Holes Detection in Wireless Sensor Networks: A Survey
|
|
|
- Frank Cobb
- 10 years ago
- Views:
Transcription
1 I.J. Modern ducation and omputer cience, 204, 4, Published Online pril 204 in M ( OI: 0.585/ijmecs s etection in Wireless ensor Networks: urvey mita Karmakar epartment of Information Technology, Tripura University, uryamaninagar, India mail: [email protected] lak Roy epartment of Information Technology, Tripura University, uryamaninagar, India mail: [email protected] bstract Now a day s, it has been a great idea of research on using Wireless ensor Networks (WNs) to assist in the initial deployment of sensor nodes. problem in WNs is the most fundamental Problem in WNs. means a communication gap in WNs. inding an optimal sensor deployment strategy that would minimize the cost, reduce the node failure and also reduce the communication overhead. Then it provides a maximum degree of with lower cost of deployment of sensor nodes, best possible communication and maintaining the network connectivity. However, it increases the quality of service in WNs that is extremely challenging. In this article, we present various types of holes, a comparative study of various types of holes and various types of holes. t the end, we proposed an lgorithm to detect hole. In this paper, we aim to give the solution of hole problems of in WNs. Index Terms s, overage, detection, ize estimation of hole. I. INTROUTION wireless sensor networks (WNs) consist of distributed autonomous sensor-nodes to monitor physical or environmental characteristics, such as temperature, humidity, sound, pollution levels, pressure, direction and wind speed etc. In WNs, data is transferred from one sensor node to another sensor node through the network []. The WNs are bi-directional. The applications of WNs are military applications, many industrial and consumer applications, monitoring etc [2]. possible example of WNs architecture is given in fig., where red colored solid lines represent all the possible communication links and orange color dashed represent sensing, blue colored circles represent all the sensors. black colored line represents communication lines between sender and receiver.. ubsystems in WNs WN consists of three subsystems those are [3]: ) ensor subsystem: It senses the with the help of properties like humidity, pressure, temperature etc. 2) processing sub system: It provides local commutation processes on sensed message. 3) ommunication subsystem: ach sensor communicate with any other sensors by transferring the message.. haracteristics of a WNs The main characteristics [4] of WNs are: Power consumption constrains for nodes using batteries or energy harvesting bility to cope with sensor node failures Mobility of sensor nodes ommunication calability to the large of deployment bility to monitor environmental conditions ase of use The rest of the paper is organized as follows. In ection II, holes in WNs, different types of holes are discussed. In ection III, we have discussed existing solutions to hole detection. Proposed algorithm for hole detection is given in ection IV. inally the paper concludes with future research direction in ection V. ensor Node Gateway ensor Node ig. n example of WNs architecture. opyright 204 M I.J. Modern ducation and omputer cience, 204, 4, 24-30
2 s etection in Wireless ensor Networks: urvey 25 overage ased on static sensor Routing rea Point arrier Jamming ased on moving sensor Trap lac k Worm II. HOL IN WN s are one of the challenges in deployment of WNs in a large. s generally considered as a communication gap among sensor nodes. taxonomy of various types of holes are given in ig 2, they are hole, Routing hole, Jamming hole, ink/lack hole and Worm hole. comparative study of various types of holes are given in Table with their basic mechanisms and features. ig 2. Taxonomy of various types of s in WNs. Table : omparative study of various types of holes. Type ensor Node tatus Mechanism eatures overage live overage holes depend upon various factors, such as buildings, mountains, technologies, and radio frequency Unintentional, communication is not possible in that region Routing ead (failured) or act as dead. ue to failure of the sensor node, holes are created Routing hole can be unintentional Jamming ctive ue to radio frequency in the communication way among the sensors Jamming holes are created Jamming hole can be unintentional or deliberate lack/ink Worm ender and Receiver are alive ender and Receiver Nodes are alive, but they are attacked by enial of ervice attack. When incoming or outgoing or both traffic is discarded, without informing the sender, then the data can not reach to its intended receiver Malicious nodes create a tunnel among themselves. They start forwarding packets and receives from one part of the network to the other end of the tunnel using a separate communication radio channel,then worm holes are created. aused for limited bandwidth and channel accessed by neighboring sensors It causes nodes located in different parts of networks to believe that they are neighbors, resulting in incorrect routing convergence. overage One main fundamental issue in WNs is problem (i.e. holes). overage of a sensor node means that the geographic where the sensor node can communicate with other sensor nodes in WNs. overage of a sensor node mainly depends on two factors. These are - (i) the range (i.e. ) and sensitivity of that sensing nodes, and (ii) density and location of that sensing node in a given region. overage holes depend upon various factors, such as buildings, mountains, technologies, and radio frequency etc. There are various types of holes. These are described below: overage problem in WNs can be categorized into two sub types; they are ased on static object (sensor) and ased on moving object (sensor). i. ased on static sensor ased on static sensor/object problem in WNs can be categorized into the following types: a) rea overage: The main objective of any sensor network is to cover a geographical. ensors may cover a geographical by different shapes as shown in fig. 3, they are circular- or angle- or triangular- or square- [5]. ircular ngle Triangular quare ig 3. ifferent shapes in geographical are covered by sensor. opyright 204 M I.J. Modern ducation and omputer cience, 204, 4, 24-30
3 26 s etection in Wireless ensor Networks: urvey s exist in a geographical due to improper positioning of sensor nodes in that as shown in fig. 4(a), fig. 5, fig. 7, fig. 9. ut such problems can be solved by proper positioning of sensor nodes so that nodes can cover and sense the geographical without any gap as shown in fig. 4(b), fig. 6, fig. 8, fig. 0. ig 0. quare- geographical without hole. b) Point overage : In the point problem, the objective is to cover a set of points. Here, a particular point of is covered and rest is not covered. This is due to insufficient of sensor nodes deployed than required. ig 4. (a) in circular- geographical (b) ircular- geographical without hole. ig. Point overage. ig 5. in ngular- geographical. ig 6. ngular- geographical without hole. c) arrier overage: The barrier is the with the goal of minimizing the probability of undetected penetration through the barrier in sensor network. In ig 2, mountain is the barrier that separates both the (a) and (b). Here, (a) is covered by all the sensors. ut, due to the barrier, (b) is not covered by the sensors. ig 7. in Triangular- geographical. ig 2. arrier overage. ii. ased on moving sensor: ased on moving sensors/objects can be ig 8. Triangular- geographical without hole. ig 9. in quare- geographical. a) Trap overage : new model of, called trap overage that scales well with large deployment region. sensor network providing trap guarantees that any moving object or phenomena can move at most a (known) displacement before it is guaranteed to be detected by the network, for any trajectory and speed. In the below fig3, deployment, d is the diameter of the largest hole. lthough the diameter line intersects this covered, it still represents the largest displacement that a moving object can travel without being detected in the target region. comparative study of various types of holes are given in Table 2. opyright 204 M I.J. Modern ducation and omputer cience, 204, 4, 24-30
4 s etection in Wireless ensor Networks: urvey 27 ig 3. Trap overage. Routing : Routing hole is one type of hole where either sensor nodes are not active or the active sensor nodes can not participate in the actual routing of the data due to several reasons. These holes in WNs can be formed either due to some problems in wireless links or because of failure of sensor nodes due to several reasons such as battery depletion, external events (such as fire), natural obstacles or disaster suffered s. Routing hole is shown in fig 4, where node c can not participate in routing process. T T I N OR MO VI NG N OR Table 2: comparative study of different types of. Types of overage Mechanism Limitation enefit r e a o v e r a g e ircular ngle Triangle quare Point overage arrier overage Trap overage geographical circularly. ngle- geographical. Triangle- geographical. quare- geographical. ensors cover a set of points. set of sensors randomly deployed to cover a set of points. The goal of barrier is minimizing the probability of undetected penetration through the barrier (sensor network). It scales well with large deployment region. Here, sensors are moving. When a large region is covered by circular, then, there may have some chances to become holes. Unintentionally, when this type of hole occurs, then communication is not possible in that region. When this type of hole occurs, then communication is not possible in that region. It also has probabilities to become holes. It covers small region. ) t the time of covering the region, when the network is bent down from the barrier, then it does not cover the whole region. That time it covers small. 2) It is complex, trying to cover whole region. ecause sensor waves can t penetrate the wall or barrier. 3) ensors may not be conveniently placed. i) moving object can travel within the target region without being detected. so, there is a probability to make a hole. ii) Very tough to maintain. It covers some region around the sensor. or angle region, it will be very useful when we want to covered an angle. ) asy to maintain. 2) ize of the hole is small. ) asy to maintain. 2) ize of the hole is small. It is simple to tackle. ) Number of waves is more in the region. g, (a) in fig 3. 2) Low bandwidth. i) ensors cover the region dynamically. ii) It uses moving sensors. opyright 204 M I.J. Modern ducation and omputer cience, 204, 4, 24-30
5 28 s etection in Wireless ensor Networks: urvey ig 4. (a) typical example of Routing.. ink/lack : In WNs, black or sink holes means a place, where incoming or outgoing or both traffic is discarded, without informing the sender(source) that the data did not reach its intended receiver(destination). lack hole can be detected by checking the lost traffic. The creation of sink hole is caused for limited bandwidth and channel accessed by neighboring sensor nodes. [7]. T High Traffic T2 ig 6. ink /lack R ig 4. (b) olution to a typical example of Routing.. Jamming jamming hole is another type of hole that can occur in tracking applications when the sensor node is tracked with jammers by jamming the radio frequency being used for communication among all the sensor nodes, here sensor node is able to find another sensor node in WNs, but unable to communicate among them because of communication jamming [5, 9]. Generally, jamming can be unintentional or deliberates. Unintentional jamming results if one or more sensor nodes continuously use the wireless channels to deny the communication facility among all the neighboring sensor nodes. In deliberate jamming, the opposition sensor node is trying to impair the communication among all the sensors nodes of the WNs by interfering with the communication ability of the sensor nodes [6]. ig. 5 depicts an example of jamming hole where node acts as jammer that radiates high radio frequency because of which all neighbor nodes cannot communicate with each other.. Worm : Worm hole is one kind of enial Of ervice(o) attack [8]. It is an active attack. Here, the contents of the original message are modified in some way. abrication causes O attack. abrication is possible in absence of proper authentication mechanism. Here all the malicious sensor nodes, located in different parts of WNs, form tunnels among themselves. They start forwarding data packets received at one part of the WNs to the other end of the tunnel using other communication channel. The receiving malicious sensor node then replays the message in other part of the WNs. This causes sensor nodes located in different parts of WNs to believe that they are neighbors, but resulting in incorrect routing convergence. 6 5 Tunnel ig 5. Jamming Here jamming hole is roughly similar to the routing hole. ut routing hole is more dangerous than jamming hole, because, in jamming hole sensor nodes are alive, but in routing hole, sensor nodes are dead or act as dead. 4 High Radio requency ig 7. Worm In ig. 7, sensor node 3 and 6 create a tunnel between them, because of which sensor node and 4 can not communicate with sensor node 5 and 2 respectively. Next section gives an overview of existing solutions proposed by researcher to detect hole in WNs. III.XITING OLUTION TO HOL TTION In this section, we present two different solutions for hole detection proposed by researchers, they are vornoi diagram and triangular oriented diagram. 2 opyright 204 M I.J. Modern ducation and omputer cience, 204, 4, 24-30
6 s etection in Wireless ensor Networks: urvey 29. Voronoi iagram pproach Voronoi diagram approach is used to detect a hole and calculate the size of a hole [0, ]. Voronoi diagram consists of [2] N sensors s, s2,, sn. plane is divided into N cells. ach cell contains one sensor. Two Voronoi cells meet along a voronoi edge. sensor node is a voronoi neighbour of other sensor node, if they both share a voronoi edge. ig. 6 illustrates a Voronoi diagram approach in a plane. (failure). When the sensor node is dead, then the geographical is not covered by that sensor node, so this will be treated as hole. t first phase, cluster head sensor node sends a signal to each of the sensor node in the cluster geographically deployed over an. If anyone of the sensor nodes replies to the cluster head node, then that sensor node is alive or active, otherwise sensor node is dead. Using this algorithm, we can easily find out the alive nodes and dead nodes (or can referred as hole) in WNs. When a node is dead, then the sensing of this node will detect a hole in that. lgorithm ig 8. Illustration of using Voronoi diagram to detect a hole and decide the hole size.. Triangular Oriented iagram pproach One of the solutions to hole detection problem is triangular structure. uthors [2] use the triangular oriented diagram to calculate the size of hole exactly. ig. 9 shows triangular oriented structure that can be used to detect a hole and calculate the size of a hole [2]. ig 9. onstruction the triangular oriented structure. Voronoi diagram approach has few limitations like-here shape of each cell is different. o, it is very tough to calculate the exact size of the hole. The limitation of triangular oriented structure is that, it is not a proper hole detection solution because, in a large WNs, it is complex to connect the centre of three adjacent sensors. There are lots of research works going on in this [3, 4, 5, 6, 7, 8] to find a good and effective solution to find hole in a wireless sensor network. In the next section, we propose a simple but efficient hole detection algorithm. IV.PROPO LGORITHM OR HOL TTION: In this section, we have proposed a new algorithm to detect holes in WNs, the proposed algorithm initially find out whether a sensor node is alive (active) or dead i : integer /* ounter */ N : integer /* Number of sensor nodes in the list of WNs*/ List : array [0 to N-] of integer /* rray of sensor nodes */ Request : integer /* ender ignal */ Reply : integer /* Receiver ignal */ live-node : integer /* ctive sensor node */ ead-node : integer /* ead sensor node */ egin for all (i= to N) do begin send(request,node[i]); /* end a request from master sensor node to the sensor node[i] in the list of WNs */ wait(reply,node[i]); /* Wait for replies from sensor node[i] to master node */ nd; If (receiver(reply)==) then Mark(live); /* When receiver sensor node[i] replies, then marks the sensor node[i] as alive */ live-node := live-node + ; /* ount the number of alive nodes */ lse If (receiver(reply)!= ) then Mark(ead); /* When receiver sensor node[i] does not reply, then marks the sensor node[i] as dead */ ead-node := ead-node + ; /* ount the number of dead nodes */ nd if; nd for; We expect that the proposed algorithm for hole detection will work more efficiently than the others discussed in section III. nalysis and simulation of the proposed algorithm will be done in near future and we will do further research to find the exact solutions that will detect all type of the holes by minimizing the cost and maximizing the sensing with minimum number of sensor nodes. We will also try to find more efficient algorithm as a solutions to solve hole problem. opyright 204 M I.J. Modern ducation and omputer cience, 204, 4, 24-30
7 30 s etection in Wireless ensor Networks: urvey V.ONLUION N UTUR RRH IRTION In this paper, we considered the hole problem, which can be used to deal with sensor or node failure. We also proposed a simple and straight-forward algorithm to find out hole. In future, we would like to find out the exact amount of hole and exact size of each hole to give the exact solution for the hole problem in WNs. nd also we would try to get maximum without any hole by minimum sensors. RRN [] Y. Jennifer,. Mukherjee, and. Ghosal, "Wireless sensor network survey," omputer networks, 52 (), pp , [2] I.. kyildiz, W. u, Y. ankarasubramaniam, and. ayirci, "Wireless sensor networks: a survey," omputer networks, 38 (4), pp , [3].J Pottie and W.J. Kaiser, Wireless Integrated Network ensors, ommunication of the M, 43 (5), pp. 5-58, May [4] haracteristics. Last accessed on November 08, 203. [5].. Wood, J.. tankovic, and. H. on, JM: jammed- mapping service for sensor networks, In 24th I Real Time ystem ymposium (RT 03), pp , ec [6]. Karlof and. Wagner, ecure routing in wireless sensor networks: ttacks and counter measures, In st I International Workshop NP 03, May [7].. Wood and J.. tankovic, enial of service in sensor networks, I omputer, 35(0), pp 48 56, Oct [8]. Ghiasi,. rivatava, X. Yang, and M. anafzadeh, Optimal nergy ware lustering in lustering in ensor Networks, in ensors, 2, pp , eb [9] Last accessed on November 08, 203. [0]. Ghosh, "stimating holes and enhancing in mixed sensor networks." In Local omputer Networks, 2004, 29th nnual I International onference on, I, pp , [] G. Wang, G. ao, P. erman, T..L. Porta, idding protocols for deploying mobile sensors, I Transactions on Mobile omputing, 6(5), pp , [2]. abaie, and.. Pirahesh. " detection for increasing in wireless sensor network using triangular structure", IJI International Journal of omputer cience Issues, 9(2), January 202. [3] H.. Jun, and Y.. Hua, ata ollection Method with Mobile ink Node in Wireless ensor Network, International Journal of Wireless and Microwave Technologies (IJWMT), 2(4), 46, 202. [4]. K. Nagpal,. Kumar,. hushan, and. Gupta, tudy of lack ttack on MNT Performance, International Journal of Modern ducation & omputer cience, 4(8), 202. [5] H. HongNing, L. Zhong, and L. Lu, Real-Time irected Routing Protocol ased on Projection of onvex s on Underwater coustic Networks, International Journal of Wireless and Microwave Technologies (IJWMT), 2(2), 65, 202. [6] X. Yu,. Wu,. hen, and N. Hu, Level et ased overage s etection and s Healing cheme in Hybrid ensor Network, International Journal of istributed ensor Networks, 203. [7]. Kong,. erworn, J. Tran,. Herman,. oleshill, and K. G. erpanis, Toward the automatic detection of access holes in disaster rubble, In afety, ecurity, and Rescue Robotics (RR), 203 I International ymposium on (pp. -6). I, Oct 203. [8] M. L. Zheng, P. P. Zhai, and X. Zou, Research of Location Technology ased on Wireless ensor Network, dvanced Materials Research, 860, , 204. mita Karmakar is pursuing her Master in omputer pplication degree from Tripura University. he has completed achelor in omputer pplication degree from Tripura University in 20. Her main research includes, Wireless ensor Network and Mobile ommunication. lak Roy is a Ph student at Tezpur University doing research in the field of Underwater ensor Network. He received Tech (omputer cience and ngineering) and MTech (Information Technology) degrees from North astern Regional Institute of cience and Technology and Tezpur University in 2008, and 200 respectively. In 20, he was a faculty in National Institute of Technology gartala, India. He is currently employed as an ssistant Professor in the department of Information Technology, Tripura University, India. His primary research interests is in wireless sensor networking with an emphasis on energy efficiency, medium access control issues in underground and underwater sensor network. opyright 204 M I.J. Modern ducation and omputer cience, 204, 4, 24-30
AN EFFICIENT STRATEGY OF AGGREGATE SECURE DATA TRANSMISSION
INTERNATIONAL JOURNAL OF REVIEWS ON RECENT ELECTRONICS AND COMPUTER SCIENCE AN EFFICIENT STRATEGY OF AGGREGATE SECURE DATA TRANSMISSION K.Anusha 1, K.Sudha 2 1 M.Tech Student, Dept of CSE, Aurora's Technological
Introduction to Wireless Sensor Network Security
Smartening the Environment using Wireless Sensor Networks in a Developing Country Introduction to Wireless Sensor Network Security Presented By Al-Sakib Khan Pathan Department of Computer Science and Engineering
An Implementation of Secure Wireless Network for Avoiding Black hole Attack
An Implementation of Secure Wireless Network for Avoiding Black hole Attack Neelima Gupta Research Scholar, Department of Computer Science and Engineering Jagadguru Dattaray College of Technology Indore,
ISSN: 2321-7782 (Online) Volume 2, Issue 2, February 2014 International Journal of Advance Research in Computer Science and Management Studies
ISSN: 2321-7782 (Online) Volume 2, Issue 2, February 2014 International Journal of Advance Research in Computer Science and Management Studies Research Article / Paper / Case Study Available online at:
A Security Architecture for. Wireless Sensor Networks Environmental
Contemporary Engineering Sciences, Vol. 7, 2014, no. 15, 737-742 HIKARI Ltd, www.m-hikari.com http://dx.doi.org/10.12988/ces.2014.4683 A Security Architecture for Wireless Sensor Networks Environmental
Wireless Sensor Network: Challenges, Issues and Research
ISBN 978-93-84468-20-0 Proceedings of 2015 International Conference on Future Computational Technologies (ICFCT'2015) Singapore, March 29-30, 2015, pp. 224-228 Wireless Sensor Network: Challenges, Issues
Secure Routing in Wireless Sensor Networks
Secure Routing in Wireless Sensor Networks Introduction to Wireless Sensor Networks Ida Siahaan / Leonardo Fernandes DIT Ida Siahaan / Leonardo Fernandes (DIT) Secure Routing in Wireless Sensor Networks
ENHANCED GREEN FIREWALL FOR EFFICIENT DETECTION AND PREVENTION OF MOBILE INTRUDER USING GREYLISTING METHOD
ENHANCED GREEN FIREWALL FOR EFFICIENT DETECTION AND PREVENTION OF MOBILE INTRUDER USING GREYLISTING METHOD G.Pradeep Kumar 1, R.Chakkaravarthy 2, S.Arun kishorre 3, L.S.Sathiyamurthy 4 1- Assistant Professor,
Security and Privacy Issues in Wireless Ad Hoc, Mesh, and Sensor Networks
Advance in Electronic and Electric Engineering. ISSN 2231-1297, Volume 4, Number 4 (2014), pp. 381-388 Research India Publications http://www.ripublication.com/aeee.htm Security and Privacy Issues in Wireless
Mobile Security Wireless Mesh Network Security. Sascha Alexander Jopen
Mobile Security Wireless Mesh Network Security Sascha Alexander Jopen Overview Introduction Wireless Ad-hoc Networks Wireless Mesh Networks Security in Wireless Networks Attacks on Wireless Mesh Networks
Protecting Privacy Secure Mechanism for Data Reporting In Wireless Sensor Networks
ISSN (Online) : 2319-8753 ISSN (Print) : 2347-6710 International Journal of Innovative Research in Science, Engineering and Technology Volume 3, Special Issue 3, March 2014 2014 International Conference
Anomaly Intrusion Detection System in Wireless Sensor Networks: Security Threats and Existing Approaches
Anomaly Intrusion Detection System in Wireless Sensor Networks: Security Threats and Existing Approaches Md. Safiqul Islam *1, Syed AshiqurRahman *2 Department of Computer Science and Engineering Daffodil
A Novel Pathway for Portability of Networks and Handing-on between Networks
A Novel Pathway for Portability of Networks and Handing-on between Networks D. S. Dayana #1, S. R. Surya #2 Department of Computer Applications, SRM University, Chennai, India 1 [email protected]
Prediction of DDoS Attack Scheme
Chapter 5 Prediction of DDoS Attack Scheme Distributed denial of service attack can be launched by malicious nodes participating in the attack, exploit the lack of entry point in a wireless network, and
A Secure Intrusion detection system against DDOS attack in Wireless Mobile Ad-hoc Network Abstract
A Secure Intrusion detection system against DDOS attack in Wireless Mobile Ad-hoc Network Abstract Wireless Mobile ad-hoc network (MANET) is an emerging technology and have great strength to be applied
SECURITY ASPECTS IN MOBILE AD HOC NETWORK (MANETS)
SECURITY ASPECTS IN MOBILE AD HOC NETWORK (MANETS) Neha Maurya, ASM S IBMR ABSTRACT: Mobile Ad hoc networks (MANETs) are a new paradigm of wireless network, offering unrestricted mobility without any underlying
Wireless Sensor Network Security. Seth A. Hellbusch CMPE 257
Wireless Sensor Network Security Seth A. Hellbusch CMPE 257 Wireless Sensor Networks (WSN) 2 The main characteristics of a WSN include: Power consumption constrains for nodes using batteries or energy
Security in Ad Hoc Network
Security in Ad Hoc Network Bingwen He Joakim Hägglund Qing Gu Abstract Security in wireless network is becoming more and more important while the using of mobile equipments such as cellular phones or laptops
Survey on Load balancing protocols in MANET S (mobile ad-hoc networks)
Survey on Load balancing protocols in MANET S (mobile ad-hoc networks) Ramandeep Kaur 1, Gagandeep Singh 2, Sahil Vashist 3 1 M.tech Research Scholar, Department of Computer Science & Engineering, Chandigarh
On Frequency Assignment in Cellular Networks
On Frequency ssignment in ellular Networks Sanguthevar Rajasekaran Dept.ofISE,Univ. offlorida Gainesville, FL 32611 David Wei Dept. of S, Fordham University New York, NY K. Naik Dept. of S, Univ. of izu
EBHEAL: Distributed and Localized Mechanism for Coverage Hole Detection and Healing
www.ijecs.in International Journal Of Engineering And Computer Science ISSN:39-74 Volume 4 Issue 7 July 05, Page No. 3457-346 EBHEAL: Distributed and Localized Mechanism for Coverage Hole Detection and
Preventing DDOS attack in Mobile Ad-hoc Network using a Secure Intrusion Detection System
Preventing DDOS attack in Mobile Ad-hoc Network using a Secure Intrusion Detection System Shams Fathima M.Tech,Department of Computer Science Kakatiya Institute of Technology & Science, Warangal,India
Vulnerabilities of Intrusion Detection Systems in Mobile Ad-hoc Networks - The routing problem
Vulnerabilities of Intrusion Detection Systems in Mobile Ad-hoc Networks - The routing problem Ernesto Jiménez Caballero Helsinki University of Technology [email protected] Abstract intrusion detection
International Journal of Advanced Research in Computer Science and Software Engineering
Volume 2, Issue 9, September 2012 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com An Experimental
New System Security Model for a Mobile Operator s Meshed Access Network
New System Security Model for a Mobile Operator s Meshed Access Network Sharad Kumar Verma 1, Dr. D.B. Ojha 2 Research Scholar, Department of CSE, Mewar University, Chittorgarh, Rajasthan, India 1 Professor,
CSC 774 Advanced Network Security. Outline. Related Work
CC 77 Advanced Network ecurity Topic 6.3 ecure and Resilient Time ynchronization in Wireless ensor Networks 1 Outline Background of Wireless ensor Networks Related Work TinyeRync: ecure and Resilient Time
Bandwidth Management Framework for Multicasting in Wireless Mesh Networks
Bandwidth Management Framework for Multicasting in Wireless Mesh Networks Manaswi Saha and P. Venkata Krishna Abstract Wireless mesh networks (WMNs) provide a reliable and a scalable solution for multicasting.
A NOVEL OVERLAY IDS FOR WIRELESS SENSOR NETWORKS
A NOVEL OVERLAY IDS FOR WIRELESS SENSOR NETWORKS Sumanta Saha, Md. Safiqul Islam, Md. Sakhawat Hossen School of Information and Communication Technology The Royal Institute of Technology (KTH) Stockholm,
Design of an U-slot Folded Shorted Patch Antenna for RF Energy Harvesting
Design of an U-slot Folded Shorted Patch Antenna for RF Energy Harvesting Diponkar Kundu, Ahmed Wasif Reza, and Harikrishnan Ramiah Abstract Novel optimized U-slot Folded Shorted Patch Antenna (FSPA) is
A Dynamically Configurable Topology Control for Hybrid Ad Hoc Networks with Internet Gateways
ynamically onfigurable Topology ontrol for Hybrid d Hoc Networks with Internet ateways eun-hee ho and Young-ae Ko raduate School of Information & ommunication, jou University, Republic of Korea {khzho,
LOAD BALANCING AND EFFICIENT CLUSTERING FOR IMPROVING NETWORK PERFORMANCE IN AD-HOC NETWORKS
LOAD BALANCING AND EFFICIENT CLUSTERING FOR IMPROVING NETWORK PERFORMANCE IN AD-HOC NETWORKS Saranya.S 1, Menakambal.S 2 1 M.E., Embedded System Technologies, Nandha Engineering College (Autonomous), (India)
Performance Evaluation of Wired and Wireless Local Area Networks
International Journal of Engineering Research and Development ISSN: 2278-067X, Volume 1, Issue 11 (July 2012), PP.43-48 www.ijerd.com Performance Evaluation of Wired and Wireless Local Area Networks Prof.
Optimal Hole Coverage Using Hole Detection and Replacing Algorithm in Wireless Sensor Networks
Optimal Hole Coverage Using Hole Detection and Replacing Algorithm in Wireless Sensor Networks 1 D. Jewel, 2 P. Brundha, 3 D. C. Joy Winnie Wise 1,2,3 Department of CSE, Francis Xavier Engineering College
An Empirical Approach - Distributed Mobility Management for Target Tracking in MANETs
An Empirical Approach - Distributed Mobility Management for Target Tracking in MANETs G.Michael Assistant Professor, Department of CSE, Bharath University, Chennai, TN, India ABSTRACT: Mobility management
Dipak Wajgi Dept. of Computer Science and Engineering Ramdeobaba College of Engg. and Management Nagpur, India
Load Balancing Algorithms in Wireless Sensor Network : A Survey Dipak Wajgi Dept. of Computer Science and Engineering Ramdeobaba College of Engg. and Management Nagpur, India Dr. Nileshsingh V. Thakur
CROSS LAYER BASED MULTIPATH ROUTING FOR LOAD BALANCING
CHAPTER 6 CROSS LAYER BASED MULTIPATH ROUTING FOR LOAD BALANCING 6.1 INTRODUCTION The technical challenges in WMNs are load balancing, optimal routing, fairness, network auto-configuration and mobility
INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY
INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY A PATH FOR HORIZING YOUR INNOVATIVE WORK AN OVERVIEW OF MOBILE ADHOC NETWORK: INTRUSION DETECTION, TYPES OF ATTACKS AND
Preventing Resource Exhaustion Attacks in Ad Hoc Networks
Preventing Resource Exhaustion Attacks in Ad Hoc Networks Masao Tanabe and Masaki Aida NTT Information Sharing Platform Laboratories, NTT Corporation, 3-9-11, Midori-cho, Musashino-shi, Tokyo 180-8585
3-12 Autonomous Access Control among Nodes in Sensor Networks with Security Policies
3-12 Autonomous Access Control among Nodes in Sensor Networks with Security Policies This paper describes a new framework of policy control sensor networks. Sensor networks are shared by various applications,
QUALITY OF SERVICE METRICS FOR DATA TRANSMISSION IN MESH TOPOLOGIES
QUALITY OF SERVICE METRICS FOR DATA TRANSMISSION IN MESH TOPOLOGIES SWATHI NANDURI * ZAHOOR-UL-HUQ * Master of Technology, Associate Professor, G. Pulla Reddy Engineering College, G. Pulla Reddy Engineering
Load Balancing in Periodic Wireless Sensor Networks for Lifetime Maximisation
Load Balancing in Periodic Wireless Sensor Networks for Lifetime Maximisation Anthony Kleerekoper 2nd year PhD Multi-Service Networks 2011 The Energy Hole Problem Uniform distribution of motes Regular,
Internet Layer. Routing Tables. Routing in the Internet. Routing Protocols
Internet Layer Routing Tables estination ddress Next Hop Raw division into three tasks: ata transfer over a global network Route decision at the sub-nodes ontrol of the network or transmission status.7...../8
An Efficient Hybrid Data Gathering Scheme in Wireless Sensor Networks
An Efficient Hybrid Data Gathering Scheme in Wireless Sensor Networks Ayon Chakraborty 1, Swarup Kumar Mitra 2, and M.K. Naskar 3 1 Department of CSE, Jadavpur University, Kolkata, India 2 Department of
Research Article ISSN 2277 9140 Copyright by the authors - Licensee IJACIT- Under Creative Commons license 3.0
INTERNATIONAL JOURNAL OF ADVANCES IN COMPUTING AND INFORMATION TECHNOLOGY An international, online, open access, peer reviewed journal Volume 2 Issue 2 April 2013 Research Article ISSN 2277 9140 Copyright
Detecting Multiple Selfish Attack Nodes Using Replica Allocation in Cognitive Radio Ad-Hoc Networks
Detecting Multiple Selfish Attack Nodes Using Replica Allocation in Cognitive Radio Ad-Hoc Networks Kiruthiga S PG student, Coimbatore Institute of Engineering and Technology Anna University, Chennai,
An in-building multi-server cloud system based on shortest Path algorithm depending on the distance and measured Signal strength
IOSR Journal of Computer Engineering (IOSR-JCE) e-issn: 2278-0661,p-ISSN: 2278-8727, Volume 17, Issue 1, Ver. I (Jan Feb. 2015), PP 38-42 www.iosrjournals.org An in-building multi-server cloud system based
Fast and Secure Data Transmission by Using Hybrid Protocols in Mobile Ad Hoc Network
Middle-East Journal of Scientific Research 15 (9): 1290-1294, 2013 ISSN 1990-9233 IDOSI Publications, 2013 DOI: 10.5829/idosi.mejsr.2013.15.9.11514 Fast and Secure Data Transmission by Using Hybrid Protocols
Restricted and Mobile: Security in Mobile Wireless Sensor Networks Kısıtlı ve Hareketli: Mobil Telsiz Duyarga Ağlarında Güvenlik
Restricted and Mobile: Security in Mobile Wireless Sensor Networks Kısıtlı ve Hareketli: Mobil Telsiz Duyarga Ağlarında Güvenlik Albert Levi [email protected] Sabancı University Computer Science and
Securing MANET Using Diffie Hellman Digital Signature Scheme
Securing MANET Using Diffie Hellman Digital Signature Scheme Karamvir Singh 1, Harmanjot Singh 2 1 Research Scholar, ECE Department, Punjabi University, Patiala, Punjab, India 1 [email protected] 2
Design of Remote data acquisition system based on Internet of Things
, pp.32-36 http://dx.doi.org/10.14257/astl.214.79.07 Design of Remote data acquisition system based on Internet of Things NIU Ling Zhou Kou Normal University, Zhoukou 466001,China; [email protected]
Security Threats in Mobile Ad Hoc Networks
Security Threats in Mobile Ad Hoc Networks Hande Bakiler, Aysel Şafak Department of Electrical & Electronics Engineering Baskent University Ankara, Turkey [email protected], [email protected]
Dynamic and Adaptive Organization of Data-Collection Infrastructures in Sustainable Wireless Sensor Networks
928 Dynamic and Adaptive Organization of Data-Collection Infrastructures in Sustainable Wireless Sensor Networks Rui Teng, Shirazi N. Mehdad and Bing Zhang National institute of information and communications
Load Balanced Link Reversal Routing in Wireless Ad Hoc Networks
oad alanced ink Reversal Routing in Wireless d oc Networks Nabhendra isnik, lhussein bouzeid, ostas usch Rensselaer Polytechnic nstitute Troy, New York [email protected], [email protected], [email protected]
SECURITY KEY MANAGEMENT AND AUTHENTICATION SCHEME FOR WIRELESS SENSOR NETWORKS
SECURITY KEY MANAGEMENT AND AUTHENTICATION SCHEME FOR WIRELESS SENSOR NETWORKS S. Jayapraba 1 and A.F.Sheik Hakkani 2 1 Department of MCA, Jayam College of Engineering and Technology, Bharathiyar University,
A REVIEW: MOBILE AD-HOC NETWORK PROTOCOLS AND SECURITY ISSUES
A REVIEW: MOBILE AD-HOC NETWORK PROTOCOLS AND SECURITY ISSUES Ankit Mehto, Hitesh Gupta Department of Computer Science & Engineering, PIT, Bhopal, India ABSTRACT The instant growth of communication takes
Energy Effective Routing Protocol for Maximizing Network Lifetime of WSN
Energy Effective Routing Protocol for Maximizing Network Lifetime of WSN Rachana Ballal 1, S.Girish 2 4 th sem M.tech, Dept.of CS&E, Sahyadri College of Engineering and Management, Adyar, Mangalore, India
A Secure Data Transmission for Cluster based Wireless Sensor Network Using LEACH Protocol
A Secure Data Transmission for Cluster based Wireless Sensor Network Using LEACH Protocol Vinoda B Dibbad 1, C M Parameshwarappa 2 1 PG Student, Dept of CS&E, STJIT, Ranebennur, Karnataka, India 2 Professor,
Provide Practical Security Mechanism to Wireless Sensor Networks Using Modified Motesec Protocol
RESEARCH ARTICLE Provide Practical Security Mechanism to Wireless Sensor Networks Using Modified Motesec Protocol Monali Madne 1, Prof Manjusha Yeola 2 1(Computer Department, University of pune, Pune)
Simulation Analysis of Different Routing Protocols Using Directional Antenna in Qualnet 6.1
Simulation Analysis of Different Routing Protocols Using Directional Antenna in Qualnet 6.1 Ankit Jindal 1, Charanjeet Singh 2, Dharam Vir 3 PG Student [ECE], Dept. of ECE, DCR University of Science &
Guide for Performing a Wireless Site Survey. 2.4 GHz IEEE 802.11g/802.11b/802.15.4
Guide for Performing a Wireless Site Survey 2.4 GHz IEEE 802.11g/802.11b/802.15.4 1 Table of Contents Table of Contents 2 Introduction 3 Wireless Characteristics 3 AMX Site Survey Tools 5 Creating a Channel
RT-QoS for Wireless ad-hoc Networks of Embedded Systems
RT-QoS for Wireless ad-hoc Networks of Embedded Systems Marco accamo University of Illinois Urbana-hampaign 1 Outline Wireless RT-QoS: important MA attributes and faced challenges Some new ideas and results
Denial of Service in Sensor Networks
Denial of Service in Sensor Networks Authors : From: Anthony D. Wood John A. Stankovic University of Virginia Presented by: Luba Sakharuk Agenda for the DOS in Sensor Networks Abstract Theory and Application
On Game Theory for Load Balancing in Wireless Networks
On Game Theory for Load alancing in Wireless Networks Mehdi Kargar Nima Haghpanah and Mohammad Ghodsi epartment of Computer ngineering Sharif University of Technology, Tehran, Iran bstract We study the
Some Security Trends over Wireless Sensor Networks
Some Security Trends over Wireless Sensor Networks ZORAN BOJKOVIC, BOJAN BAKMAZ, MIODRAG BAKMAZ Faculty of Transport and Traffic Engineering University of Belgrade Vojvode Stepe 305 SERBIA Abstract: -
A Novel Approach for Load Balancing In Heterogeneous Cellular Network
A Novel Approach for Load Balancing In Heterogeneous Cellular Network Bittu Ann Mathew1, Sumy Joseph2 PG Scholar, Dept of Computer Science, Amal Jyothi College of Engineering, Kanjirappally, Kerala, India1
Reproduction of Load Balancing optimal Solution Using Multi Hop Wireless Sensor Networks
Reproduction of Load Balancing optimal Solution Using Multi Hop Wireless Sensor Networks P. Manoranjan Kumar*1, Mrs. S. Lakshmi Soujanya*2 M.Tech (CSE) Student Department of CSE, Priyadarshini Institute
An Efficient Energy-Aware Coverage- Preserving Hierarchical Routing Protocol for WSN
An Efficient Energy-Aware Coverage- Preserving Hierarchical Routing Protocol for WSN S.Taruna 1, Sakshi Shringi 2 1,2 Banasthali Vidyapith, Jaipur, Rajasthan, India ABSTRACT Wireless sensor networks (WSN)
Analysis of Denial-of-Service attacks on Wireless Sensor Networks Using Simulation
Analysis of Denial-of-Service attacks on Wireless Sensor Networks Using Simulation 1 Doddapaneni.krishna Chaitanya, 2 Ghosh.Arindam Middlesex University Abstract Evaluation of Wireless Sensor Networks
PEDAMACS: Power efficient and delay aware medium access protocol for sensor networks
PEDAMACS: Power efficient and delay aware medium access protocol for sensor networks Sinem Coleri and Pravin Varaiya Department of Electrical Engineering and Computer Science University of California,
Congestion Control in WSN using Cluster and Adaptive Load Balanced Routing Protocol
Congestion Control in WSN using Cluster and Adaptive Load Balanced Routing Protocol Monu Rani 1, Kiran Gupta 2, Arvind Sharma 3 1 M.Tech (Student), 2 Assistant Professor, 3 Assistant Professor Department
Quality of Service Routing Network and Performance Evaluation*
Quality of Service Routing Network and Performance Evaluation* Shen Lin, Cui Yong, Xu Ming-wei, and Xu Ke Department of Computer Science, Tsinghua University, Beijing, P.R.China, 100084 {shenlin, cy, xmw,
SECURE AND RELIABLE DATA TRANSMISSION IN WIRELESS SENSOR NETWORKS
SECURE AND RELIABLE DATA TRANSMISSION IN WIRELESS SENSOR NETWORKS Kokilavani.V Mother Teresa College Of Engineering And Technology,Pudhukottai Abstract Network security involves the authorization of access
Energy Efficient Load Balancing among Heterogeneous Nodes of Wireless Sensor Network
Energy Efficient Load Balancing among Heterogeneous Nodes of Wireless Sensor Network Chandrakant N Bangalore, India [email protected] Abstract Energy efficient load balancing in a Wireless Sensor
Design of Simple and Efficient Revocation List Distribution in Urban areas for VANET s
Design of Simple and Efficient Revocation List Distribution in Urban areas for VANET s Ghassan Samara, Sureswaran Ramadas National Advanced IPv6 Center, Universiti Sains Malaysia Penang, Malaysia [email protected],
Implementation of Energy Efficient Adaptive Load Balancing Algorithm by Rainbow Mechanism in Wireless Sensor Networks
Implementation of Energy Efficient Adaptive Load Balancing Algorithm by Rainbow Mechanism in Wireless Sensor Networks Gowthami.V.R, Divya Sharma M.Tech, Dept. of E&C. NHCE, VTU, Bengaluru India. Assistant
