- Under Creative Commons license 3.0

Research Article ISSN 2277 9140 Copyright by the authors - Licensee IJACIT- Under Creative Commons license 3.0 INTERNATIONAL JOURNAL OF ADVANCES IN COMPUTING AND INFORMATION TECHNOLOGY An international, online, open access, peer reviewed journal Volume 2 Issue 2 April 2013 Research Article ISSN 2277 9140 Copyright

More information

Security for Ad Hoc Networks. Hang Zhao

Security for Ad Hoc Networks. Hang Zhao Security for Ad Hoc Networks Hang Zhao 1 Ad Hoc Networks Ad hoc -- a Latin phrase which means "for this [purpose]". An autonomous system of mobile hosts connected by wireless links, often called Mobile

More information

Consecutive Geographic Multicasting Protocol in Large-Scale Wireless Sensor Networks

Consecutive Geographic Multicasting Protocol in Large-Scale Wireless Sensor Networks 21st Annual IEEE International Symposium on Personal, Indoor and Mobile Radio Communications Consecutive Geographic Multicasting Protocol in Large-Scale Wireless Sensor Networks Jeongcheol Lee, Euisin

More information

The Feasibility of SET-IBS and SET-IBOOS Protocols in Cluster-Based Wireless Sensor Network

The Feasibility of SET-IBS and SET-IBOOS Protocols in Cluster-Based Wireless Sensor Network The Feasibility of SET-IBS and SET-IBOOS Protocols in Cluster-Based Wireless Sensor Network R.Anbarasi 1, S.Gunasekaran 2 P.G. Student, Department of Computer Engineering, V.S.B Engineering College, Karur,

More information

Coverage Related Issues in Networks

Coverage Related Issues in Networks Coverage Related Issues in Networks Marida Dossena* 1 1 Department of Information Sciences, University of Naples Federico II, Napoli, Italy Email: marida.dossena@libero.it Abstract- Wireless sensor networks

More information

Remote Home Security System Based on Wireless Sensor Network Using NS2

Remote Home Security System Based on Wireless Sensor Network Using NS2 Remote Home Security System Based on Wireless Sensor Network Using NS2 #Rajesh Banala 1, Asst.Professor,E-mail: rajesh.banal@gmail.com #D.Upender 2, Asst.Professor, E mail: upender584@gmail.com #Department

More information

Monitoring Large-Scale Wireless Sensor Networks

Monitoring Large-Scale Wireless Sensor Networks Monitoring Large-Scale Wireless Sensor Networks using Epidemic Protocols Daniela Gavidia, Spyros Voulgaris, Maarten van Steen Vrije Universiteit Amsterdam Faculty of Science Department of Computer Science

More information

ENHANCED GREEN FIREWALL FOR EFFICIENT DETECTION AND PREVENTION OF MOBILE INTRUDER USING GREYLISTING METHOD

ENHANCED GREEN FIREWALL FOR EFFICIENT DETECTION AND PREVENTION OF MOBILE INTRUDER USING GREYLISTING METHOD ENHANCED GREEN FIREWALL FOR EFFICIENT DETECTION AND PREVENTION OF MOBILE INTRUDER USING GREYLISTING METHOD G.Pradeep Kumar 1, R.Chakkaravarthy 2, S.Arun kishorre 3, L.S.Sathiyamurthy 4 1- Assistant Professor,

More information

Energy Efficient Coverage for Mobile Sensor Network

Energy Efficient Coverage for Mobile Sensor Network Volume 55 No., October Energy Efficient Coverage for Mobile Sensor Network Richa Singh Krishna Engineering College, Ghaziabad ABSTRACT Wireless sensor networks comprise the platform of a broad range of

More information

Task-based Self-Organization in Large Smart Spaces: Issues and Challenges 1

Task-based Self-Organization in Large Smart Spaces: Issues and Challenges 1 Task-based Self-Organization in Large Smart Spaces: Issues and Challenges 1 P. Basu and T.D.C. Little Department of Electrical and Computer Engineering Boston University, Boston, Massachusetts 02215, USA

More information

Scaling 10Gb/s Clustering at Wire-Speed

Scaling 10Gb/s Clustering at Wire-Speed Scaling 10Gb/s Clustering at Wire-Speed InfiniBand offers cost-effective wire-speed scaling with deterministic performance Mellanox Technologies Inc. 2900 Stender Way, Santa Clara, CA 95054 Tel: 408-970-3400

More information

Routing Techniques in Wireless Sensor Networks: A Survey

Routing Techniques in Wireless Sensor Networks: A Survey Routing Techniques in Wireless Sensor Networks: A Survey Jamal N. Al-Karaki Ahmed E. Kamal Dept. of Electrical and Computer Engineering Iowa State University, Ames, Iowa 50011 Email: {jkaraki, kamal}@iastate.edu

More information

Foundation University, Islamabad, Pakistan qasim_1987@hotmail.com

Foundation University, Islamabad, Pakistan qasim_1987@hotmail.com Kerberos Authentication in Wireless Sensor Networks Qasim Siddique Foundation University, Islamabad, Pakistan qasim_1987@hotmail.com ABSTRACT We proposed an authentication mechanism in the wireless sensor

More information

A Routing Algorithm Designed for Wireless Sensor Networks: Balanced Load-Latency Convergecast Tree with Dynamic Modification

A Routing Algorithm Designed for Wireless Sensor Networks: Balanced Load-Latency Convergecast Tree with Dynamic Modification A Routing Algorithm Designed for Wireless Sensor Networks: Balanced Load-Latency Convergecast Tree with Dynamic Modification Sheng-Cong Hu r00631036@ntu.edu.tw Jen-Hou Liu r99631038@ntu.edu.tw Min-Sheng

More information

Efficient Data Transmission For Wireless Sensor Networks

Efficient Data Transmission For Wireless Sensor Networks Volume: 2, Issue: 4, 221-225 April 2015 www.allsubjectjournal.com e-issn: 2349-4182 p-issn: 2349-5979 Impact Factor: 3.762 Girijalaxmi M.Tech scholar, Department of computer Vasudev S Senior assistant

More information

Medium Access Control with Dynamic Frame Length in Wireless Sensor Networks

Medium Access Control with Dynamic Frame Length in Wireless Sensor Networks Journal of Information Processing Systems, Vol.6, No.4, December 2010 DOI : 10.3745/JIPS.2010.6.4.501 Medium Access Control with Dynamic Frame Length in Wireless Sensor Networks Dae-Suk Yoo* and Seung

More information

Energy-Efficient Communication Protocol for Wireless Microsensor Networks

Energy-Efficient Communication Protocol for Wireless Microsensor Networks Copyright 2 IEEE. Published in the Proceedings of the Hawaii International Conference on System Sciences, January 4-7, 2, Maui, Hawaii. Energy-Efficient Communication Protocol for Wireless Microsensor

More information

Fundamentals of Mobile and Pervasive Computing

Fundamentals of Mobile and Pervasive Computing Fundamentals of Mobile and Pervasive Computing Frank Adelstein Sandeep K. S. Gupta Golden G. Richard III Loren Schwiebert Technische Universitat Darmstadt FACHBEREICH INFORMATIK B1BLIOTHEK Inventar-Nr.:

More information

Secure Routing in Wireless Sensor Networks

Secure Routing in Wireless Sensor Networks Secure Routing in Wireless Sensor Networks Introduction to Wireless Sensor Networks Ida Siahaan / Leonardo Fernandes DIT Ida Siahaan / Leonardo Fernandes (DIT) Secure Routing in Wireless Sensor Networks

More information

An Enhanced Hierarchical Energy Efficient Intrusion Detection System for Malicious Packet Dropping Attacks in Wireless Sensor Networks

An Enhanced Hierarchical Energy Efficient Intrusion Detection System for Malicious Packet Dropping Attacks in Wireless Sensor Networks An Enhanced Hierarchical Energy Efficient Intrusion Detection System for Malicious Packet Dropping Attacks in Wireless Sensor Networks A Thesis Submitted in Partial Fulfillment of the Requirements for

More information

DoS Attack and Its Countermeasure in Energy-Constrained Wireless Networks

DoS Attack and Its Countermeasure in Energy-Constrained Wireless Networks DoS Attack and Its Countermeasure in Energy-Constrained Wireless Networks Sunho Lim (Ph.D., Assistant Professor) T 2 WISTOR: TTU Wireless Mobile Networking Laboratory Dept. of Computer Science Texas Tech

More information

Review of Prevention techniques for Denial of Service Attacks in Wireless Sensor Network

Review of Prevention techniques for Denial of Service Attacks in Wireless Sensor Network Review of Prevention techniques for Denial of Service s in Wireless Sensor Network Manojkumar L Mahajan MTech. student, Acropolis Technical Campus, Indore (MP), India Dushyant Verma Assistant Professor,

More information

Delay-Aware Big Data Collection Strategies for Sensor Cloud Services Dr. Chi-Tsun (Ben), Cheng

Delay-Aware Big Data Collection Strategies for Sensor Cloud Services Dr. Chi-Tsun (Ben), Cheng Delay-Aware Big Data Collection Strategies for Sensor Cloud Services Dr. Chi-Tsun (Ben), Cheng chi-tsun.cheng@polyu.edu.hk http://www.eie.polyu.edu.hk/~bcheng/ An Overview Introduction Wireless Sensor

More information

A Novel Multi Ring Forwarding Protocol for Avoiding the Void Nodes for Balanced Energy Consumption

A Novel Multi Ring Forwarding Protocol for Avoiding the Void Nodes for Balanced Energy Consumption International Journal of Computer Sciences and Engineering Open Access Review Paper Volume-4, Issue-4 E-ISSN: 2347-2693 A Novel Multi Ring Forwarding Protocol for Avoiding the Void Nodes for Balanced Energy

More information

An Improved Wireless Sensor Network Protocol to Increase the Network Throughput and Life

An Improved Wireless Sensor Network Protocol to Increase the Network Throughput and Life Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 7, July 2014, pg.275

More information

Load Balanced Data Transmission within the Probabilistic Wireless Sensor Network

Load Balanced Data Transmission within the Probabilistic Wireless Sensor Network Load Balanced Data Transmission within the Probabilistic Wireless Sensor Network Jyoti P.Desai 1, Prof Abhijit Patil 2 1 Student, ME Computer Engineering, Yadavrao Tasgaonkar college of Engineering and

More information

Preventing Resource Exhaustion Attacks in Ad Hoc Networks

Preventing Resource Exhaustion Attacks in Ad Hoc Networks Preventing Resource Exhaustion Attacks in Ad Hoc Networks Masao Tanabe and Masaki Aida NTT Information Sharing Platform Laboratories, NTT Corporation, 3-9-11, Midori-cho, Musashino-shi, Tokyo 180-8585

More information

A Routing Method for Top-k Query Processing in Mobile Ad Hoc Networks

A Routing Method for Top-k Query Processing in Mobile Ad Hoc Networks 2013 IEEE 27th International Conference on Advanced Information Networking and Applications A Routing Method for Top-k Query Processing in Mobile Ad Hoc Networks Daichi Amagata, Yuya Sasaki, Takahiro Hara,

More information

An Extended AODV Protocol to Support Mobility in Hybrid Networks

An Extended AODV Protocol to Support Mobility in Hybrid Networks An Extended AODV Protocol to Support Mobility in Hybrid Networks Sèmiyou A. Adédjouma* Polytechnic School of Abomey-Calavi (EPAC) University of Abomey-Calavi (UAC) Cotonou, Benin *semiyou.adedjouma {at}

More information

Sensor Devices and Sensor Network Applications for the Smart Grid/Smart Cities. Dr. William Kao

Sensor Devices and Sensor Network Applications for the Smart Grid/Smart Cities. Dr. William Kao Sensor Devices and Sensor Network Applications for the Smart Grid/Smart Cities Dr. William Kao Agenda Introduction - Sensors, Actuators, Transducers Sensor Types, Classification Wireless Sensor Networks

More information