Hole Detection and Healing Using Heal Algorithm
|
|
|
- Clemence Eaton
- 9 years ago
- Views:
Transcription
1 Hole Detection and Healing Using Heal Algorithm Divya K Suku, Phini Ann Philip Pursuing M.Tech, Department of ECE, CAARMEL Engineering College, Pathanamthitta, Kerala, India Assistant Professor, Department of ECE, CAARMEL Engineering College, Pathanamthitta, Kerala, India ABSTRACT: Wireless Sensor Networks is one of the fast growing technologies in the present scenario. Here we monitor a specified region of interest (RoI). The hole in the region of interest is due to random deployment, environmental factors and external attack. Several anomalies are present in WSNs, one such problem is hole. The formation of hole in a WSN is unavoidable due to the inner nature of the networks. HEAL deals with holes of various forms and sizes and provides a cost-effective and an accurate solution for hole detection and healing. This paper deals with detecting and healing such holes in an on demand basis. KEYWORDS: Wireless sensor network, hole detection, hole healing, coverage I. INTRODUCTION The Wireless Sensor Networks(WSN) is created with tiny nodes and these tiny sensor nodes is capable of sensing some limited data processing and communicating with each other. These tiny sensor nodes are deployed in the target field in large numbers and they collaborate to form an adhoc network capable of reporting the phenomenon to a data collection point called sink or base station. Several anomalies can occur in WSNs that damages the desired functionalities resulting in the formation of different kinds of holes such as; coverage holes, routing holes, jamming holes and worm holes. In this work we are interested in large bounded holes and they are circumscribed by sensor nodes. One of the fundamental services provided by a WSN is the monitoring of a specified region of interest (RoI), where the main duty is sensing the environment and communicating the information to the sink. Assuring that the RoI is completely covered at all time is very important [2]. However, the emergence of holes in the RoI is unavoidable due to the inner nature of WSNs, random deployment, environmental factors, and external attacks. Thus, an event occurring within these holes is neither detected nor reported and therefore, the main task of the network will not be completed. Thus, we provide a self-organizing mechanism to detect and recover holes. Some of the major reason for node destruction and hole creation are: Power depletion Physical destruction Existence of obstacles Lower density regions Unlike existing algorithms, our algorithm relocates only the adequate nodes within the shortest times with the lowest cost. WSN are deployed in hostile environment and the hole formation is due to, a group of sensor nodes fails to carry out the network operations. This paper seeks the problem of hole detection and healing in an on demand basis. II. RELATED WORK There has been much related work done on this topic. In this section we highlight the work done in order to detect holes inside the networks.. I.Khan et al. [2] give a detail description of work done for boundary recognition and hole detection in wireless sensor networks. Fang et al. [4] detects holes inside the network by assuming that nodes are Copyright to IJIRCCE DOI: /IJIRCCE
2 equipped with location awareness devices. The algorithms [10, 26, 27, 28, 29, 30, 35] under this category, use the connectivity information of sensor nodes to detect the boundary of the sensor networks and detect holes inside the wireless sensor network. The algorithms [31, 32, 33] proposed under this category identify the nodes, as either inner or boundary nodes, by assuming that the node distribution in the network follows some statistical functions. Ghrist and Muhammad [4] employed a central control algorithm that requires connectivity information for all nodes in the RoI. In [5], the complexity does not depend on the overall size of the network, whereas the homology algorithm encounters severe difficulties with dense networks. Additionally, the message forwarding overhead can be impractically large, since the algorithm is centralized. Funke in [6] presented a heuristic for detecting holes based on the topology of the communication graph. The heuristic computation is not localized as it requires the computation of distance field over the whole network. In a more recent paper [7], Funke and Klein described a linear-time algorithm for hole detection. They require that the communication graph follows the unit disk graph model. Compared to the heuristic approach presented in [6], the algorithm does slightly worse. Furthermore, when decreasing the node density, the algorithm breaks down more and more.wang et al. [16] proposed three different deployment protocols that relocate mobile sensors once coverage holes are detected using Voronoi diagrams. In [14], the authors proposed a scheme called Co-Fi that relocates mobile nodes to replace low energy nodes. Authors in [15] developed three hole-movement strategies for moving an existing big hole in a way that either the total energy consumption is minimized or the power consumption of sensors is balanced. The incompleteness of previous work motivates our research presented here. Our proposed hole and border detection algorithm is distributed and lightweight, and thus more suited to the energy constrained WSNs. It does not require flooding for gathering the topology information, as is the case in [10] or synchronization among nodes. III. PROPOSED SYSTEM In our algorithm we propose a mechanism to detect and heal holes. Our hole detection mechanism deals with holes of various forms and sizes. We try to alert a limited number of nodes surrounding the hole, only those nodes have the task of moving and repairing the hole. When designing a hole healing algorithm, the following issues need to be addressed: 1) How to detect a hole and how to estimate its size? 2) Where are the best target locations to relocate mobile nodes to repair coverage holes? 3) How to dispatch mobile nodes to the target locations while minimizing the moving and messaging cost? Fig1: holes in a sensor network Our DHD algorithm allows us to discover the holes, to compute their characteristics and to discover the boundary network. In a second phase, HEAL performs a local healing where only the nodes located at an appropriate distance from the hole will be involved in the healing process. If every point in that target area is covered by at least k sensors, Copyright to IJIRCCE DOI: /IJIRCCE
3 where k is the required degree of coverage for a particular application (see Fig. 1). It is pertinent to mention that the coverage hole problem defined is dependent on application requirements. Some applications may require a higher degree of coverage of a given target area for fault tolerance using triangulation-based positioning protocols [7] or trilateration based localization [8]. Fig 2: healing process We defined an attractive force that acts from the hole center and attracts the nodes towards the hole center. At the same time, a repulsive force is defined among nodes to minimize the overlapping among them (see fig2). These forces will be effective in a limited area, which we call the HHA. The proposed algorithms consist of hole detection and hole healing steps. The identification of holes in a wireless sensor network is of primary interest since the breakdown of sensor nodes in a larger area often indicates one of the special events to be monitored by the network in the first place (e.g. outbreak of a fire, destruction by an earthquakes etc.). This task of identifying holes is especially challenging since typical wireless sensor networks consist of lightweight, low capability nodes that are unaware of their geographic location. But there is also a secondary interest in detecting holes in a network recently routing schemes have been proposed that do not assume knowledge of the geographic location of the network nodes. Our hole detection algorithm is based purely on the topology of the communication graph, i.e. the only information available is which nodes can communicate with each other. First we have to access the existence of a hole, which is done by identifying stuck nodes All the nodes that are marked as stuck nodes. From this module we can identify the hole characteristics such as hole position and radius. DHD is the algorithm used for the detection of the holes, it can detect multiple number of holes in WSN. DHD is a distributed and localized hole detection algorithm that operates over the Gabriel graph of the network. Algorithm: Hole detection & Healing : 1) Initialize the Htimer and Neigh_timer 2) If timer expire generate the hello message Attach node id Position info Broadcast Hello message Set new schedule for next hello 3) If hello received Check in neigh_table If sender info already found Increase the expire time Else Create new entry Copyright to IJIRCCE DOI: /IJIRCCE
4 4) If neigh_timer expires If neigh_info expire Delete Set as failed neighbor Share the info to next neighbors Set new schedule for next verification 5) If failure sharing receive If Hole id is same but not generated by own Make confirmation of node failure Cal max dist from orignator Send to next node with own info Else if own pkt recv Set as HM Calc hole dist Calc hole center point Else If hop count < Th_hop Forward to next node 6) If the node is HM Send healing message Update hole point Update Distance to hole 7) If Healing message is received Checks the hole point & dist If own dist less then HM dis Start move to center point to the hole point In our proposed system we have developed actor node for healing the hole in the network. Hole will be occurred due to the inner nature of WSNs, random deployment, environmental factors, and external attacks. During normal operation of the network, a great loss of nodes occurs, due to an external attack for example, causing the creation of one or several large holes within the network making it ineffective. IV. SIMULATION RESULTS For evaluating the performance of the proposed system, the Hole Healing Algorithm has been taken. This is implemented on NS2. The figure above shows the Hole Healing result. Here we can see 15 nodes and one actor node. Actor node is a mobile sensor node. It moves at where the hole is detected and temporarily healing process is preceded. By this we can avoid the packet loss. Mean while we detect the node that is to be acted as bridge for healing the hole. We compare some performance characteristics of existing and the proposed systems. The no. of nodes moves and delay characteristics of of the proposed system with the existing technique is compared here. The results are showed in Xgraph. No. of nodes moved: The movement of nodes in the existing and proposed system is compared and examined. The X- graph figure shown below represents this comparison Copyright to IJIRCCE DOI: /IJIRCCE
5 Fig3: No. of nodes moved Delay analysis: The figure below shows the delay comparison of the existing and the proposed system. The delay of the proposed system is much less than that of existing system. Fig4: Delay Analysis PDF (Packet delivery fraction) Comparison: The PDF is higher in the recovery schemes and lower in the failure case. It is defined as the ratio of packet that is successfully delivered to the destination compared to the number of the packet that has been sent out by the sender. Copyright to IJIRCCE DOI: /IJIRCCE
6 Fig5: PDF Comparison V. CONCLUSION AND FUTURE WORK This paper has proposed and implemented a lightweight and comprehensive two-phase protocol, HEAL, for ensuring area coverage employing a mobile WSN. The protocol uses a distributed DHD to detect holes in the network.. Compared to the existing schemes, DHD has a very low complexity and deals with holes of various forms and sizes despite the nodes distribution and density. By exploiting the virtual forces concept, our approach relocates only the adequate nodes within the shortest time and at the lowest cost. Through the performance evaluation, we validated HEAL, using different criteria and showed that it detects and heals the holes despite their number or size with less mobility in various situations. The evaluation results demonstrate that HEAL provides a cost-effective and an accurate solution for hole detection and healing in mobile WSNs. In the future, we plan to investigate the interaction between HEAL and the network layer for hole detection and healing. REFERENCES. 1. N. Ahmed, S.S. Kanhere, and S. Jha, The Holes Problem in Wireless Sensor Networks: A Survey, SIGMOBILE Mobile Computing Comm. Rev., vol. 9, no. 2, pp. 4-18, B. Wang, Coverage Control in Sensor Networks. Springer, B. Kun, T. Kun, G. Naijie, L.D. Wan, and L. Xiaohu, Topological Hole Detection in Sensor Networks with Cooperative Neighbors, Proc. Int l Conf. Systems and Networks Comm. (ICSN 06), p. 31, R. Ghrist and A. Muhammad, Coverage and Hole-Detection in Sensor Networks via Homology, Proc. Fourth Int l Symp. Information Processing in Sensor Networks (IPSN 05), pp , Apr V. De Silva, R. Ghrist, and A. Muhammad, Blind Swarms for Coverage in 2-D, Proc. Robotics: Science and Systems, pp , June Spector, A. Z Achieving application requirements. In Distributed Systems, S. Mullende. 7. Patcha; A. Mishra; Collaborative security architecture for black hole attack prevention in mobile ad hoc networks[c]; Radio and Wireless Conference, 2003, F. Stefan, Topological Hole Detection in Wireless Sensor Networks and its Applications, Proc. Joint Workshop on Foundations of Mobile Computing, p , D. Boneh; C. Gentry; B. Lynn; H. Shacham. Aggregate and Verifiably Encrypted Signatures from Bilinear Maps. Advances in Cryptology- EUROCRYPT 03: LNCS Berlin: SpringerVeralg, J.W. Cai; P. Yi, Y. Tian, Y.K. Zhou, N. Liu, The Simulation and Comparison of Routing Attacks on DSR Protocol[C], WiCOM 2009, in press. 11..M. Shila; T. Anjali; Defending selective forwarding attacks in WMNs, IEEE International Conference on Electro/Information Technology, 2008, ] I.F. Akyildiz; X. Wang (2005). A Survey on Wireless Mesh Networks [J]. IEEE Communications Magazine, 43 (9), D.S.J.D. Couto; D. Aguayo; J. Bicket; R. Morris, A HighThroughput Path Metric for Multi-Hop Wireless routing, in ACM Mobicom, Copyright to IJIRCCE DOI: /IJIRCCE
7 14. S. Ganeriwal, A. Kansal, and M.B. Srivastava, Self Aware Actuation for Fault Repair in Sensor Networks, Proc. IEEE Int l Conf. Robotics and Automation (ICRA 04), pp , May C.Y. Chang, L.L. Hung, S.W. Chang, and Y.C. Chen, Decentralized and Energy-Balanced Algorithms for Main- taining Temporal Full- Coverage in Mobile WSNs, J. Wire- less Comm. and Mobile Computing, vol. 12, no. 5, pp , G. Wang, G. Cao, and T.F.L. La Porta, Movement-Assisted Sensor Deployment, IEEE Trans. Mobile Computing, vol. 5, no. 6, pp , June BIOGRAPHY Divya K Suku received her Bachelor of Engineering in Electronics from Anna University, Chennai, At present, she is pursuing M.Tech in Communication Engineering at Caarmel Engineering College, Kerala, Affiliated to MG University. Her research interests include Digital Image Processing and Computer Networks. Phini Ann Philip received her M.Tech in VLSI Design from Francis Xavier Engineering College, Tirunelveli Affiliated to Anna University and B.Tech in Electronics from Mount Zion College of Engineering, Affiliated to MG University. Currently, she is working as the Assistant Professor in Department of Electronics, Caarmel Engineering College. Her research interests are Digital Image Processing and VLSI. Copyright to IJIRCCE DOI: /IJIRCCE
Keywords coverage holes, energy efficient, hole detection, hole healing
Volume 5, Issue 5, May 2015 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Hole Detection and
Modified Sensor Deployment Algorithm for Hole Detection and Healing using NS2
RESEARCH ARTICLE OPEN ACCESS Modified Sensor Deployment Algorithm for Hole Detection and Healing using NS2 Vaishnavi Sukumaran, T.P. Saravanabava M.E, College Of Engineering, Guindy, Chennai, India, 2014
QUALITY OF SERVICE METRICS FOR DATA TRANSMISSION IN MESH TOPOLOGIES
QUALITY OF SERVICE METRICS FOR DATA TRANSMISSION IN MESH TOPOLOGIES SWATHI NANDURI * ZAHOOR-UL-HUQ * Master of Technology, Associate Professor, G. Pulla Reddy Engineering College, G. Pulla Reddy Engineering
OPTIMIZED SENSOR NODES BY FAULT NODE RECOVERY ALGORITHM
OPTIMIZED SENSOR NODES BY FAULT NODE RECOVERY ALGORITHM S. Sofia 1, M.Varghese 2 1 Student, Department of CSE, IJCET 2 Professor, Department of CSE, IJCET Abstract This paper proposes fault node recovery
AN EFFICIENT STRATEGY OF AGGREGATE SECURE DATA TRANSMISSION
INTERNATIONAL JOURNAL OF REVIEWS ON RECENT ELECTRONICS AND COMPUTER SCIENCE AN EFFICIENT STRATEGY OF AGGREGATE SECURE DATA TRANSMISSION K.Anusha 1, K.Sudha 2 1 M.Tech Student, Dept of CSE, Aurora's Technological
Optimal Hole Coverage Using Hole Detection and Replacing Algorithm in Wireless Sensor Networks
Optimal Hole Coverage Using Hole Detection and Replacing Algorithm in Wireless Sensor Networks 1 D. Jewel, 2 P. Brundha, 3 D. C. Joy Winnie Wise 1,2,3 Department of CSE, Francis Xavier Engineering College
Implementation of Energy Efficient Adaptive Load Balancing Algorithm by Rainbow Mechanism in Wireless Sensor Networks
Implementation of Energy Efficient Adaptive Load Balancing Algorithm by Rainbow Mechanism in Wireless Sensor Networks Gowthami.V.R, Divya Sharma M.Tech, Dept. of E&C. NHCE, VTU, Bengaluru India. Assistant
A Comparison Study of Qos Using Different Routing Algorithms In Mobile Ad Hoc Networks
A Comparison Study of Qos Using Different Routing Algorithms In Mobile Ad Hoc Networks T.Chandrasekhar 1, J.S.Chakravarthi 2, K.Sravya 3 Professor, Dept. of Electronics and Communication Engg., GIET Engg.
EBHEAL: Distributed and Localized Mechanism for Coverage Hole Detection and Healing
www.ijecs.in International Journal Of Engineering And Computer Science ISSN:39-74 Volume 4 Issue 7 July 05, Page No. 3457-346 EBHEAL: Distributed and Localized Mechanism for Coverage Hole Detection and
An Empirical Approach - Distributed Mobility Management for Target Tracking in MANETs
An Empirical Approach - Distributed Mobility Management for Target Tracking in MANETs G.Michael Assistant Professor, Department of CSE, Bharath University, Chennai, TN, India ABSTRACT: Mobility management
Behavior Analysis of TCP Traffic in Mobile Ad Hoc Network using Reactive Routing Protocols
Behavior Analysis of TCP Traffic in Mobile Ad Hoc Network using Reactive Routing Protocols Purvi N. Ramanuj Department of Computer Engineering L.D. College of Engineering Ahmedabad Hiteishi M. Diwanji
Thwarting Selective Insider Jamming Attacks in Wireless Network by Delaying Real Time Packet Classification
Thwarting Selective Insider Jamming Attacks in Wireless Network by Delaying Real Time Packet Classification LEKSHMI.M.R Department of Computer Science and Engineering, KCG College of Technology Chennai,
A NOVEL OVERLAY IDS FOR WIRELESS SENSOR NETWORKS
A NOVEL OVERLAY IDS FOR WIRELESS SENSOR NETWORKS Sumanta Saha, Md. Safiqul Islam, Md. Sakhawat Hossen School of Information and Communication Technology The Royal Institute of Technology (KTH) Stockholm,
Review of Prevention techniques for Denial of Service Attacks in Wireless Sensor Network
Review of Prevention techniques for Denial of Service s in Wireless Sensor Network Manojkumar L Mahajan MTech. student, Acropolis Technical Campus, Indore (MP), India Dushyant Verma Assistant Professor,
ENHANCED GREEN FIREWALL FOR EFFICIENT DETECTION AND PREVENTION OF MOBILE INTRUDER USING GREYLISTING METHOD
ENHANCED GREEN FIREWALL FOR EFFICIENT DETECTION AND PREVENTION OF MOBILE INTRUDER USING GREYLISTING METHOD G.Pradeep Kumar 1, R.Chakkaravarthy 2, S.Arun kishorre 3, L.S.Sathiyamurthy 4 1- Assistant Professor,
COMPARATIVE ANALYSIS OF ON -DEMAND MOBILE AD-HOC NETWORK
www.ijecs.in International Journal Of Engineering And Computer Science ISSN:2319-7242 Volume 2 Issue 5 May, 2013 Page No. 1680-1684 COMPARATIVE ANALYSIS OF ON -DEMAND MOBILE AD-HOC NETWORK ABSTRACT: Mr.Upendra
Anomaly Intrusion Detection System in Wireless Sensor Networks: Security Threats and Existing Approaches
Anomaly Intrusion Detection System in Wireless Sensor Networks: Security Threats and Existing Approaches Md. Safiqul Islam *1, Syed AshiqurRahman *2 Department of Computer Science and Engineering Daffodil
Detecting Multiple Selfish Attack Nodes Using Replica Allocation in Cognitive Radio Ad-Hoc Networks
Detecting Multiple Selfish Attack Nodes Using Replica Allocation in Cognitive Radio Ad-Hoc Networks Kiruthiga S PG student, Coimbatore Institute of Engineering and Technology Anna University, Chennai,
CROSS LAYER BASED MULTIPATH ROUTING FOR LOAD BALANCING
CHAPTER 6 CROSS LAYER BASED MULTIPATH ROUTING FOR LOAD BALANCING 6.1 INTRODUCTION The technical challenges in WMNs are load balancing, optimal routing, fairness, network auto-configuration and mobility
Security and Privacy Issues in Wireless Ad Hoc, Mesh, and Sensor Networks
Advance in Electronic and Electric Engineering. ISSN 2231-1297, Volume 4, Number 4 (2014), pp. 381-388 Research India Publications http://www.ripublication.com/aeee.htm Security and Privacy Issues in Wireless
MAXIMIZING THE LIFETIME OF NETWORK SECURITY BY DSDV PROTOCOL USING GAME THEORY TECHNIQUES IN WIRELESS SENSOR NETWORK
MAXIMIZING THE LIFETIME OF NETWORK SECURITY BY DSDV PROTOCOL USING GAME THEORY TECHNIQUES IN WIRELESS SENSOR NETWORK 1 V. Vinoba, 2 P.Hema 1 Department of Mathematics, K.N. Government Arts college, (India)
The Feasibility of SET-IBS and SET-IBOOS Protocols in Cluster-Based Wireless Sensor Network
The Feasibility of SET-IBS and SET-IBOOS Protocols in Cluster-Based Wireless Sensor Network R.Anbarasi 1, S.Gunasekaran 2 P.G. Student, Department of Computer Engineering, V.S.B Engineering College, Karur,
Some Security Trends over Wireless Sensor Networks
Some Security Trends over Wireless Sensor Networks ZORAN BOJKOVIC, BOJAN BAKMAZ, MIODRAG BAKMAZ Faculty of Transport and Traffic Engineering University of Belgrade Vojvode Stepe 305 SERBIA Abstract: -
ISSN: 2321-7782 (Online) Volume 2, Issue 2, February 2014 International Journal of Advance Research in Computer Science and Management Studies
ISSN: 2321-7782 (Online) Volume 2, Issue 2, February 2014 International Journal of Advance Research in Computer Science and Management Studies Research Article / Paper / Case Study Available online at:
Survey on Load balancing protocols in MANET S (mobile ad-hoc networks)
Survey on Load balancing protocols in MANET S (mobile ad-hoc networks) Ramandeep Kaur 1, Gagandeep Singh 2, Sahil Vashist 3 1 M.tech Research Scholar, Department of Computer Science & Engineering, Chandigarh
Preventing DDOS attack in Mobile Ad-hoc Network using a Secure Intrusion Detection System
Preventing DDOS attack in Mobile Ad-hoc Network using a Secure Intrusion Detection System Shams Fathima M.Tech,Department of Computer Science Kakatiya Institute of Technology & Science, Warangal,India
Securing MANET Using Diffie Hellman Digital Signature Scheme
Securing MANET Using Diffie Hellman Digital Signature Scheme Karamvir Singh 1, Harmanjot Singh 2 1 Research Scholar, ECE Department, Punjabi University, Patiala, Punjab, India 1 [email protected] 2
Analysis on Leveraging social networks for p2p content-based file sharing in disconnected manets
Analysis on Leveraging social networks for p2p content-based file sharing in disconnected manets # K.Deepika 1, M.Tech Computer Science Engineering, Mail: [email protected] # K.Meena 2, Assistant Professor
Enhanced routing performance and overhead in Mobile Ad-hoc network for big data Transmission in Telemedicine using computer communication network
ISSN (Online) : 2278-1021 Enhanced routing performance and overhead in Mobile Ad-hoc network for big data Transmission in Telemedicine using computer communication network D. Rajasekaran 1, S.Saravanan
Secure Data Aggregation and Data Recovery in Wireless Sensor Networks
International Journal of Engineering and Advanced Technology (IJEAT) ISSN: 49 8958, Volume-, Issue-3, February 3 Secure Data Aggregation and Data Recovery in Wireless Sensor Networks John Major. J, Shajin
An Extended AODV Protocol to Support Mobility in Hybrid Networks
An Extended AODV Protocol to Support Mobility in Hybrid Networks Sèmiyou A. Adédjouma* Polytechnic School of Abomey-Calavi (EPAC) University of Abomey-Calavi (UAC) Cotonou, Benin *semiyou.adedjouma {at}
LOAD BALANCING AND EFFICIENT CLUSTERING FOR IMPROVING NETWORK PERFORMANCE IN AD-HOC NETWORKS
LOAD BALANCING AND EFFICIENT CLUSTERING FOR IMPROVING NETWORK PERFORMANCE IN AD-HOC NETWORKS Saranya.S 1, Menakambal.S 2 1 M.E., Embedded System Technologies, Nandha Engineering College (Autonomous), (India)
Location Information Services in Mobile Ad Hoc Networks
Location Information Services in Mobile Ad Hoc Networks Tracy Camp, Jeff Boleng, Lucas Wilcox Department of Math. and Computer Sciences Colorado School of Mines Golden, Colorado 841 Abstract In recent
Mobile Security Wireless Mesh Network Security. Sascha Alexander Jopen
Mobile Security Wireless Mesh Network Security Sascha Alexander Jopen Overview Introduction Wireless Ad-hoc Networks Wireless Mesh Networks Security in Wireless Networks Attacks on Wireless Mesh Networks
Study And Comparison Of Mobile Ad-Hoc Networks Using Ant Colony Optimization
Study And Comparison Of Mobile Ad-Hoc Networks Using Ant Colony Optimization 1 Neha Ujala Tirkey, 2 Navendu Nitin, 3 Neelesh Agrawal, 4 Arvind Kumar Jaiswal 1 M. Tech student, 2&3 Assistant Professor,
Energy Efficient and Improved Certificate Revocation Technique for Mobile Ad Hoc Networks
Energy Efficient and Improved Certificate Revocation Technique for Mobile Ad Hoc Networks Navyasree Veeramallu M.Tech DECS Gudlavalleru Engineering College Gudlavalleru- 521356, Krishna District, Andhra
SECURE DATA TRANSMISSION USING INDISCRIMINATE DATA PATHS FOR STAGNANT DESTINATION IN MANET
SECURE DATA TRANSMISSION USING INDISCRIMINATE DATA PATHS FOR STAGNANT DESTINATION IN MANET MR. ARVIND P. PANDE 1, PROF. UTTAM A. PATIL 2, PROF. B.S PATIL 3 Dept. Of Electronics Textile and Engineering
Consecutive Geographic Multicasting Protocol in Large-Scale Wireless Sensor Networks
21st Annual IEEE International Symposium on Personal, Indoor and Mobile Radio Communications Consecutive Geographic Multicasting Protocol in Large-Scale Wireless Sensor Networks Jeongcheol Lee, Euisin
Student, Haryana Engineering College, Haryana, India 2 H.O.D (CSE), Haryana Engineering College, Haryana, India
Volume 5, Issue 6, June 2015 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com A New Protocol
INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY
INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY A PATH FOR HORIZING YOUR INNOVATIVE WORK AN OVERVIEW OF MOBILE ADHOC NETWORK: INTRUSION DETECTION, TYPES OF ATTACKS AND
Secure Data Transmission in Wireless Sensor Network Using Randomized Dispersive Routing Algorithm
Secure Data Transmission in Wireless Sensor Network Using Randomized Dispersive Routing Algorithm Pallavi Motharkar 1, Dr.P.R.Deshmukh 2 and Prof.G.S.Thakare 3 1 M.E. (Computer Engineering), 2,3 Department
{p t [D1t(p t ) + D2t(p t )]}. Proposition 1. With a dynamic centralized pricing mechanism, p cen
On Profitability and Efficiency of Wireless Mesh Networks Fang Fang, College of Business Administration, Cal State San Marcos, [email protected]; Lili Qiu, Department of Computer Science, The Univ of
SPY AGENT BASED SECURE DATA AGGREGATION IN WSN
ISSN: 2229-6948(ONLINE) ICTACT JOURNAL ON COMMUNICATION TECHNOLOGY, DECEMBER 214, VOLUME: 5, ISSUE: 4 SPY AGENT BASED SECURE DATA AGGREGATION IN WSN T. Lathies Bhasker 1 and G. Arul Jagan 2 1 Department
Efficient Load Balancing Routing in Wireless Mesh Networks
ISSN (e): 2250 3005 Vol, 04 Issue, 12 December 2014 International Journal of Computational Engineering Research (IJCER) Efficient Load Balancing Routing in Wireless Mesh Networks S.Irfan Lecturer, Dept
Step by Step Procedural Comparison of DSR, AODV and DSDV Routing protocol
th International Conference on Computer Engineering and Technology (ICCET ) IPCSIT vol. () () IACSIT Press, Singapore Step by Step Procedural Comparison of DSR, AODV and DSDV Routing protocol Amith Khandakar
PERFORMANCE ANALYSIS OF AODV, DSR AND ZRP ROUTING PROTOCOLS IN MANET USING DIRECTIONAL ANTENNA
International Research Journal of Engineering and Technology (IRJET) e-issn: -00 Volume: 0 Issue: 0 Oct-01 www.irjet.net p-issn: -00 PERFORMANCE ANALYSIS OF AODV, DSR AND ZRP ROUTING PROTOCOLS IN MANET
A Review on Failure Node Recovery Algorithms in Wireless Sensor Actor Networks
A Review on Failure Node Recovery Algorithms in Wireless Sensor Actor Networks G.Sumalatha #1, N.Zareena *2, Ch.Gopi Raju #3 #1&2 Asst.Prof, Department of CSE, Vignan's LARA Institute Of Technology & Science,
Routing Analysis in Wireless Mesh Network with Bandwidth Allocation
International Journal of Engineering and Advanced Technology (IJEAT) ISSN: 2249 8958, Volume-2, Issue-3, February 213 Routing Analysis in Wireless Mesh Network with Bandwidth Allocation T.S. Starlin, D.
Formal Measure of the Effect of MANET size over the Performance of Various Routing Protocols
Formal Measure of the Effect of MANET size over the Performance of Various Routing Protocols Er. Pooja Kamboj Research Scholar, CSE Department Guru Nanak Dev Engineering College, Ludhiana (Punjab) Er.
CHARACTERIZING OF INFRASTRUCTURE BY KNOWLEDGE OF MOBILE HYBRID SYSTEM
INTERNATIONAL JOURNAL OF ADVANCED RESEARCH IN ENGINEERING AND SCIENCE CHARACTERIZING OF INFRASTRUCTURE BY KNOWLEDGE OF MOBILE HYBRID SYSTEM Mohammad Badruzzama Khan 1, Ayesha Romana 2, Akheel Mohammed
Efficient File Sharing Scheme in Mobile Adhoc Network
Efficient File Sharing Scheme in Mobile Adhoc Network 1 Y. Santhi, 2 Mrs. M. Maria Sheeba 1 2ndMECSE, Ponjesly College of engineering, Nagercoil 2 Assistant professor, Department of CSE, Nagercoil Abstract:
Energy Efficient Load Balancing among Heterogeneous Nodes of Wireless Sensor Network
Energy Efficient Load Balancing among Heterogeneous Nodes of Wireless Sensor Network Chandrakant N Bangalore, India [email protected] Abstract Energy efficient load balancing in a Wireless Sensor
Coverage-Hole Trap Model in Target Tracking using Distributed Relay-Robot Network
Coverage-Hole Trap Model in Target Tracking using Distributed Relay-Robot Network Huawei Miao, Chia Ching Ooi, Xiaowen Wu, and Christian Schindelhauer Computer Networks and Telematics, Department of Computer
A Catechistic Method for Traffic Pattern Discovery in MANET
A Catechistic Method for Traffic Pattern Discovery in MANET R. Saranya 1, R. Santhosh 2 1 PG Scholar, Computer Science and Engineering, Karpagam University, Coimbatore. 2 Assistant Professor, Computer
PERFORMANCE STUDY AND SIMULATION OF AN ANYCAST PROTOCOL FOR WIRELESS MOBILE AD HOC NETWORKS
PERFORMANCE STUDY AND SIMULATION OF AN ANYCAST PROTOCOL FOR WIRELESS MOBILE AD HOC NETWORKS Reza Azizi Engineering Department, Bojnourd Branch, Islamic Azad University, Bojnourd, Iran [email protected]
Minimum-Hop Load-Balancing Graph Routing Algorithm for Wireless HART
Minimum-Hop Load-Balancing Graph Routing Algorithm for Wireless HART Abdul Aziz Memon and Seung Ho Hong Abstract In this paper load-balancing routing algorithm for WirelessHART standard is proposed. WirelessHART
A Security Architecture for. Wireless Sensor Networks Environmental
Contemporary Engineering Sciences, Vol. 7, 2014, no. 15, 737-742 HIKARI Ltd, www.m-hikari.com http://dx.doi.org/10.12988/ces.2014.4683 A Security Architecture for Wireless Sensor Networks Environmental
Wireless Sensor Network: Challenges, Issues and Research
ISBN 978-93-84468-20-0 Proceedings of 2015 International Conference on Future Computational Technologies (ICFCT'2015) Singapore, March 29-30, 2015, pp. 224-228 Wireless Sensor Network: Challenges, Issues
[email protected] [email protected]
S. Sumathy 1 and B.Upendra Kumar 2 1 School of Computing Sciences, VIT University, Vellore-632 014, Tamilnadu, India [email protected] 2 School of Computing Sciences, VIT University, Vellore-632 014,
ROUTE MECHANISMS FOR WIRELESS ADHOC NETWORKS: -CLASSIFICATIONS AND COMPARISON ANALYSIS
International Journal of Science, Environment and Technology, Vol. 1, No 2, 2012, 72-79 ROUTE MECHANISMS FOR WIRELESS ADHOC NETWORKS: -CLASSIFICATIONS AND COMPARISON ANALYSIS Ramesh Kait 1, R. K. Chauhan
Secured Data Transmissions In Manet Using Neighbor Position Verfication Protocol
www.ijecs.in International Journal Of Engineering And Computer Science ISSN:2319-7242 Volume 3 Issue3 March, 2014 Page No. 5067-5071 Secured Data Transmissions In Manet Using Neighbor Position Verfication
Comparison of WCA with AODV and WCA with ACO using clustering algorithm
Comparison of WCA with AODV and WCA with ACO using clustering algorithm Deepthi Hudedagaddi, Pallavi Ravishankar, Rakesh T M, Shashikanth Dengi ABSTRACT The rapidly changing topology of Mobile Ad hoc networks
Wireless Sensor Network: Improving the Network Energy Consumption
Wireless Sensor Network: Improving the Network Energy Consumption Ingrid Teixeira, José Ferreira de Rezende and Aloysio de Castro P. Pedroza Abstract-- In a remote sensor application it is desirable that
Bandwidth Management Framework for Multicasting in Wireless Mesh Networks
Bandwidth Management Framework for Multicasting in Wireless Mesh Networks Manaswi Saha and P. Venkata Krishna Abstract Wireless mesh networks (WMNs) provide a reliable and a scalable solution for multicasting.
NetworkPathDiscoveryMechanismforFailuresinMobileAdhocNetworks
Global Journal of Computer Science and Technology: E Network, Web & Security Volume 14 Issue 3 Version 1.0 Year 2014 Type: Double Blind Peer Reviewed International Research Journal Publisher: Global Journals
Technology Longowal, Punjab, India
An Intrusion Detection System Against Multiple Blackhole Attacks In Ad-Hoc Networks Using Wireless Antnet Sunny Chanday 1, Rajeev Kumar 2, Dilip Kumar 3 1 M.Tech student, Department of Computer Science
PERFORMANCE ANALYSIS OF AD-HOC ON DEMAND DISTANCE VECTOR FOR MOBILE AD- HOC NETWORK
http:// PERFORMANCE ANALYSIS OF AD-HOC ON DEMAND DISTANCE VECTOR FOR MOBILE AD- HOC NETWORK Anjali Sahni 1, Ajay Kumar Yadav 2 1, 2 Department of Electronics and Communication Engineering, Mewar Institute,
Vampire Attack Detecting and Preventing in Wireless Sensor Network
International Journal of Emerging Engineering Research and Technology Volume 2, Issue 4, July 2014, PP 306-310 ISSN 2349-4395 (Print) & ISSN 2349-4409 (Online) Vampire Attack Detecting and Preventing in
An Implementation of Secure Wireless Network for Avoiding Black hole Attack
An Implementation of Secure Wireless Network for Avoiding Black hole Attack Neelima Gupta Research Scholar, Department of Computer Science and Engineering Jagadguru Dattaray College of Technology Indore,
Hybrid Energy Efficient Distributed Protocol for Heterogeneous Wireless Sensor Network
International Journal of Computer Applications (975 8887) Volume 4 No.6, July 21 Hybrid Energy Efficient Distributed Protocol for Heterogeneous Wireless Sensor Network Harneet Kour Department of Computer
A Graph-Center-Based Scheme for Energy-Efficient Data Collection in Wireless Sensor Networks
A Graph-Center-Based Scheme for Energy-Efficient Data Collection in Wireless Sensor Networks Dajin Wang Department of Computer Science Montclair State University, Upper Montclair, NJ 07043, USA [email protected]
DESIGN AND DEVELOPMENT OF LOAD SHARING MULTIPATH ROUTING PROTCOL FOR MOBILE AD HOC NETWORKS
DESIGN AND DEVELOPMENT OF LOAD SHARING MULTIPATH ROUTING PROTCOL FOR MOBILE AD HOC NETWORKS K.V. Narayanaswamy 1, C.H. Subbarao 2 1 Professor, Head Division of TLL, MSRUAS, Bangalore, INDIA, 2 Associate
EFFICIENT DETECTION IN DDOS ATTACK FOR TOPOLOGY GRAPH DEPENDENT PERFORMANCE IN PPM LARGE SCALE IPTRACEBACK
EFFICIENT DETECTION IN DDOS ATTACK FOR TOPOLOGY GRAPH DEPENDENT PERFORMANCE IN PPM LARGE SCALE IPTRACEBACK S.Abarna 1, R.Padmapriya 2 1 Mphil Scholar, 2 Assistant Professor, Department of Computer Science,
Wireless Sensor Network Security. Seth A. Hellbusch CMPE 257
Wireless Sensor Network Security Seth A. Hellbusch CMPE 257 Wireless Sensor Networks (WSN) 2 The main characteristics of a WSN include: Power consumption constrains for nodes using batteries or energy
Distributive Reprogramming of Wireless Sensor Nodes with Secure Data Transmission
Distributive Reprogramming of Wireless Sensor Nodes with Secure Data Transmission B.Navin, S.Benila Abstract Wireless sensor networks have found their applications in numerous industrial fields. This is
DAG based In-Network Aggregation for Sensor Network Monitoring
DAG based In-Network Aggregation for Sensor Network Monitoring Shinji Motegi, Kiyohito Yoshihara and Hiroki Horiuchi KDDI R&D Laboratories Inc. {motegi, yosshy, hr-horiuchi}@kddilabs.jp Abstract Wireless
Node Degree based Clustering for WSN
Node Degree based Clustering for WSN Sanjeev Kumar Gupta Dept. of Electronics & Comm. SCOPE College of Engineering,NH-12, Hoshangabad Road, Bhopal (INDIA) Neeraj Jain Dept. of Computer Science SCOPE College
Adaptive Multiple Metrics Routing Protocols for Heterogeneous Multi-Hop Wireless Networks
Adaptive Multiple Metrics Routing Protocols for Heterogeneous Multi-Hop Wireless Networks Lijuan Cao Kashif Sharif Yu Wang Teresa Dahlberg Department of Computer Science, University of North Carolina at
