Coverage Hole Detection in Wireless Sensor Networks
|
|
|
- Kristina Ross
- 10 years ago
- Views:
Transcription
1 Coverage Hole Detection in Wireless Sensor Networks Rakesh Kumar 1, Sakshi Dhingra 2 1, 2 Department of Computer Science and Engineering, Guru Jambheshwar University of Science & Technology, Hisar, Haryana, India Abstract: Wireless sensor network is the area where many researchers are focusing. The emerging technology of WSN is expected to provide a broad range of applications, such as battlefield surveillance, environmental monitoring and smart space and so on. Coverage is the important quality of service which is provided by the wireless sensor network. The coverage hole problem is a fundamental issue in WSN. This problem occurs when sensor nodes are arranged randomly in the area, poor installment or nodes whose.power weeks and when the design of the network fails. This paper address the work of hole detection and healing in mobile WSNs and how reduce the redundancy in WSNs by various authors. By knowing the above issue, a modified hole detection and healing method is proposed that could remove the redundant nodes and moving the nodes that removes holes by using distributed virtual force based approach in WSNs. Keywords: Wireless sensor network, Coverage hole, Hole healing 1. Introduction A wireless sensor network is a collection of small randomly dispersed autonomous sensors that are able to monitor physical and environmental conditions, in real time, such as temperature, pressure, light and humidity and to provide efficient, stable communications with the help of a wireless network. They cooperatively pass their data through the wireless network to a main location. Wireless sensor network made of the small low-cost sensing nodes which collect and disseminate environment data. Many problem are occurs in wireless sensor network. They may be form of various types of coverage hole detection problem [1]. The total coverage of the complete network is defined as the common coverage of all nodes sensing gradients. It shows that how properly each point in the sensing area is covered. A coverage hole refers to in a volume in 3-dimensional space or in a continuous space in the sensing area which is not covered by the any sensing nodes [2]. WSN are highly dynamic and susceptible to network failures, mainly because of the physically harsh environment. The WSN has reduced the installation cost. The WSN is built of "nodes" from a few to several hundreds or even thousands, where each node is connected to one (or sometimes several) sensors. WSNs are naturally self-organizing and self-healing. Characteristic of a WSN Easy to use. More energy efficient routing. 2. Coverage Hole Detection In an area when a group of sensing nodes does not work properly and not sensing the data and communication then it is a problem of hole in the network. The performance of the network are affected or degraded by the holes in the network [3]. Thus, the point of area coverage place an important role in sensor networks and there connectivity. Coverage is one of the important part or concern in WSN. It is used to evaluating or calculating the quality of service (QoS) in WSN [4]. So coverage can be explained or classified into three categories: Area Coverage Point Coverage Barrier Coverage The main aim of the area coverage is to maximize the coverage for a region of interest; point coverage covers a set of points and barrier coverage minimize the probability of an undetected penetration through a sensor network. The dynamic solutions to find out and optimize the coverage in sensor networks are [5]: Exposure Based Mobility Based Power utilization constrains for nodes using batteries or energy harvesting. Ability to cope with node failures. Mobility of nodes. Dynamic network topology Communication failures. Heterogeneity of nodes. Scalability to large scale of deployment. Ability to withstand incompatible environmental condition. Figure 1: Coverage and Connectivity [2] 2660
2 Exposure Based: It check out the unauthorized intrusion in the networks. It is a completely measure of how well the sensor network observe an object which is moving on a different path over a period of time. Mobility Based: To get the better coverage condition it accomplishment moving properties of nodes and for the maximum coverage it tries to relocate sensor nodes to optimal locations. There are four key elements that are critical for ensuring effective coverage in mobile WSNs: 1) Determining the boundary of the RoI. 2) Detecting Coverage Holes. 3) Determining the best target location to relocate mobile nodes to repair holes. 4) Minimizing the moving cost when dispatches mobile nodes to the target locations [6]. Coverage problem is a fundamental issue in WSN. This paper aims to address the work of hole detection and healing in WSNs. 3. Related Work Wireless sensor network have become large area of research. There have been a large number of researches on detection of coverage and remove redundancy in WSNs over the last few years. In this section some of the hole detection algorithms is analyzed and summarized. The substantial nodes are deployed randomly over the entire area; therefore, the sensing region of different nodes may be partially overlapped and this problem is known as the sensing coverage problem. So to remove this problem [7] defines a maximum sensing coverage region problem (MSCR) in WSN and used the algorithm to improve LEACH, a hierarchical protocol for WSN. They developed a simulation program to evaluate the performance of LEACH protocol using an algorithm. The experimental result shows that this method reduced total energy consumption in the whole system and increased significantly network lifetime. There is a problem of hole detection and healing in mobile WSNs. The main problems are determining the boundary of the ROI (Region of Interest), detecting coverage hole and estimating their characteristics, determining best target locations and dispatching mobile nodes to the target locations. So to addresses these all problem [8] propose a solution called the holes detection and healing (HEAL). It is distributed and localized algorithm that operate in two phases, first one is identifies the boundary nodes and discover holes and second one is treats the hole healing. The first phase is done by using a lightweight localized protocol over the Gabriel graph of the network and second phase is done with hole haling area. HEALS deals with holes of various forms and sizes, and facilitate a cost-effective and an accurate solution for hole detection and healing. Vinay Rana, Rani, Ravi [9] proposed a method to find the hole. They using the information generated about the network topology during route discovery and route maintenance. For detection of hole in network path, they used three algorithms, namely routing protocol, hole detection protocol and optimal hop count. They used the swarm intelligence based technique to remove excess burden on the network or for hole detection by using these algorithms between source node to base station. In WSN coverage problem is a major problem. In hybrid sensor networks, to enhance the area coverage mobility is exploited. The main objective for using mobile sensor nodes is to heal coverage holes when designing a hole healing algorithm. There are two issues related with this, first is to decide the existence and size of a coverage hole and second is to find the best location to relocate mobile nodes to repair coverage holes. So to remove this problem they use the triangular oriented diagram (HSTT). In this diagram they used circumcircle and incircle to achieve this. This diagram is simple for construction and has less calculation than Voronoi Diagram [10]. On the other hand Hwa-Chun Ma, Prasan Kumar Sahoo, Yen-Wen Chen [11] designed a computational geometry approach based distributed hole detection protocol to find out the coverage holes in area or dense forests. An efficient geometry method is used to detect the coverage holes where communication and sensing range of the nodes are same. They consider the two criteria to evaluate the performance of algorithms, first criteria is average hole detection time and second is average power consumption. The quality of service i.e. provided by a sensor network depends on its coverage area. Yang-Tsung Hou, Chia-Mei Chen, Bingchiang Jeng [12] used the placement algorithm for improving barrier coverage. They deploy new sensors in order to improve the coverage of an existing network. Best and worst case coverage problem are observability of a path. The algorithm adds new nodes to the shortest path, so that the support of the sensor network is reduced the most. Chi Zhang, Yanchao Zhang and Yuguang Fang [13] develop a deterministic method for boundary node detection. It is based on localized Voroni polygons, which originated from the computational geometry. It can be applied to any random deployed sensor network and require one hope neighbors information. It increased the scalability and energy efficiency of the detection algorithm. It provides a distributed protocol that allows each sensor node to identify them which is located on the coverage boundary. Wei Li [14] provide a novel graphic approach to describe coverage hole in WSN. It divided into two phases, namely, coverage hole detecting and coverage hole describing. This method indicates the location and configuration of coverage hole. It also indicates the vulnerable parts in holes. The graphical description of this method can serve as a useful tool for healing coverage hole. The simulation result this method predict the coverage holes, and graphic holes can be exploited to heal actual holes. The computational complexity of proposed method is, O (bn) where b indicates the nearby sensor in each node and n is the amount of sensor nodes in network. 2661
3 To detect and localize coverage holes in sensor networks they used the algebraic topological methods to define coverage hole, and develop provably correct algorithm to detect a hole and partition the network into smaller subnetworks and checking for holes in each. By repeating this process leads to localize the coverage holes. In simulation observed that all the nodes in these subnetworks are always at most one hope away from the shortest cycles bounding a coverage hole [15]. The presence of coverage holes in WSN is a major issue. Yao Sun, Chengdong Wu, Yunzhou Zhang, Nan Hu [16] present an algorithm based on centroid calculation to locate the position of the coverage holes and uses a graphical method to detect coverage holes, and discusses the research on route planning for Unmanned Aerial Vehicle (UAV). UAV is used to place the redeployment nodes. Chia-Pang Chen, Cheng-Long Chaung, Tzu-Shiang Lin, Chia-Yen Lee, Joe-Air Jiang et al. [17] proposed an novel hybrid genetic algorithm (HGADSC). It comprise of genetic operations and fitness-improving local search strategy. Both these strategy divide all wireless sensor node into a number of disjoint set covers (DSCs). The HGADSC is used to solve the NP-complete problem. It guaranteed the longer network lifetime by switching disjoint set covers. The result shows that the network lifetime can be effectively improve by the proposed method. The network lifetime ranging from 0.54% to 36.1% under different simulation scenarios by using this method. Move on wireless communication and Micro Electro Mechanical Systems (MEMS) have enabled the growth of low-cost, low-power, multi-functional, tiny sensor nodes which can sense the environment, perform data processing and communicate with each other untethered over short distances. Amitabha Ghosh, Sajal K. Das [18] used the one of the important criteria for being able to deploy an efficient sensor network is to find optimal node deployment strategies and efficient topology control techniques. Nodes can either be placed manually at predetermined locations or dropped from an aircraft. However, since the nodes are randomly scattered in most practical situation it is difficult to find a random deployment strategy that minimizes all the desirable metrics simultaneously, such as, sufficient coverage and connectivity, low-computation and communication overhead. WSN is the collection of the independent and distributed sensor. It has an additional functionality or capacity of mobility. Mobility adds additional functionality to the wireless sensor network by providing self deployment and relocation of sensors. Many approaches have been used for this by considering different issues. Main issue of deployment is Coverage and Connectivity. When deploy mobile sensor other issues are also come like sensor relocation, energy efficient movements of sensors, obstacle adaptability, lifetime of network, fault tolerance etc. So, Mayur C. Akewar, Nileshsingh V.Thakur [19] defined the different types of deployment techniques and algorithms with different ways of deployment. The approaches are virtual force based, movement assisted, computational geometry and pattern based approach. The given approach should self-deploy the sensor into a connected ad-hoc network that has the maximum coverage. Non-uniform random distribution and exhausted energy of sensor nodes may lead to coverage holes problem in wireless sensor networks. So, to solve this problem of coverage holes in wireless sensor networks Wang Qing-Sheng, Gaohao [20] a geometry-based distributed coverage holes discovery algorithm. This algorithm is forming a triangle by sensor node and its two neighbor nodes, calculating circumradius and circumcenter of the triangle. This two neighbor nodes also judging existence of coverage holes under the guidance of relevant knowledge of geometric graphics. For the experimental or practical purpose MATLAB platform is used. The result shows that this algorithm is better than others algorithms and give better or high accuracy than the others algorithms. The basic problem in Wireless Sensor Networks (WSNs) is the coverage problem. The coverage problem in WSNs causes the security environments is supervised by the existing sensors in the networks suitably. The coverage in WSNs is so important that it is one of the quality of service (QoS) parameters. If the sensors do not suitably cover the physical environments they will not be enough efficient n supervision and controlling. The other reasons which had increased the importance of the coverage problem are the topologic changes of the network. The changes are done by the damage or deletion of some of the sensors and in some cases the network must not lose its coverage. SO, Isa Maleki, Seyyed Reza Khaze, Marjan Mahmoodi Tabrizi, Ali Bagherinia [21] used the hybrid Particle Swarm Optimization (PSO) and Differential Evolution (DE) algorithms. These are the Meta-Heuristic algorithms and have analyzed the area coverage problem in WSNs. Also a PSO algorithm is implemented to compare the efficiency of the hybrid model in the same situation. The results of the experiments show that the hybrid algorithm has made more increase in the lifetime of the network and more optimized use of the energy of the sensors by optimizing the coverage of the sensors in comparison to PSO. Coverage is a major problem for wireless sensor networks (WSN) to examine a region of interest (ROI) and to provide a good quality of service. In many applications, full coverage is required, which means every point inside the region must be covered by at least one sensor node. The occurrence of hole is unavoidable in ROI due to the inner nature of WSN, random deployment, environmental factors, and external attacks. For ensuring successful coverage in WSNs the following key elements are critical: 1) Determining the boundary of the RoI, 2) Detecting Coverage holes, and 3) Determining the best target locations to relocate nodes to repair the holes. For maintaining the coverage quality of the given WSN, K.Kavitha, T.Thamarai Manalan, M.Suresh Kumar [22] proposed a low complexity distributed and localized algorithm (HEAL) to detect and heal the holes. This algorithm allows a local healing where only the nodes located at a proper distance from the hole will be involved in the healing process. For practical work 2662
4 NS2 tool is used. Performance results through ns 2 simulator shows that HEAL can handle holes of various forms and sizes and provides a cost-effective and an accurate solution for hole detection and healing. They also improve the Distributed Virtual Forces Algorithm (DVFA) to deal with obstacles. Performance results show that DVFA provides an efficient deployment even if obstacles present in the monitoring area. 4. Contribution In section 3 rd work done by various researchers in the field of coverage hole detection and remove redundancy is studied. A modified hole detection and healing method is proposed that could remove the redundant nodes and moving the nodes that removes holes by using distributed virtual force based approach in WSNs. This proposed method could remove the drawback of existing algorithms. Virtual force based deployment is a strategies that is used in solving coverage problem in WSN. It is a distributed, robust and scalable deployment strategy. It is depend or rely on the sensors mobility, using virtual repulsive and attractive forces. In this strategy, to achieved the full coverage the sensors nodes are force to move away or towards each other. Unlike the existing algorithm, proposed strategy does the simulation of the movement first and at the end of the process only one time physical movement of nodes is done. 5. Conclusions In this paper, a critical problem in Wireless Sensor Network that are detection of holes and redundancy remove in network is focused. Redundancy that waste lot of energy and more power consumption that makes network more expansive. The work done by the various authors are described in details. A related work to hole detection and remove redundancy in WSN is given or provided. To remove these drawbacks to make network more efficient and powerful, a modified hole detection and healing method is proposed that could remove the redundant nodes and moving the nodes that removes holes by using distributed virtual force based approach. Thus providing energy efficient and cost efficient hole detection and healing method with virtual force based strategy. References [1] Zhiping Kang, Honglin Yu, Qingyu Xiong, Detection and Recovery of Coverage Holes in Wireless Sensor Network, Journals of Networks, Vol. 8, No. 4, pp , April [2] Zhang Mingze, Coverage and Connectivity Management in Wireless Sensor Network, pp , [3] Samidha N.Kalwaghe and Atul V. Dusane, Literature Review on Hole Detection and Healing in Wireless Sensor Network, International Journal of Current Engineering and Technology, Vol. 4, No. 6, pp , Dec [4] Nor Azlina Ab. Aziz, Kamarulzaman Ab. Aziz, Wan Zakiah Wan Ismail, Coverage Strategies for Wireless Sensor Networks, World Academy of Science, Engg. And Technology 50, pp , [5] Meysam Argany, Mir Abolfazl Mostafavi, Farid Karimipour and Christin Gagne, A GIS based Wireless Sensor Network Coverage Estimation and Optimization: A Voronoi approach, Springer Science, pp , [6] Vaishnavi Sukumaran, T.P Saravanabava, Modified Sensor Deployment Algorithm for Hole Detection and Healing using NS2, International Journal of Engineering Research and Applications, ISSN: , Vol. 4, Issue 4, pp , April [7] Vinh Tran Quang, Takumi Miyoshi, An Algorithm for Sensing Coverage Problem in wirless sensor networks. [8] Mustapha Reda Senouci, Abdelhamid Mellouk and Khalid Assnoune, Localized Movement-Assisted Sensor Deployment Algorithm for Hole Detection And Healing, IEEE Transactions on Parallel and Distributed System, Vol. 25, No. 5, pp , May [9] Vinay Rana, Rani, Ravi, Coverage Hole Reduction in Wireless Sensor Networks using Swarm Technique, International Journal of Science and Research (IJSR), Vol. 3, Issue 6, pp , June [10] Shahram Babaie and Seyed Sajad Pirahesh, Hole Detection for Increasing Coverage in Wireless Sensor Network using Triangular Structure, International Journal of Computer Science Issue (IJCSI), Vol. 9, Issue 1, No 2, pp , January [11] Hwa-Chun Ma, Prasan Kumar Sahoo, Yen-Wen Chen, Computational Geometry Based Distributed Coverage Hole Detection Protocol For The Wireless Sensor Networks, Science Direct Journals of Network and Computer Application 34 pp , [12] Yang-Tsung Hou, Chia-Mei Chen, Bingchiang Jeng, An optimal new-node placement to enhance the coverage of wireless sensor networks, Springer Science LLC, pp , May [13] Chi Zhang, Yanchao Zhang and Yuguang Fang, Detecting Coverage Boundary Nodes in Wireless Sensor Networks, IEEE, pp , [14] Wei Li, A Novel Graphic Coverage Hole Description in Wireless Sensor Networks, IEEE Communication Letter, Vol. 18, No. 12, pp , December [15] Harish Chintakunta, Hamid Krim, Distributed Localization of Coverage Holes using Topological Persistence, IEEE Transactions on Signal Processing, Vol. 62. No. 10, pp , May 15, [16] Yao Sun, Chengdong Wu, Yunzhou Zhang, Nan Hu, Holes Detection in Wireless Sensor Networks and Redeploy Route Planning Based on Unmanned Aerial Vehicle, Journals of Information and Computational Science 9:13, pp , [17] Chia-Pang Chen, Cheng-Long Chaung, Tzu-Shiang Lin, Chia-Yen Lee, Joe-Air Jiang, A Coverage-guaranteed Algorithm to Improve Network lifetime of Wireless Sensor Networks, Science Direct Procedia Engg. 5, pp , [18] Amitabha Ghosh, Sajal K. Das, Coverage and connectivity issues in wireless sensor networks: A 2663
5 survey, Science Direct, Pervasive and Mobile Computing 4, pp , February [19] Mayur C. Akewar, Nileshsingh V.Thakur, A Study of Wireless Mobile Sensor Network Deployment, IRACST International Journal of Computer Networks and Wireless Communications (IJCNWC), Vol.2, No 4, pp , August [20] Wang Qing-Sheng, Gaohao, Coverage Holes Discovery Algorithm for Wireless Sensor Network, Journal of Theoretical and Applied Information Technology, Vol. 48, No.2, pp , February [21] Isa Maleki, Seyyed Reza Khaze, Marjan Mahmoodi Tabrizi, Ali Bagherinia, A New Approach for Area Coverage Problem in Wireless Sensor Networks with Hybrid Particle Swarm Optimization and Differential Evolution Algorithms, International Journal of Mobile Network Communications & Telematics (IJMNCT) Vol. 3, No.6, pp , December [22] K.Kavitha, T.Thamarai Manalan, M.Suresh Kumar, An Optimized Heal Algorithm for Hole Detection and Healing in Wireless Sensor Networks, International Journal of Advanced Engineering Research and Technology (IJAERT) Volume 2 Issue 7, pp , October
Keywords coverage holes, energy efficient, hole detection, hole healing
Volume 5, Issue 5, May 2015 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Hole Detection and
Modified Sensor Deployment Algorithm for Hole Detection and Healing using NS2
RESEARCH ARTICLE OPEN ACCESS Modified Sensor Deployment Algorithm for Hole Detection and Healing using NS2 Vaishnavi Sukumaran, T.P. Saravanabava M.E, College Of Engineering, Guindy, Chennai, India, 2014
EBHEAL: Distributed and Localized Mechanism for Coverage Hole Detection and Healing
www.ijecs.in International Journal Of Engineering And Computer Science ISSN:39-74 Volume 4 Issue 7 July 05, Page No. 3457-346 EBHEAL: Distributed and Localized Mechanism for Coverage Hole Detection and
Optimal Hole Coverage Using Hole Detection and Replacing Algorithm in Wireless Sensor Networks
Optimal Hole Coverage Using Hole Detection and Replacing Algorithm in Wireless Sensor Networks 1 D. Jewel, 2 P. Brundha, 3 D. C. Joy Winnie Wise 1,2,3 Department of CSE, Francis Xavier Engineering College
A Routing Algorithm Designed for Wireless Sensor Networks: Balanced Load-Latency Convergecast Tree with Dynamic Modification
A Routing Algorithm Designed for Wireless Sensor Networks: Balanced Load-Latency Convergecast Tree with Dynamic Modification Sheng-Cong Hu [email protected] Jen-Hou Liu [email protected] Min-Sheng
Wireless Sensor Network Security. Seth A. Hellbusch CMPE 257
Wireless Sensor Network Security Seth A. Hellbusch CMPE 257 Wireless Sensor Networks (WSN) 2 The main characteristics of a WSN include: Power consumption constrains for nodes using batteries or energy
Minimum-Hop Load-Balancing Graph Routing Algorithm for Wireless HART
Minimum-Hop Load-Balancing Graph Routing Algorithm for Wireless HART Abdul Aziz Memon and Seung Ho Hong Abstract In this paper load-balancing routing algorithm for WirelessHART standard is proposed. WirelessHART
Load-Balancing Enhancement by a Mobile Data Collector in Wireless Sensor Networks
Load-Balancing Enhancement by a Mobile Data Collector in Wireless Sensor Networks Ahmad Patooghy Department of Computer Engineering Iran University of Science & Technology Tehran, Iran [email protected]
LOAD BALANCING AND EFFICIENT CLUSTERING FOR IMPROVING NETWORK PERFORMANCE IN AD-HOC NETWORKS
LOAD BALANCING AND EFFICIENT CLUSTERING FOR IMPROVING NETWORK PERFORMANCE IN AD-HOC NETWORKS Saranya.S 1, Menakambal.S 2 1 M.E., Embedded System Technologies, Nandha Engineering College (Autonomous), (India)
Dipak Wajgi Dept. of Computer Science and Engineering Ramdeobaba College of Engg. and Management Nagpur, India
Load Balancing Algorithms in Wireless Sensor Network : A Survey Dipak Wajgi Dept. of Computer Science and Engineering Ramdeobaba College of Engg. and Management Nagpur, India Dr. Nileshsingh V. Thakur
Design and Performance Analysis of Building Monitoring System with Wireless Sensor Networks
Design and Performance Analysis of Building Monitoring System with Wireless Sensor Networks Mohammed A. Abdala & Alaa Mohammed Salih Department of Networks, College of Information Engineering, University
AN EFFICIENT STRATEGY OF AGGREGATE SECURE DATA TRANSMISSION
INTERNATIONAL JOURNAL OF REVIEWS ON RECENT ELECTRONICS AND COMPUTER SCIENCE AN EFFICIENT STRATEGY OF AGGREGATE SECURE DATA TRANSMISSION K.Anusha 1, K.Sudha 2 1 M.Tech Student, Dept of CSE, Aurora's Technological
A Secure Data Transmission for Cluster based Wireless Sensor Network Using LEACH Protocol
A Secure Data Transmission for Cluster based Wireless Sensor Network Using LEACH Protocol Vinoda B Dibbad 1, C M Parameshwarappa 2 1 PG Student, Dept of CS&E, STJIT, Ranebennur, Karnataka, India 2 Professor,
Hybrid Energy Efficient Distributed Protocol for Heterogeneous Wireless Sensor Network
International Journal of Computer Applications (975 8887) Volume 4 No.6, July 21 Hybrid Energy Efficient Distributed Protocol for Heterogeneous Wireless Sensor Network Harneet Kour Department of Computer
ISSN: 2321-7782 (Online) Volume 2, Issue 2, February 2014 International Journal of Advance Research in Computer Science and Management Studies
ISSN: 2321-7782 (Online) Volume 2, Issue 2, February 2014 International Journal of Advance Research in Computer Science and Management Studies Research Article / Paper / Case Study Available online at:
QUALITY OF SERVICE METRICS FOR DATA TRANSMISSION IN MESH TOPOLOGIES
QUALITY OF SERVICE METRICS FOR DATA TRANSMISSION IN MESH TOPOLOGIES SWATHI NANDURI * ZAHOOR-UL-HUQ * Master of Technology, Associate Professor, G. Pulla Reddy Engineering College, G. Pulla Reddy Engineering
DESIGN AND DEVELOPMENT OF LOAD SHARING MULTIPATH ROUTING PROTCOL FOR MOBILE AD HOC NETWORKS
DESIGN AND DEVELOPMENT OF LOAD SHARING MULTIPATH ROUTING PROTCOL FOR MOBILE AD HOC NETWORKS K.V. Narayanaswamy 1, C.H. Subbarao 2 1 Professor, Head Division of TLL, MSRUAS, Bangalore, INDIA, 2 Associate
Congestion Control in WSN using Cluster and Adaptive Load Balanced Routing Protocol
Congestion Control in WSN using Cluster and Adaptive Load Balanced Routing Protocol Monu Rani 1, Kiran Gupta 2, Arvind Sharma 3 1 M.Tech (Student), 2 Assistant Professor, 3 Assistant Professor Department
Hybrid Node Deployment Algorithm to Mitigate the Coverage Whole Problem in Wireless Sensor Network
Middle-East Journal of Scientific Research 23 (10): 2500-2506, 2015 ISSN 1990-9233 IDOSI Publications, 2015 DOI: 10.5829/idosi.mejsr.2015.23.10.02 Hybrid Node Deployment Algorim to Mitigate e Coverage
A Security Architecture for. Wireless Sensor Networks Environmental
Contemporary Engineering Sciences, Vol. 7, 2014, no. 15, 737-742 HIKARI Ltd, www.m-hikari.com http://dx.doi.org/10.12988/ces.2014.4683 A Security Architecture for Wireless Sensor Networks Environmental
International Journal of Emerging Technologies in Computational and Applied Sciences (IJETCAS) www.iasir.net
International Association of Scientific Innovation and Research (IASIR) (An Association Unifying the Sciences, Engineering, and Applied Research) International Journal of Emerging Technologies in Computational
Detecting Multiple Selfish Attack Nodes Using Replica Allocation in Cognitive Radio Ad-Hoc Networks
Detecting Multiple Selfish Attack Nodes Using Replica Allocation in Cognitive Radio Ad-Hoc Networks Kiruthiga S PG student, Coimbatore Institute of Engineering and Technology Anna University, Chennai,
Hole Detection and Healing Using Heal Algorithm
Hole Detection and Healing Using Heal Algorithm Divya K Suku, Phini Ann Philip Pursuing M.Tech, Department of ECE, CAARMEL Engineering College, Pathanamthitta, Kerala, India Assistant Professor, Department
ENHANCED GREEN FIREWALL FOR EFFICIENT DETECTION AND PREVENTION OF MOBILE INTRUDER USING GREYLISTING METHOD
ENHANCED GREEN FIREWALL FOR EFFICIENT DETECTION AND PREVENTION OF MOBILE INTRUDER USING GREYLISTING METHOD G.Pradeep Kumar 1, R.Chakkaravarthy 2, S.Arun kishorre 3, L.S.Sathiyamurthy 4 1- Assistant Professor,
Preventing DDOS attack in Mobile Ad-hoc Network using a Secure Intrusion Detection System
Preventing DDOS attack in Mobile Ad-hoc Network using a Secure Intrusion Detection System Shams Fathima M.Tech,Department of Computer Science Kakatiya Institute of Technology & Science, Warangal,India
Wireless Sensor Network: Challenges, Issues and Research
ISBN 978-93-84468-20-0 Proceedings of 2015 International Conference on Future Computational Technologies (ICFCT'2015) Singapore, March 29-30, 2015, pp. 224-228 Wireless Sensor Network: Challenges, Issues
Some Security Trends over Wireless Sensor Networks
Some Security Trends over Wireless Sensor Networks ZORAN BOJKOVIC, BOJAN BAKMAZ, MIODRAG BAKMAZ Faculty of Transport and Traffic Engineering University of Belgrade Vojvode Stepe 305 SERBIA Abstract: -
Proposition of a new approach to adapt SIP protocol to Ad hoc Networks
, pp.133-148 http://dx.doi.org/10.14257/ijseia.2014.8.7,11 Proposition of a new approach to adapt SIP protocol to Ad hoc Networks I. Mourtaji, M. Bouhorma, M. Benahmed and A. Bouhdir Computer and Communication
Remote Home Security System Based on Wireless Sensor Network Using NS2
Remote Home Security System Based on Wireless Sensor Network Using NS2 #Rajesh Banala 1, Asst.Professor,E-mail: [email protected] #D.Upender 2, Asst.Professor, E mail: [email protected] #Department
International Journal of Advancements in Research & Technology, Volume 3, Issue 4, April-2014 55 ISSN 2278-7763
International Journal of Advancements in Research & Technology, Volume 3, Issue 4, April-2014 55 Management of Wireless sensor networks using cloud technology Dipankar Mishra, Department of Electronics,
Vulnerabilities of Intrusion Detection Systems in Mobile Ad-hoc Networks - The routing problem
Vulnerabilities of Intrusion Detection Systems in Mobile Ad-hoc Networks - The routing problem Ernesto Jiménez Caballero Helsinki University of Technology [email protected] Abstract intrusion detection
Robust Security Solution to Countermeasure of Malicious Nodes for the Security of MANET
Robust Security Solution to Countermeasure of Malicious Nodes for the Security of MANET Kritika Sharma M.tech(CSE) Doon Valley Insttitute of Enggineering & Technology, Karnal Parikshit Singla Assistant
Topology Control and Mobility Strategy for UAV Ad-hoc Networks: A Survey
Topology Control and Mobility Strategy for UAV Ad-hoc Networks: A Survey Zhongliang Zhao, Torsten Braun Institute of Computer Science and Applied Mathematics, University of Bern Neubrückstrasse 10, 3012
Service Management in Wireless Sensors Network
Service Management in Wireless Sensors Network Linnyer Beatrys Ruiz 1,, Thais Regina M. Braga 1, Fabrício A. Silva 1 José Marcos S. Nogueira 1, Antônio Alfredo F. Loureiro 1 1 Department of Computer Science
INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY
INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY A PATH FOR HORIZING YOUR INNOVATIVE WORK AN OVERVIEW OF MOBILE ADHOC NETWORK: INTRUSION DETECTION, TYPES OF ATTACKS AND
CHAPTER 8 CONCLUSION AND FUTURE ENHANCEMENTS
137 CHAPTER 8 CONCLUSION AND FUTURE ENHANCEMENTS 8.1 CONCLUSION In this thesis, efficient schemes have been designed and analyzed to control congestion and distribute the load in the routing process of
Self-Organization in Autonomous Sensor/Actuator Networks [SelfOrg]
Self-Organization in Autonomous Sensor/Actuator Networks [SelfOrg] Dr.-Ing. Falko Dressler Computer Networks and Communication Systems Department of Computer Sciences University of Erlangen-Nürnberg http://www7.informatik.uni-erlangen.de/~dressler/
Keywords Wireless Sensor Network (WSN), Low Energy adaptive Clustering Hierarchy (LEACH), Cuckoo Search, Cluster Head (CH), Base Station (BS).
Volume 4, Issue 11, November 2014 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Relative Analysis
Ad hoc and Sensor Networks Chapter 1: Motivation & Applications
Ad hoc and Sensor Networks Chapter 1: Motivation & Applications Holger Karl Computer Networks Group Universität Paderborn Goals of this chapter Give an understanding what ad hoc & sensor networks are good
A NOVEL OVERLAY IDS FOR WIRELESS SENSOR NETWORKS
A NOVEL OVERLAY IDS FOR WIRELESS SENSOR NETWORKS Sumanta Saha, Md. Safiqul Islam, Md. Sakhawat Hossen School of Information and Communication Technology The Royal Institute of Technology (KTH) Stockholm,
SCHEDULING IN CLOUD COMPUTING
SCHEDULING IN CLOUD COMPUTING Lipsa Tripathy, Rasmi Ranjan Patra CSA,CPGS,OUAT,Bhubaneswar,Odisha Abstract Cloud computing is an emerging technology. It process huge amount of data so scheduling mechanism
Energy Efficient Load Balancing among Heterogeneous Nodes of Wireless Sensor Network
Energy Efficient Load Balancing among Heterogeneous Nodes of Wireless Sensor Network Chandrakant N Bangalore, India [email protected] Abstract Energy efficient load balancing in a Wireless Sensor
Access Control And Intrusion Detection For Security In Wireless Sensor Network
Access Control And Intrusion Detection For Security In Wireless Sensor Network Sushma J. Gaurkar, Piyush K.Ingole Abstract: In wireless sensor networks (WSN), security access is one of the key component.
An Empirical Approach - Distributed Mobility Management for Target Tracking in MANETs
An Empirical Approach - Distributed Mobility Management for Target Tracking in MANETs G.Michael Assistant Professor, Department of CSE, Bharath University, Chennai, TN, India ABSTRACT: Mobility management
Figure 1. The Example of ZigBee AODV Algorithm
TELKOMNIKA Indonesian Journal of Electrical Engineering Vol.12, No.2, February 2014, pp. 1528 ~ 1535 DOI: http://dx.doi.org/10.11591/telkomnika.v12i2.3576 1528 Improving ZigBee AODV Mesh Routing Algorithm
A Mobility Tolerant Cluster Management Protocol with Dynamic Surrogate Cluster-heads for A Large Ad Hoc Network
A Mobility Tolerant Cluster Management Protocol with Dynamic Surrogate Cluster-heads for A Large Ad Hoc Network Parama Bhaumik 1, Somprokash Bandyopadhyay 2 1 Dept. of Information Technology, Jadavpur
A RFID Data-Cleaning Algorithm Based on Communication Information among RFID Readers
, pp.155-164 http://dx.doi.org/10.14257/ijunesst.2015.8.1.14 A RFID Data-Cleaning Algorithm Based on Communication Information among RFID Readers Yunhua Gu, Bao Gao, Jin Wang, Mingshu Yin and Junyong Zhang
Manjeet Kaur Bhullar, Kiranbir Kaur Department of CSE, GNDU, Amritsar, Punjab, India
Volume 5, Issue 6, June 2015 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Multiple Pheromone
Optimization Problems in Infrastructure Security
Evangelos Kranakis, School of Computer Science, Carleton University, Ottawa 1 Optimization Problems in Infrastructure Security Evangelos Kranakis Carleton University School of Computer Science Ottawa,
CROSS LAYER BASED MULTIPATH ROUTING FOR LOAD BALANCING
CHAPTER 6 CROSS LAYER BASED MULTIPATH ROUTING FOR LOAD BALANCING 6.1 INTRODUCTION The technical challenges in WMNs are load balancing, optimal routing, fairness, network auto-configuration and mobility
Security for Ad Hoc Networks. Hang Zhao
Security for Ad Hoc Networks Hang Zhao 1 Ad Hoc Networks Ad hoc -- a Latin phrase which means "for this [purpose]". An autonomous system of mobile hosts connected by wireless links, often called Mobile
Energy Effective Routing Protocol for Maximizing Network Lifetime of WSN
Energy Effective Routing Protocol for Maximizing Network Lifetime of WSN Rachana Ballal 1, S.Girish 2 4 th sem M.tech, Dept.of CS&E, Sahyadri College of Engineering and Management, Adyar, Mangalore, India
TRUST MANAGEMENT SCHEMES FOR INTRUSION DETECTION SYSTEMS -A SURVEY
TRUST MANAGEMENT SCHEMES FOR INTRUSION DETECTION SYSTEMS -A SURVEY 1 DEEPA S, 2 SUPRIYA M 1,2 Department of Computer Science and Engineering, Amrita School of Engineering, Amrita Vishwa Vidyapeetham, Bangalore,
A STUDY ON SECURE DATA TRANSMISSION IN CLUSTER BASED WIRELESS SENSOR NETWORKS
A STUDY ON SECURE DATA TRANSMISSION IN CLUSTER BASED WIRELESS SENSOR NETWORKS C.Priya, M.Phil Scholar, Department Of Computer Science, Dr. R.A.N.M. Arts & Science College, Erode, Tamilnadu, India. M.Suriya,
A Novel Distributed Algorithm for Complete Targets Coverage in Energy Harvesting Wireless Sensor Networks
A Novel Distributed Algorithm for Complete Targets Coverage in Energy Harvesting Wireless Sensor Networks Changlin Yang School of Electrical, Computer and Telecommunications Engineering University of Wollongong
Wireless Sensor Networks Coverage Optimization based on Improved AFSA Algorithm
, pp. 99-108 http://dx.doi.org/10.1457/ijfgcn.015.8.1.11 Wireless Sensor Networks Coverage Optimization based on Improved AFSA Algorithm Wang DaWei and Wang Changliang Zhejiang Industry Polytechnic College
International Journal of Advanced Research in Computer Science and Software Engineering
Volume 2, Issue 9, September 2012 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com An Experimental
SPY AGENT BASED SECURE DATA AGGREGATION IN WSN
ISSN: 2229-6948(ONLINE) ICTACT JOURNAL ON COMMUNICATION TECHNOLOGY, DECEMBER 214, VOLUME: 5, ISSUE: 4 SPY AGENT BASED SECURE DATA AGGREGATION IN WSN T. Lathies Bhasker 1 and G. Arul Jagan 2 1 Department
Protocols and Architectures for Wireless Sensor Netwoks. by Holger Karl and Andreas Willig
Protocols and Architectures for Wireless Sensor Netwoks by Holger Karl and Andreas Willig Grade Midterm Exam. 25% Exercises 35% (5 ~ 7 times) Term Project 30% Class Attitude 10% 2 Ad hoc and Sensor Networks
Comparison of WCA with AODV and WCA with ACO using clustering algorithm
Comparison of WCA with AODV and WCA with ACO using clustering algorithm Deepthi Hudedagaddi, Pallavi Ravishankar, Rakesh T M, Shashikanth Dengi ABSTRACT The rapidly changing topology of Mobile Ad hoc networks
A Graph-Center-Based Scheme for Energy-Efficient Data Collection in Wireless Sensor Networks
A Graph-Center-Based Scheme for Energy-Efficient Data Collection in Wireless Sensor Networks Dajin Wang Department of Computer Science Montclair State University, Upper Montclair, NJ 07043, USA [email protected]
Study And Comparison Of Mobile Ad-Hoc Networks Using Ant Colony Optimization
Study And Comparison Of Mobile Ad-Hoc Networks Using Ant Colony Optimization 1 Neha Ujala Tirkey, 2 Navendu Nitin, 3 Neelesh Agrawal, 4 Arvind Kumar Jaiswal 1 M. Tech student, 2&3 Assistant Professor,
Restricted and Mobile: Security in Mobile Wireless Sensor Networks Kısıtlı ve Hareketli: Mobil Telsiz Duyarga Ağlarında Güvenlik
Restricted and Mobile: Security in Mobile Wireless Sensor Networks Kısıtlı ve Hareketli: Mobil Telsiz Duyarga Ağlarında Güvenlik Albert Levi [email protected] Sabancı University Computer Science and
An Efficient Hybrid Data Gathering Scheme in Wireless Sensor Networks
An Efficient Hybrid Data Gathering Scheme in Wireless Sensor Networks Ayon Chakraborty 1, Swarup Kumar Mitra 2, and M.K. Naskar 3 1 Department of CSE, Jadavpur University, Kolkata, India 2 Department of
Applying Mesh Networking to Wireless Lighting Control
White Paper Applying Mesh Networking to Wireless Lighting Control www.daintree.net Abstract Recent advances in wireless communications standards and energy-efficient lighting equipment have made it possible
Load Balancing Routing Algorithm for Data Gathering Sensor Network
Load Balancing Routing Algorithm for Data Gathering Sensor Network Evgeny Bakin, Grigory Evseev State University of Aerospace Instrumentation Saint-Petersburg, Russia {jenyb, egs}@vu.spb.ru Denis Dorum
Node Degree based Clustering for WSN
Node Degree based Clustering for WSN Sanjeev Kumar Gupta Dept. of Electronics & Comm. SCOPE College of Engineering,NH-12, Hoshangabad Road, Bhopal (INDIA) Neeraj Jain Dept. of Computer Science SCOPE College
CHAPTER 1 INTRODUCTION
21 CHAPTER 1 INTRODUCTION 1.1 PREAMBLE Wireless ad-hoc network is an autonomous system of wireless nodes connected by wireless links. Wireless ad-hoc network provides a communication over the shared wireless
Coverage-Hole Trap Model in Target Tracking using Distributed Relay-Robot Network
Coverage-Hole Trap Model in Target Tracking using Distributed Relay-Robot Network Huawei Miao, Chia Ching Ooi, Xiaowen Wu, and Christian Schindelhauer Computer Networks and Telematics, Department of Computer
SECURE DATA TRANSMISSION USING INDISCRIMINATE DATA PATHS FOR STAGNANT DESTINATION IN MANET
SECURE DATA TRANSMISSION USING INDISCRIMINATE DATA PATHS FOR STAGNANT DESTINATION IN MANET MR. ARVIND P. PANDE 1, PROF. UTTAM A. PATIL 2, PROF. B.S PATIL 3 Dept. Of Electronics Textile and Engineering
Bandwidth Management Framework for Multicasting in Wireless Mesh Networks
Bandwidth Management Framework for Multicasting in Wireless Mesh Networks Manaswi Saha and P. Venkata Krishna Abstract Wireless mesh networks (WMNs) provide a reliable and a scalable solution for multicasting.
An Efficient Energy-Aware Coverage- Preserving Hierarchical Routing Protocol for WSN
An Efficient Energy-Aware Coverage- Preserving Hierarchical Routing Protocol for WSN S.Taruna 1, Sakshi Shringi 2 1,2 Banasthali Vidyapith, Jaipur, Rajasthan, India ABSTRACT Wireless sensor networks (WSN)
Load-balancing Approach for AOMDV in Ad-hoc Networks R. Vinod Kumar, Dr.R.S.D.Wahida Banu
Load-balancing Approach for AOMDV in Ad-hoc Networks R. Vinod Kumar, Dr.R.S.D.Wahida Banu AP/ECE HOD/ECE Sona College of Technology, GCE, Salem. Salem. ABSTRACT Routing protocol is a challenging issue
IEQGOR to Increase the Quality of Service in Wireless Sensor Network
IEQGOR to Increase the Quality of Service in Wireless Sensor Network K.Mythilipriya 1, B.Arunkumar 2 III M.E., Dept of CSE, Karpagam University, Coimbatore, India 1 Assistant Professor, Dept of CSE, Karpagam
Performance Analysis of Modified AODV Protocol in Context of Denial of Service (Dos) Attack in Wireless Sensor Networks
Performance Analysis of Modified Protocol in Context of Denial of Service (Dos) Attack in Wireless Sensor Networks Ms. Shagun Chaudhary 1, Mr. Prashant Thanvi 2 1 Asst. Professor,Dept. of ECE, JIET School
Survey on Load balancing protocols in MANET S (mobile ad-hoc networks)
Survey on Load balancing protocols in MANET S (mobile ad-hoc networks) Ramandeep Kaur 1, Gagandeep Singh 2, Sahil Vashist 3 1 M.tech Research Scholar, Department of Computer Science & Engineering, Chandigarh
Performance Evaluation of AODV, OLSR Routing Protocol in VOIP Over Ad Hoc
(International Journal of Computer Science & Management Studies) Vol. 17, Issue 01 Performance Evaluation of AODV, OLSR Routing Protocol in VOIP Over Ad Hoc Dr. Khalid Hamid Bilal Khartoum, Sudan [email protected]
Survey on different attacks in Wireless Sensor Networks and their prevention system
Survey on different attacks in Wireless Sensor Networks and their prevention system Ruchita Dhulkar, Ajit Pokharkar, Mrs. Rohini Pise 1 BE IT, Department of Information Technology, PCCOE, Maharashtra,
A Novel Pathway for Portability of Networks and Handing-on between Networks
A Novel Pathway for Portability of Networks and Handing-on between Networks D. S. Dayana #1, S. R. Surya #2 Department of Computer Applications, SRM University, Chennai, India 1 [email protected]
