Energy Aware Load Balancing in Secure Heterogeneous Wireless Sensor Network

Size: px
Start display at page:

Download "Energy Aware Load Balancing in Secure Heterogeneous Wireless Sensor Network"

Transcription

1 Energy Aware Load Balancing in Secure Heterogeneous Wireless Sensor Network Chandrakant N Bangalore, India nadhachandra@gmail.com Abstract A Wireless Sensor Network(WSN) is a energy and security constraint ad-hoc network. This paper attempting to apply efficient techniques of load, energy and security such that network life can be increased with security. Energy effective load reconciliation in a WSN needs to spread workload across multiple sensor nodes based on its character of functionality such as temperature, light detection, guardianship in mind of security. Therefore, energy effective load reconciliation can be achieved and optimization of resource usage, maximize throughput, maximize network lifetime, minimize response time, and avoid overload by distributing work among identical type of sensor nodes with energy and security efficient routes. This will make use of multiple sensor nodes to reconciliation of load instead of a single sensor nodes hence this may increase reliability through redundancy. Network is divided logically, one is Physical group(pg) which represents a set of nodes which are physically neighbours to a node, another is Logical group(lg) which represents a set of nodes which grouped based on its type of functionality. Energy efficient routes can be evaluated in virtual groupings(pg,lg), route will chosen based on the cost of energy inspite of the route belongingness. Since each node in this network need not understand security techniques of other nodes, because, there could be different encryption techniques, packet size, protocol etc, hence header(cluster header) can have common security layer where security related things are evaluated. Keywords: Secure, WSN, Energy Efficient, Load Balance, Heterogeneous, Logical Group, Physical Group 1. Introduction A WSN is a collection of sensor nodes that communicate via wireless links, and these can not have a unique topology. These nodes cooperatively pass their data through the WSN to a main location. Load balancing in WSN involves the distribution of all computer and communication activities in two or more network nodes. This load balancing can help us to reduce the execution time of activities and to ensure that all resources in the system are used optimally. Ideally, the load balancing algorithm selects the node to process execution based on available information about all the resources in the network. Load balancing algorithms can be static, dynamic and adaptive. Static algorithms makes decisions by a priori knowledge of the network, therefore, overheads incurred in static algorithms is almost zero. In the case of dynamic algorithms, decisions are based on the information of system status ( loads on nodes ), therefore, incur overhead in the collection, storage and analysis of network status. Adaptive Algorithm is a kind of dynamic algorithms that adapt their activities to dynamically change the parameters of the algorithm to adapt to network conditions. WSNs require appropriate algorithm to make judicious use of finite energy resources of heterogeneous sensor nodes, therefore, we have to justify the cost calculation before running the load on it! 2. Literature Survey Load balancing in heterogeneous WSN nodes can be evaluated through cluster nodes, it is a novel idea, but few paper used as input to this concept. Paper [8] proposed a load-balanced clustering algorithm [14] for Wireless Sensor Networks on the basis of their distance and density distribution. In the cluster, nodes can join the cluster head by considering the cluster size and communication radius. Further, load balancing with energy efficiency[10][1] comprises of two parts [12]. The first part being Determining the number of cluster heads based on the distribution and communication radios of the nodes and the second is to select the cluster heads according to the residual energy, mobility, 694 Vol-2, Issue-05

2 the cluster number single node to cluster and distances of their heads and member nodes server cluster heads. Paper [7] proposed to architecture where new applications can be developed through a flexible service Rapidly composition. This architecture congestion Helps to Control Which load-balancing and adaptively adjust the work load over multipaths. In this algorithm, an evaluation metric and path vacant ratio is used to evaluate-and find a set of link-disjoint paths from all available paths. On top of this algorithm, a threshold is applied sharing algorithm to split the packets into multiple segments will be delivered via That multipaths to the destination path vacant depending on the ratio. In paper [11], author has investigated the effect of load balancing routing in WSNs stochastic undirected and directed with randomly placed nodes. It concluded that the stochastic routing does not necessarily achieve efficient load balancing energy in undirected networks. They have analyzed the performance of the algorithm stochastic routing distributed and decentralized, ie expander routing method, the method of expander routing performance significantly better in terms of delay packet transmission, while achieving efficient load balancing energy in directed networks. In Paper [13], proposed protocol Secure Load Balancing (SLB), which employs the pseudo-sinks that are a small number of nodes inviolable special sensors with more computing resources, storage, and energy. This algorithm reduces accuracy problem safely transmitting data clusters near congested free or pseudo-sinks clusters. In Paper [6], authors have studied the potential parameters of energy conservation and maximum performance of the network by balancing traffic across the WSN. They have shown that the distribution of traffic generated by each sensor node through multiple paths instead of using a single path allows significant energy savings, therefore, proposed a new analytical model for load-balanced systems. Paper [4] talks about energy efficient routing in WSN Which is not easy despite having Directed Diffusion routing protocol data centric. The data is forwarded through all the sink nodes impose the overhead of sending useless data, hence the author has proposed a multi- Sink Directed diffusion (MSDD) to address this problem by transmitting data towards the nearest sink. This protocol implements a load balancing by selecting the sink to next hand after the energy level of the nodes in the original path falls below a threshold value uncertain. Figure 1. WSN Group Formation 3. Proposed Techniques and Implementation In this work we are using techniques of paper [2] with load balancing algorithms. Initially we are considering load balancing factor and the generation of the simulated results. The network is logical (Logical Group- LG ) and physically (Physical Group -PG ) separated on the basis of functionality and physical, respectively existence. In this network, each node is having a LG (Logical Group) ID that is different from the cluster group where LG Id is unique and logically grouped based on the identical functionality of sensor nodes, but a node can have identifications more than one group to indicate that you can participate in more than one feature extraction for example, the detection of earthquakes and landslides observation. Whenever a sensor node sends a packet with LG Id your neighbours, if the neighbours are logically and physically available within the coverage area then those nodes can receive this package or any immediate neighbour can pass this package to his neighbour and so on, until it reaches LG appropriate nodes. This group ID is only logical group ID representing the set of nodes functionally similar, therefore, communication between different groups is based on the easy group ID. In fig. 1, node 1 and 5 are in PG ( Physics Group ) and LG X node, respectively, however the node 2 is included in both groups ( LG and PG). In each of LG, each node may receive packets that are listed for the entire group, but PG nodes are neighbours there interested node can receive these packets. Algorithm 1 describes the process of assigning load to nodes in the network. The average amount of energy consumed by node u per unit of time due to the different transmissions within the WSN is denoted by E(u) [5], E(u) =E idle (u) + v V p P (v) (1) w(p) A(v) E(u, p) 695 Vol-2, Issue-05

3 Algorithm 1 Load Balancing in WSN Require: Initialize N Nodes with L, P G, LG, etc Require: L <= Number of Work Load Processes(l1,l2,l3...ln=L) 1: while l <= L do 2: while i <= N do 3: if Type of node i belongs to a LG == Process Type of l then 4: Allocate this process l to Node i. 5: else 6: Allocate load to free node which can belongs to PG. 7: end if 8: end while 9: end while Here, E idle (u) is the average amount of energy consumed by node u per unit of time during its idle state. The lifetime of sensor node u is calculated by, T(u) =E init /E(u) (2) Here, E init is the initial amount of energy provided to each sensor node. Generally, the load balance for a given graph G representing the network with n nodes where each node contains work load wi, the goal is to distribute load across the edges so that finally the weight of each node is (approximately) equal to, w i = n w j /n (3) j=1 Let f be the fraction of the total network area covered by a mobile node [8], then f = πr2 A (4) The average number of neighbours n of the network can be obtained by using the following equation, n = (N 1)kf (5) where k is a constant, referred to as a connectivity parameter. The relationship between the local density, the cover assembly and forwarding Was condensed-through probability equation (6). Assuming that, g be the number of adjacent neighbours of node n1 and g b be the number of nodes of n1 that are covered by the broadcast and the forwarding probability at the node n1 is as follows, P n1 = g g b ḡ ; if g ḡ g g b g ; if g > ḡ (6) Adding all the nodes of physical or logical groups are equivalent number of nodes in the network. Say, K,L be the total number of groups of PG and LG respectively and R, S be the size of each group of PG and LG respectively which is specified in the below equation (7) and (8). K N= R i (7) i=0 L N= S i (8) i=0 Group Relations can be defined as follows, let there is a set of 2 groups like M and W and wanted to express which node of M is communicating with which node of W. Here, one way to do that is by listing the set of pairs (m,w) and recognizing the nodes. The accessing relation can be represented by a subset of the Cartesian Product M W. In general, a relation R from a set A to a set B will be understood as a subset of the Cartesian Product A B, i.e., R A B. If an element a A is related to an element b B, we often write arb instead of (a, b) R. The set {a A arb for some b B} is called the domain of R. The set {b B arb for some a A} is called the range of R. The load balancing [9] in the given a graph G(summation of PG and/or LG) contains N nodes where each node contains work load w i, here work load is distributed across the edges/nodes so that finally the weight of each node is (approximately) equal to w i, i.e., n w i = w j /n (9) j=1 We have assumed that WSN is a set of heterogeneous nodes called h 1, h 2...h n as specified in equation (10), where H is a set of h 1, h 2,... h n. H = { h 1, h 2,...h n } (10) where each node is having different security techniques i.e.,h 1 is having a security technique called s 1 and so on, therefore equation (11) shows, S is a set of security techniques of all heterogeneous nodes. 696 Vol-2, Issue-05

4 Figure 2. Number of processes in 100 nodes v/s time in load-balancing. Figure 5. Total Energy of 200 Nodes v/s Number of Processes in the Network. Figure 3. Number of processes in 500 nodes v/s time in load-balancing. Figure 4. Total Energy of 50 Nodes v/s Number of Processes in the Network. S = { s 1,s 2...s n } (11) here H and S are having one to one relationships. Here also s 1,s 2...s n can have sub security techniques called a 1,a 2...a n. One important note is [3], in this network each node need not understand security techniques of other nodes because of their own encryption techniques etc, hence this network is fully dependent on central/header node of WSN. The Encryption functionality can include a set of security functions to encrypt, decrypt and sign applicative data,ensuring confidentiality and integrity. There is a maximum N(N-1) bidirectional communication link can happen between nodes with using a header node (Mk) who is placed with a common security protocol software called M. Integration modulation(i 1..i m ) is the process of linking together different secured nodes (n 1,n 2...n m ) and software applications functionally to act as a coordinated whole. Therefore, M in Mk is set of integration modules is given in equation (12), M = { i 1 +i 2...i m } (12) Each node s request or response has to reach Mk, then Mk will process it and delivered to the intendant node(s). As described in earlier paragraph, say security technique s 1 and s 2 is given in equation (13), P( s 1 and s 2 ) =0 (disjoint) (13) As all nodes are heterogeneous in nature, hence we have assumed that s 1 s 2 s 3...s n. Say node n 1 wants to send a request R 1 to the node n 2, equation (14) shows the process, here every node has to send their request or response through Mk. 697 Vol-2, Issue-05

5 Algorithm 2 Energy Efficient Load Balancing in WSN Require: Initialize N Nodes with L, P G, LG, etc Require: L <= Number of Work Load Processes(l1,l2,l3...ln=L) Require: N <= Number of Nodes in the network(n1,n2,n3...nm=n) Require: E <= Energy Level of each node in N (e1,e2,e3...en=e), here e1 for n1, e2 for n2...en for nm 1: while l <= L do 2: while i <= N do 3: if Type of node i belongs to a LG == Process Type of l then 4: while Until find a node from i which consumes min. energy e do 5: Allocate this process l to Node i. 6: end while 7: else 8: while Until find a node from i which consumes min. energy e do 9: Allocate this process l to Node i. 10: Allocate load to free node which can belongs to PG. 11: end while 12: end if 13: end while 14: end while n 1 n 2 = n 1 Mk + Mk n 2 (14) and node n 2 sends a response R 2 back to the node n 1, equation (15) shows the reverse process of equation 14). n 2 n 1 = n 2 Mk + Mk n 1 (15) Here Mk is an central node with M which does integration between all nodes in the network. Basically it does mappings and conversions across the network. This kind of network may suffer from communication failures such as, central mode failure or entry of malicious nodes or network energy lost or natural disaster etc. The header node failure can occur due to non supportive security technology or invalid request/response from nodes. Considering communication failure due to malicious(l) node(s) entry into the network. However L cannot communicate with other nodes directly, hence this node has to contact Mk for request and response. Say node L wants to send a request R 1 to node n 1, equation (16) shows the process of sending a request to Mk, L n 1 = L Mk + Mk n 1 (16) Mk does not forward R 1 to n 1, instead Mk will validate the request whether this node is registered in Mk s registry or not. The integration should support this request / response but technically this is not the case in this scenario. If it is a registered node then forwards the request to node n 1 asks for validity of node L for the first time. Then again n 1 will check the genuinity of the same and reply back to Mk if it is genuine node or sends acknowledgement(ack L) packet to Mk if it is malicious node. Simulated results for the load balancing is shown in Figure 2 and 3, PG and PG have considered scenarios with LG. Load balancing through PG is a normal spread the load among sensor nodes algorithm may traditionally be assigning processes to the sensor nodes. Applying the algorithm concepts PG LG takes less time compared to the concepts of PG. Figure [9] and [8] shows the simulation results of 100 and 500 nodes, respectively. Therefore, the proposed algorithm can be useful in the case of heterogeneous nodes. With the load balancing algorithm, we also implemented an efficient energy strategy, so that the web of life can be improved / increased with load balancing. A brief algorithm is given in Algorithm 2, which describes the process of assigning workload to nodes with energy efficient. In this network, L is Number of Work Load Processes called l1,l2,l3...ln and N is the Number of Nodes in the network called n1,n2,n3...nm and E is Energy Level of each node in N called e1,e2,e3...en, here e1 corresponds to n1, similarly e2 corresponds n2 and so on. Simulated results for efficient load balancing of the energy is shown in Figure 4 and 5 50 and 200 nodes, respectively, both graphs of simulation results are identical and show that we can increase the lifetime of the network, while the load allocation in the nodes. 4. Conclusions A Wireless Sensor Network(WSN) is a energy and security constraint ad-hoc network. This paper attempting to apply efficient techniques of load, energy and security such that network life can be increased with security. Energy effective load reconciliation in a WSN needs to spread workload across multiple sensor nodes based on its character of functionality such as temperature, light detection, guardianship in mind of security. Therefore, energy effective load reconciliation can be achieved and optimization of resource usage, maximize throughput, maximize network lifetime, minimize response time, and avoid overload by distributing work among identical type of sensor nodes with energy and security efficient routes. This will make use of multiple sensor nodes to reconciliation of load instead of 698 Vol-2, Issue-05

6 a single sensor nodes hence this may increase reliability through redundancy. Network is divided logically, one is Physical group(pg) which represents a set of nodes which are physically neighbours to a node, another is Logical group(lg) which represents a set of nodes which grouped based on its type of functionality. Energy efficient routes can be evaluated in virtual groupings(pg,lg), route will chosen based on the cost of energy inspite of the route belongingness. Since each node in this network need not understand security techniques of other nodes, because, there could be different encryption techniques, packet size, protocol etc, hence header(cluster header) can have common security layer where security related things are evaluated. The simulation result is encouraging and it is worth of using proposed algorithm for energy efficient load balancing secure heterogeneous WSN. References [1] F. Bouabdallah, N. Bouabdallah, and R. Boutaba. Loadbalanced routing scheme for energy-efficient wireless sensor networks. In Global Telecommunications Conference, IEEE GLOBECOM IEEE, pages 1 6, [2] N. Chandrakant, P. D. Shenoy, K. R. Venugopal, and L. M. Patnaik. Restricting the admission of selfish or malicious nodes into the network by using efficient security services in middleware for manets. In Proceedings of the 2011 International Conference on Communication, Computing & Security, ICCCS 11, pages , New York, NY, USA, ACM. [3] Chandrakant N, Deepa Shenoy P, Venugopal K R and L M Patnaik. Middleware services for security in scalable and non-scalable heterogeneous nodes of manets,issn: x, issue vol.4 no.2. In International Journal of Future Generation Communication and Networking(IJFGCN), pages 1 12, [4] A. Eghbali, N. Javan, A. Dareshoorzadeh, and M. Dehghan. An energy efficient load-balanced multi-sink routing protocol for wireless sensor networks. In Telecommunications, ConTEL th International Conference on, pages , [5] N. B. Fatma Bouabdallah and R. Boutaba. On balancing energy consumption in wireless sensor networks. pages 1 16, march [6] Fatma Othman, Nizar Bouabdallah and Raouf Boutaba. Load-balanced routing scheme for energy-efficient wireless sensor networks. [7] S. Li, S. Zhao, X. Wang, K. Zhang, and L. Li. Adaptive and secure load-balancing routing protocol for serviceoriented wireless sensor networks, [8] Y. Liao, H. Qi, and W. Li. Load-balanced clustering algorithm with distributed self-organization for wireless sensor networks. Sensors Journal, IEEE, 13(5): , [9] Robert Elssser and Burkhard Monien and Stefan Schamberger. Load balancing in dynamic networks. [10] A. Tarachand, V. Kumar, A. Raj, A. Kumar, and P. Jana. An energy efficient load balancing algorithm for clusterbased wireless sensor networks. In India Conference (INDICON), 2012 Annual IEEE, pages , [11] U. Wijetunge, A. Pollok, and S. Perreau. Load balancing effect of stochastic routing in wireless sensor networks. In Telecommunication Networks and Applications Conference (ATNAC), 2012 Australasian, pages 1 6, [12] F. Xia, X. Zhao, H. Liu, J. Li, and X. Kong. An energyefficient and load-balanced dynamic clustering protocol for ad-hoc sensor networks. In Cyber Technology in Automation, Control, and Intelligent Systems (CY- BER), 2012 IEEE International Conference on, pages , [13] S. zdemir. Secure load balancing for wireless sensor networks via inter cluster relaying. In Kithab Proceedings, pages , [14] R. Zhang, Z. Jia, and L. Wang. A maximum-votes and load-balance clustering algorithm for wireless sensor networks. In Wireless Communications, Networking and Mobile Computing, WiCOM 08. 4th International Conference on, pages 1 4, Vol-2, Issue-05

Energy Efficient Load Balancing among Heterogeneous Nodes of Wireless Sensor Network

Energy Efficient Load Balancing among Heterogeneous Nodes of Wireless Sensor Network Energy Efficient Load Balancing among Heterogeneous Nodes of Wireless Sensor Network Chandrakant N Bangalore, India nadhachandra@gmail.com Abstract Energy efficient load balancing in a Wireless Sensor

More information

CHAPTER 8 CONCLUSION AND FUTURE ENHANCEMENTS

CHAPTER 8 CONCLUSION AND FUTURE ENHANCEMENTS 137 CHAPTER 8 CONCLUSION AND FUTURE ENHANCEMENTS 8.1 CONCLUSION In this thesis, efficient schemes have been designed and analyzed to control congestion and distribute the load in the routing process of

More information

A Secure Data Transmission for Cluster based Wireless Sensor Network Using LEACH Protocol

A Secure Data Transmission for Cluster based Wireless Sensor Network Using LEACH Protocol A Secure Data Transmission for Cluster based Wireless Sensor Network Using LEACH Protocol Vinoda B Dibbad 1, C M Parameshwarappa 2 1 PG Student, Dept of CS&E, STJIT, Ranebennur, Karnataka, India 2 Professor,

More information

LOAD BALANCING AND EFFICIENT CLUSTERING FOR IMPROVING NETWORK PERFORMANCE IN AD-HOC NETWORKS

LOAD BALANCING AND EFFICIENT CLUSTERING FOR IMPROVING NETWORK PERFORMANCE IN AD-HOC NETWORKS LOAD BALANCING AND EFFICIENT CLUSTERING FOR IMPROVING NETWORK PERFORMANCE IN AD-HOC NETWORKS Saranya.S 1, Menakambal.S 2 1 M.E., Embedded System Technologies, Nandha Engineering College (Autonomous), (India)

More information

Congestion Control in WSN using Cluster and Adaptive Load Balanced Routing Protocol

Congestion Control in WSN using Cluster and Adaptive Load Balanced Routing Protocol Congestion Control in WSN using Cluster and Adaptive Load Balanced Routing Protocol Monu Rani 1, Kiran Gupta 2, Arvind Sharma 3 1 M.Tech (Student), 2 Assistant Professor, 3 Assistant Professor Department

More information

DESIGN AND DEVELOPMENT OF LOAD SHARING MULTIPATH ROUTING PROTCOL FOR MOBILE AD HOC NETWORKS

DESIGN AND DEVELOPMENT OF LOAD SHARING MULTIPATH ROUTING PROTCOL FOR MOBILE AD HOC NETWORKS DESIGN AND DEVELOPMENT OF LOAD SHARING MULTIPATH ROUTING PROTCOL FOR MOBILE AD HOC NETWORKS K.V. Narayanaswamy 1, C.H. Subbarao 2 1 Professor, Head Division of TLL, MSRUAS, Bangalore, INDIA, 2 Associate

More information

CROSS LAYER BASED MULTIPATH ROUTING FOR LOAD BALANCING

CROSS LAYER BASED MULTIPATH ROUTING FOR LOAD BALANCING CHAPTER 6 CROSS LAYER BASED MULTIPATH ROUTING FOR LOAD BALANCING 6.1 INTRODUCTION The technical challenges in WMNs are load balancing, optimal routing, fairness, network auto-configuration and mobility

More information

QUALITY OF SERVICE METRICS FOR DATA TRANSMISSION IN MESH TOPOLOGIES

QUALITY OF SERVICE METRICS FOR DATA TRANSMISSION IN MESH TOPOLOGIES QUALITY OF SERVICE METRICS FOR DATA TRANSMISSION IN MESH TOPOLOGIES SWATHI NANDURI * ZAHOOR-UL-HUQ * Master of Technology, Associate Professor, G. Pulla Reddy Engineering College, G. Pulla Reddy Engineering

More information

CHAPTER 6 SECURE PACKET TRANSMISSION IN WIRELESS SENSOR NETWORKS USING DYNAMIC ROUTING TECHNIQUES

CHAPTER 6 SECURE PACKET TRANSMISSION IN WIRELESS SENSOR NETWORKS USING DYNAMIC ROUTING TECHNIQUES CHAPTER 6 SECURE PACKET TRANSMISSION IN WIRELESS SENSOR NETWORKS USING DYNAMIC ROUTING TECHNIQUES 6.1 Introduction The process of dispersive routing provides the required distribution of packets rather

More information

Survey on Load balancing protocols in MANET S (mobile ad-hoc networks)

Survey on Load balancing protocols in MANET S (mobile ad-hoc networks) Survey on Load balancing protocols in MANET S (mobile ad-hoc networks) Ramandeep Kaur 1, Gagandeep Singh 2, Sahil Vashist 3 1 M.tech Research Scholar, Department of Computer Science & Engineering, Chandigarh

More information

Evaluation of Unlimited Storage: Towards Better Data Access Model for Sensor Network

Evaluation of Unlimited Storage: Towards Better Data Access Model for Sensor Network Evaluation of Unlimited Storage: Towards Better Data Access Model for Sensor Network Sagar M Mane Walchand Institute of Technology Solapur. India. Solapur University, Solapur. S.S.Apte Walchand Institute

More information

ISSN: 2321-7782 (Online) Volume 2, Issue 4, April 2014 International Journal of Advance Research in Computer Science and Management Studies

ISSN: 2321-7782 (Online) Volume 2, Issue 4, April 2014 International Journal of Advance Research in Computer Science and Management Studies ISSN: 2321-7782 (Online) olume 2, Issue 4, April 2014 International Journal of Advance Research in Computer Science and Management Studies Research Article / Paper / Case Study Available online at: www.ijarcsms.com

More information

International Journal of Emerging Technologies in Computational and Applied Sciences (IJETCAS) www.iasir.net

International Journal of Emerging Technologies in Computational and Applied Sciences (IJETCAS) www.iasir.net International Association of Scientific Innovation and Research (IASIR) (An Association Unifying the Sciences, Engineering, and Applied Research) International Journal of Emerging Technologies in Computational

More information

Load-Balancing Enhancement by a Mobile Data Collector in Wireless Sensor Networks

Load-Balancing Enhancement by a Mobile Data Collector in Wireless Sensor Networks Load-Balancing Enhancement by a Mobile Data Collector in Wireless Sensor Networks Ahmad Patooghy Department of Computer Engineering Iran University of Science & Technology Tehran, Iran patooghy@iust.ac.ir

More information

A Graph-Center-Based Scheme for Energy-Efficient Data Collection in Wireless Sensor Networks

A Graph-Center-Based Scheme for Energy-Efficient Data Collection in Wireless Sensor Networks A Graph-Center-Based Scheme for Energy-Efficient Data Collection in Wireless Sensor Networks Dajin Wang Department of Computer Science Montclair State University, Upper Montclair, NJ 07043, USA wang@pegasus.montclair.edu

More information

Load-Balanced Routing Scheme for Energy-Efcient Wireless Sensor Networks

Load-Balanced Routing Scheme for Energy-Efcient Wireless Sensor Networks Load-Balanced Routing Scheme for Energy-Efcient Wireless Sensor Networks Fatma Othman, Nizar Bouabdallah and Raouf Boutaba z INRIA, Campus universitaire de Beaulieu ; 3504 Rennes Cedex, France ( z )School

More information

Securing MANET Using Diffie Hellman Digital Signature Scheme

Securing MANET Using Diffie Hellman Digital Signature Scheme Securing MANET Using Diffie Hellman Digital Signature Scheme Karamvir Singh 1, Harmanjot Singh 2 1 Research Scholar, ECE Department, Punjabi University, Patiala, Punjab, India 1 Karanvirk09@gmail.com 2

More information

OPTIMIZED SENSOR NODES BY FAULT NODE RECOVERY ALGORITHM

OPTIMIZED SENSOR NODES BY FAULT NODE RECOVERY ALGORITHM OPTIMIZED SENSOR NODES BY FAULT NODE RECOVERY ALGORITHM S. Sofia 1, M.Varghese 2 1 Student, Department of CSE, IJCET 2 Professor, Department of CSE, IJCET Abstract This paper proposes fault node recovery

More information

Performance Analysis of Load Balancing in MANET using On-demand Multipath Routing Protocol

Performance Analysis of Load Balancing in MANET using On-demand Multipath Routing Protocol ISSN: 2278 1323 All Rights Reserved 2014 IJARCET 2106 Performance Analysis of Load Balancing in MANET using On-demand Multipath Routing Protocol Monika Malik, Partibha Yadav, Ajay Dureja Abstract A collection

More information

SPY AGENT BASED SECURE DATA AGGREGATION IN WSN

SPY AGENT BASED SECURE DATA AGGREGATION IN WSN ISSN: 2229-6948(ONLINE) ICTACT JOURNAL ON COMMUNICATION TECHNOLOGY, DECEMBER 214, VOLUME: 5, ISSUE: 4 SPY AGENT BASED SECURE DATA AGGREGATION IN WSN T. Lathies Bhasker 1 and G. Arul Jagan 2 1 Department

More information

ISSN: 2319-5967 ISO 9001:2008 Certified International Journal of Engineering Science and Innovative Technology (IJESIT) Volume 2, Issue 5, September

ISSN: 2319-5967 ISO 9001:2008 Certified International Journal of Engineering Science and Innovative Technology (IJESIT) Volume 2, Issue 5, September Analysis and Implementation of IEEE 802.11 MAC Protocol for Wireless Sensor Networks Urmila A. Patil, Smita V. Modi, Suma B.J. Associate Professor, Student, Student Abstract: Energy Consumption in Wireless

More information

An Efficient Hybrid Data Gathering Scheme in Wireless Sensor Networks

An Efficient Hybrid Data Gathering Scheme in Wireless Sensor Networks An Efficient Hybrid Data Gathering Scheme in Wireless Sensor Networks Ayon Chakraborty 1, Swarup Kumar Mitra 2, and M.K. Naskar 3 1 Department of CSE, Jadavpur University, Kolkata, India 2 Department of

More information

CHAPTER 1 INTRODUCTION

CHAPTER 1 INTRODUCTION 21 CHAPTER 1 INTRODUCTION 1.1 PREAMBLE Wireless ad-hoc network is an autonomous system of wireless nodes connected by wireless links. Wireless ad-hoc network provides a communication over the shared wireless

More information

Optimization of AODV routing protocol in mobile ad-hoc network by introducing features of the protocol LBAR

Optimization of AODV routing protocol in mobile ad-hoc network by introducing features of the protocol LBAR Optimization of AODV routing protocol in mobile ad-hoc network by introducing features of the protocol LBAR GUIDOUM AMINA University of SIDI BEL ABBES Department of Electronics Communication Networks,

More information

A NOVEL RESOURCE EFFICIENT DMMS APPROACH

A NOVEL RESOURCE EFFICIENT DMMS APPROACH A NOVEL RESOURCE EFFICIENT DMMS APPROACH FOR NETWORK MONITORING AND CONTROLLING FUNCTIONS Golam R. Khan 1, Sharmistha Khan 2, Dhadesugoor R. Vaman 3, and Suxia Cui 4 Department of Electrical and Computer

More information

MAXIMIZING THE LIFETIME OF NETWORK SECURITY BY DSDV PROTOCOL USING GAME THEORY TECHNIQUES IN WIRELESS SENSOR NETWORK

MAXIMIZING THE LIFETIME OF NETWORK SECURITY BY DSDV PROTOCOL USING GAME THEORY TECHNIQUES IN WIRELESS SENSOR NETWORK MAXIMIZING THE LIFETIME OF NETWORK SECURITY BY DSDV PROTOCOL USING GAME THEORY TECHNIQUES IN WIRELESS SENSOR NETWORK 1 V. Vinoba, 2 P.Hema 1 Department of Mathematics, K.N. Government Arts college, (India)

More information

SECURE DATA TRANSMISSION USING INDISCRIMINATE DATA PATHS FOR STAGNANT DESTINATION IN MANET

SECURE DATA TRANSMISSION USING INDISCRIMINATE DATA PATHS FOR STAGNANT DESTINATION IN MANET SECURE DATA TRANSMISSION USING INDISCRIMINATE DATA PATHS FOR STAGNANT DESTINATION IN MANET MR. ARVIND P. PANDE 1, PROF. UTTAM A. PATIL 2, PROF. B.S PATIL 3 Dept. Of Electronics Textile and Engineering

More information

COMPARATIVE ANALYSIS OF ON -DEMAND MOBILE AD-HOC NETWORK

COMPARATIVE ANALYSIS OF ON -DEMAND MOBILE AD-HOC NETWORK www.ijecs.in International Journal Of Engineering And Computer Science ISSN:2319-7242 Volume 2 Issue 5 May, 2013 Page No. 1680-1684 COMPARATIVE ANALYSIS OF ON -DEMAND MOBILE AD-HOC NETWORK ABSTRACT: Mr.Upendra

More information

ssumathy@vit.ac.in upendra_mcs2@yahoo.com

ssumathy@vit.ac.in upendra_mcs2@yahoo.com S. Sumathy 1 and B.Upendra Kumar 2 1 School of Computing Sciences, VIT University, Vellore-632 014, Tamilnadu, India ssumathy@vit.ac.in 2 School of Computing Sciences, VIT University, Vellore-632 014,

More information

Performance Evaluation of AODV, OLSR Routing Protocol in VOIP Over Ad Hoc

Performance Evaluation of AODV, OLSR Routing Protocol in VOIP Over Ad Hoc (International Journal of Computer Science & Management Studies) Vol. 17, Issue 01 Performance Evaluation of AODV, OLSR Routing Protocol in VOIP Over Ad Hoc Dr. Khalid Hamid Bilal Khartoum, Sudan dr.khalidbilal@hotmail.com

More information

How To Balance Network Load In A Wireless Sensor Network

How To Balance Network Load In A Wireless Sensor Network Balancing Network Traffic Load in Geographic Hash Table (GHT) R. Asha, V.Manju, Meka Sindhu & T. Subha Department of Information Technology, Sri Sai Ram Engineering College, Chennai. E-mail : ashaniteesh@gmail.com,

More information

An Energy Efficient Location Service for Mobile Ad Hoc Networks

An Energy Efficient Location Service for Mobile Ad Hoc Networks An Energ Efficient Location Service for Mobile Ad Hoc Networks Zijian Wang 1, Euphan Bulut 1 and Boleslaw K. Szmanski 1, 1 Department of Computer Science, Rensselaer Poltechnic Institute, Tro, NY 12180

More information

Figure 1. The Example of ZigBee AODV Algorithm

Figure 1. The Example of ZigBee AODV Algorithm TELKOMNIKA Indonesian Journal of Electrical Engineering Vol.12, No.2, February 2014, pp. 1528 ~ 1535 DOI: http://dx.doi.org/10.11591/telkomnika.v12i2.3576 1528 Improving ZigBee AODV Mesh Routing Algorithm

More information

A Routing Algorithm Designed for Wireless Sensor Networks: Balanced Load-Latency Convergecast Tree with Dynamic Modification

A Routing Algorithm Designed for Wireless Sensor Networks: Balanced Load-Latency Convergecast Tree with Dynamic Modification A Routing Algorithm Designed for Wireless Sensor Networks: Balanced Load-Latency Convergecast Tree with Dynamic Modification Sheng-Cong Hu r00631036@ntu.edu.tw Jen-Hou Liu r99631038@ntu.edu.tw Min-Sheng

More information

Dynamic Antenna Mode Selection for Link Maintenances in Mobile Ad Hoc Network

Dynamic Antenna Mode Selection for Link Maintenances in Mobile Ad Hoc Network Dynamic Antenna Mode Selection for Link Maintenances in Mobile Ad Hoc Network P. Shiva Kumar $, Rinki Sharma *, G.Varaprasad # $ Department of Information Technology Acharya Institute of Management and

More information

PERFORMANCE STUDY AND SIMULATION OF AN ANYCAST PROTOCOL FOR WIRELESS MOBILE AD HOC NETWORKS

PERFORMANCE STUDY AND SIMULATION OF AN ANYCAST PROTOCOL FOR WIRELESS MOBILE AD HOC NETWORKS PERFORMANCE STUDY AND SIMULATION OF AN ANYCAST PROTOCOL FOR WIRELESS MOBILE AD HOC NETWORKS Reza Azizi Engineering Department, Bojnourd Branch, Islamic Azad University, Bojnourd, Iran reza.azizi@bojnourdiau.ac.ir

More information

A Catechistic Method for Traffic Pattern Discovery in MANET

A Catechistic Method for Traffic Pattern Discovery in MANET A Catechistic Method for Traffic Pattern Discovery in MANET R. Saranya 1, R. Santhosh 2 1 PG Scholar, Computer Science and Engineering, Karpagam University, Coimbatore. 2 Assistant Professor, Computer

More information

An Implementation of Secure Wireless Network for Avoiding Black hole Attack

An Implementation of Secure Wireless Network for Avoiding Black hole Attack An Implementation of Secure Wireless Network for Avoiding Black hole Attack Neelima Gupta Research Scholar, Department of Computer Science and Engineering Jagadguru Dattaray College of Technology Indore,

More information

International Journal of Advanced Research in Computer Science and Software Engineering

International Journal of Advanced Research in Computer Science and Software Engineering Volume 2, Issue 9, September 2012 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com An Experimental

More information

A NOVEL OVERLAY IDS FOR WIRELESS SENSOR NETWORKS

A NOVEL OVERLAY IDS FOR WIRELESS SENSOR NETWORKS A NOVEL OVERLAY IDS FOR WIRELESS SENSOR NETWORKS Sumanta Saha, Md. Safiqul Islam, Md. Sakhawat Hossen School of Information and Communication Technology The Royal Institute of Technology (KTH) Stockholm,

More information

Load-balancing Approach for AOMDV in Ad-hoc Networks R. Vinod Kumar, Dr.R.S.D.Wahida Banu

Load-balancing Approach for AOMDV in Ad-hoc Networks R. Vinod Kumar, Dr.R.S.D.Wahida Banu Load-balancing Approach for AOMDV in Ad-hoc Networks R. Vinod Kumar, Dr.R.S.D.Wahida Banu AP/ECE HOD/ECE Sona College of Technology, GCE, Salem. Salem. ABSTRACT Routing protocol is a challenging issue

More information

Comparison of WCA with AODV and WCA with ACO using clustering algorithm

Comparison of WCA with AODV and WCA with ACO using clustering algorithm Comparison of WCA with AODV and WCA with ACO using clustering algorithm Deepthi Hudedagaddi, Pallavi Ravishankar, Rakesh T M, Shashikanth Dengi ABSTRACT The rapidly changing topology of Mobile Ad hoc networks

More information

ROUTE MECHANISMS FOR WIRELESS ADHOC NETWORKS: -CLASSIFICATIONS AND COMPARISON ANALYSIS

ROUTE MECHANISMS FOR WIRELESS ADHOC NETWORKS: -CLASSIFICATIONS AND COMPARISON ANALYSIS International Journal of Science, Environment and Technology, Vol. 1, No 2, 2012, 72-79 ROUTE MECHANISMS FOR WIRELESS ADHOC NETWORKS: -CLASSIFICATIONS AND COMPARISON ANALYSIS Ramesh Kait 1, R. K. Chauhan

More information

Power Efficiency Metrics for Geographical Routing In Multihop Wireless Networks

Power Efficiency Metrics for Geographical Routing In Multihop Wireless Networks Power Efficiency Metrics for Geographical Routing In Multihop Wireless Networks Gowthami.A, Lavanya.R Abstract - A number of energy-aware routing protocols are proposed to provide the energy efficiency

More information

Detecting Multiple Selfish Attack Nodes Using Replica Allocation in Cognitive Radio Ad-Hoc Networks

Detecting Multiple Selfish Attack Nodes Using Replica Allocation in Cognitive Radio Ad-Hoc Networks Detecting Multiple Selfish Attack Nodes Using Replica Allocation in Cognitive Radio Ad-Hoc Networks Kiruthiga S PG student, Coimbatore Institute of Engineering and Technology Anna University, Chennai,

More information

Research Article ISSN 2277 9140 Copyright by the authors - Licensee IJACIT- Under Creative Commons license 3.0

Research Article ISSN 2277 9140 Copyright by the authors - Licensee IJACIT- Under Creative Commons license 3.0 INTERNATIONAL JOURNAL OF ADVANCES IN COMPUTING AND INFORMATION TECHNOLOGY An international, online, open access, peer reviewed journal Volume 2 Issue 2 April 2013 Research Article ISSN 2277 9140 Copyright

More information

A Topology-Aware Relay Lookup Scheme for P2P VoIP System

A Topology-Aware Relay Lookup Scheme for P2P VoIP System Int. J. Communications, Network and System Sciences, 2010, 3, 119-125 doi:10.4236/ijcns.2010.32018 Published Online February 2010 (http://www.scirp.org/journal/ijcns/). A Topology-Aware Relay Lookup Scheme

More information

Bandwidth Management Framework for Multicasting in Wireless Mesh Networks

Bandwidth Management Framework for Multicasting in Wireless Mesh Networks Bandwidth Management Framework for Multicasting in Wireless Mesh Networks Manaswi Saha and P. Venkata Krishna Abstract Wireless mesh networks (WMNs) provide a reliable and a scalable solution for multicasting.

More information

Mobile Security Wireless Mesh Network Security. Sascha Alexander Jopen

Mobile Security Wireless Mesh Network Security. Sascha Alexander Jopen Mobile Security Wireless Mesh Network Security Sascha Alexander Jopen Overview Introduction Wireless Ad-hoc Networks Wireless Mesh Networks Security in Wireless Networks Attacks on Wireless Mesh Networks

More information

Automated Reconfiguration Enabled Mesh Network based on Fuzzy Logic for Performance Improvement

Automated Reconfiguration Enabled Mesh Network based on Fuzzy Logic for Performance Improvement Automated Reconfiguration Enabled Mesh Network based on Fuzzy Logic for Performance Improvement Vijaykumar Naik Pawar M.Tech., Dept of CSE KLS Gogte Institute of Technology Udyambag, Belagavi, Karnataka,

More information

SECURE AND EFFICIENT ROUTE TRANSFER AND REPUTATION MANAGEMENT SYSTEM FOR GENERIC ADHOC NETWORK

SECURE AND EFFICIENT ROUTE TRANSFER AND REPUTATION MANAGEMENT SYSTEM FOR GENERIC ADHOC NETWORK SECURE AND EFFICIENT ROUTE TRANSFER AND REPUTATION MANAGEMENT SYSTEM FOR GENERIC ADHOC NETWORK Paulraj*1, A.Syam Prasad*2 M.Tech (CSE) Student, Department of CSE, MRCET, Kompally, Hyderabad, A.P, India

More information

The Feasibility of SET-IBS and SET-IBOOS Protocols in Cluster-Based Wireless Sensor Network

The Feasibility of SET-IBS and SET-IBOOS Protocols in Cluster-Based Wireless Sensor Network The Feasibility of SET-IBS and SET-IBOOS Protocols in Cluster-Based Wireless Sensor Network R.Anbarasi 1, S.Gunasekaran 2 P.G. Student, Department of Computer Engineering, V.S.B Engineering College, Karur,

More information

Dipak Wajgi Dept. of Computer Science and Engineering Ramdeobaba College of Engg. and Management Nagpur, India

Dipak Wajgi Dept. of Computer Science and Engineering Ramdeobaba College of Engg. and Management Nagpur, India Load Balancing Algorithms in Wireless Sensor Network : A Survey Dipak Wajgi Dept. of Computer Science and Engineering Ramdeobaba College of Engg. and Management Nagpur, India Dr. Nileshsingh V. Thakur

More information

A Novel Multi Ring Forwarding Protocol for Avoiding the Void Nodes for Balanced Energy Consumption

A Novel Multi Ring Forwarding Protocol for Avoiding the Void Nodes for Balanced Energy Consumption International Journal of Computer Sciences and Engineering Open Access Review Paper Volume-4, Issue-4 E-ISSN: 2347-2693 A Novel Multi Ring Forwarding Protocol for Avoiding the Void Nodes for Balanced Energy

More information

15 th TF-Mobility Meeting Sensor Networks. Torsten Braun Universität Bern braun@iam.unibe.ch www.iam.unibe.ch/~rvs

15 th TF-Mobility Meeting Sensor Networks. Torsten Braun Universität Bern braun@iam.unibe.ch www.iam.unibe.ch/~rvs 15 th TF-Mobility Meeting Sensor Networks Torsten Braun Universität Bern braun@iam.unibe.ch www.iam.unibe.ch/~rvs Overview 2 Ubiquitous Computing > Vision defined by Mark Weiser in 1991 Seamless integration

More information

Manet Load Balancing Parallel Routing Protocol

Manet Load Balancing Parallel Routing Protocol www.ijcsi.org 187 Manet Load Balancing Parallel Routing Protocol Hesham A. Ali 1, Taher T. Hamza 2 and Shadia Sarhan 3 1 Faculty of Engineering, Mansoura University, Mansoura,Egypt 2 Faculty of Computers

More information

Path Selection Analysis in MPLS Network Based on QoS

Path Selection Analysis in MPLS Network Based on QoS Cumhuriyet Üniversitesi Fen Fakültesi Fen Bilimleri Dergisi (CFD), Cilt:36, No: 6 Özel Sayı (2015) ISSN: 1300-1949 Cumhuriyet University Faculty of Science Science Journal (CSJ), Vol. 36, No: 6 Special

More information

A Routing Metric for Load-Balancing in Wireless Mesh Networks

A Routing Metric for Load-Balancing in Wireless Mesh Networks A Routing Metric for Load-Balancing in Wireless Mesh Networks Liang Ma and Mieso K. Denko Department of Computing and Information Science University of Guelph, Guelph, Ontario, Canada, N1G 2W1 email: {lma02;mdenko}@uoguelph.ca

More information

Load Balancing Routing Algorithm among Multiple Gateways in MANET with Internet Connectivity

Load Balancing Routing Algorithm among Multiple Gateways in MANET with Internet Connectivity Load Balancing Routing Algorithm among Multiple Gateways in MANET with Internet Connectivity Yonghang Yan*, Linlin Ci*, Ruiping Zhang**, Zhiming Wang* *School of Computer Science, Beiing Institute of Technology,

More information

Optimized Load Balancing Mechanism Using Carry Forward Distance

Optimized Load Balancing Mechanism Using Carry Forward Distance Optimized Load Balancing Mechanism Using Carry Forward Distance Ramandeep Kaur 1, Gagandeep Singh 2, Sahil 3 1 M. Tech Research Scholar, Chandigarh Engineering College, Punjab, India 2 Assistant Professor,

More information

A Novel Approach for Load Balancing In Heterogeneous Cellular Network

A Novel Approach for Load Balancing In Heterogeneous Cellular Network A Novel Approach for Load Balancing In Heterogeneous Cellular Network Bittu Ann Mathew1, Sumy Joseph2 PG Scholar, Dept of Computer Science, Amal Jyothi College of Engineering, Kanjirappally, Kerala, India1

More information

A Survey on Reduction in Energy Consumption by Improved AODV on Mobile Ad Hoc Network

A Survey on Reduction in Energy Consumption by Improved AODV on Mobile Ad Hoc Network International Journal of Computer Sciences and Engineering Open Access Review Paper Volume-4, Issue-2 E-ISSN: 2347-2693 A Survey on Reduction in Energy Consumption by Improved AODV on Mobile Ad Hoc Network

More information

Load Balanced Data Transmission within the Probabilistic Wireless Sensor Network

Load Balanced Data Transmission within the Probabilistic Wireless Sensor Network Load Balanced Data Transmission within the Probabilistic Wireless Sensor Network Jyoti P.Desai 1, Prof Abhijit Patil 2 1 Student, ME Computer Engineering, Yadavrao Tasgaonkar college of Engineering and

More information

SBSCET, Firozpur (Punjab), India

SBSCET, Firozpur (Punjab), India Volume 3, Issue 9, September 2013 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Layer Based

More information

Hybrid Energy Efficient Distributed Protocol for Heterogeneous Wireless Sensor Network

Hybrid Energy Efficient Distributed Protocol for Heterogeneous Wireless Sensor Network International Journal of Computer Applications (975 8887) Volume 4 No.6, July 21 Hybrid Energy Efficient Distributed Protocol for Heterogeneous Wireless Sensor Network Harneet Kour Department of Computer

More information

A Novel Technique to Isolate and Detect Jamming Attack in MANET

A Novel Technique to Isolate and Detect Jamming Attack in MANET International Journal of Computer Sciences and Engineering Open Access Research Paper Volume-4, Issue-3 E-ISSN: 2347-2693 A Novel Technique to Isolate and Detect Jamming Attack in MANET Harkiranpreet Kaur

More information

SIMULATION STUDY OF BLACKHOLE ATTACK IN THE MOBILE AD HOC NETWORKS

SIMULATION STUDY OF BLACKHOLE ATTACK IN THE MOBILE AD HOC NETWORKS Journal of Engineering Science and Technology Vol. 4, No. 2 (2009) 243-250 School of Engineering, Taylor s University College SIMULATION STUDY OF BLACKHOLE ATTACK IN THE MOBILE AD HOC NETWORKS SHEENU SHARMA

More information

Behavior Analysis of TCP Traffic in Mobile Ad Hoc Network using Reactive Routing Protocols

Behavior Analysis of TCP Traffic in Mobile Ad Hoc Network using Reactive Routing Protocols Behavior Analysis of TCP Traffic in Mobile Ad Hoc Network using Reactive Routing Protocols Purvi N. Ramanuj Department of Computer Engineering L.D. College of Engineering Ahmedabad Hiteishi M. Diwanji

More information

LOAD BALANCING AS A STRATEGY LEARNING TASK

LOAD BALANCING AS A STRATEGY LEARNING TASK LOAD BALANCING AS A STRATEGY LEARNING TASK 1 K.KUNGUMARAJ, 2 T.RAVICHANDRAN 1 Research Scholar, Karpagam University, Coimbatore 21. 2 Principal, Hindusthan Institute of Technology, Coimbatore 32. ABSTRACT

More information

II RELATED PROTOCOLS. Dynamic Source Routing (DSR)

II RELATED PROTOCOLS. Dynamic Source Routing (DSR) ENERGY AWEAR LOAD BALANCING IN MOBILE AD HOC NETWORK Prof. Uma Nagaraj Computer Engineering Maharashtra Academy of Engg. Alandi (D) Pune, India Shwetal Patil (Student) Computer Engineering Maharashtra

More information

Lecture 2.1 : The Distributed Bellman-Ford Algorithm. Lecture 2.2 : The Destination Sequenced Distance Vector (DSDV) protocol

Lecture 2.1 : The Distributed Bellman-Ford Algorithm. Lecture 2.2 : The Destination Sequenced Distance Vector (DSDV) protocol Lecture 2 : The DSDV Protocol Lecture 2.1 : The Distributed Bellman-Ford Algorithm Lecture 2.2 : The Destination Sequenced Distance Vector (DSDV) protocol The Routing Problem S S D D The routing problem

More information

ENHANCED GREEN FIREWALL FOR EFFICIENT DETECTION AND PREVENTION OF MOBILE INTRUDER USING GREYLISTING METHOD

ENHANCED GREEN FIREWALL FOR EFFICIENT DETECTION AND PREVENTION OF MOBILE INTRUDER USING GREYLISTING METHOD ENHANCED GREEN FIREWALL FOR EFFICIENT DETECTION AND PREVENTION OF MOBILE INTRUDER USING GREYLISTING METHOD G.Pradeep Kumar 1, R.Chakkaravarthy 2, S.Arun kishorre 3, L.S.Sathiyamurthy 4 1- Assistant Professor,

More information

Keywords- manet, routing protocols, aodv, olsr, grp,data drop parameter.

Keywords- manet, routing protocols, aodv, olsr, grp,data drop parameter. Volume 5, Issue 3, March 2015 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Evaluation of

More information

Mobile Network Analysis - Hole Healing

Mobile Network Analysis - Hole Healing , pp.143-150 http://dx.doi.org/10.14257/ijfgcn.2013.6.6.15 Decentralized Mobile Sensor Navigation for Hole Healing Policy in Wireless Hybrid Sensor Networks Fu-Tian Lin 1, 2, Chu-Sing Yang 1, Tien-Wen

More information

A Well-organized Dynamic Bandwidth Allocation Algorithm for MANET

A Well-organized Dynamic Bandwidth Allocation Algorithm for MANET A Well-organized Dynamic Bandwidth Allocation Algorithm for MANET S.Suganya Sr.Lecturer, Dept. of Computer Applications, TamilNadu College of Engineering, Coimbatore, India Dr.S.Palaniammal Prof.& Head,

More information

Achieving Energy Efficiency in MANETs by Using Load Balancing Approach

Achieving Energy Efficiency in MANETs by Using Load Balancing Approach International Journal of Computer Networks and Communications Security VOL. 3, NO. 3, MARCH 2015, 88 94 Available online at: www.ijcncs.org E-ISSN 2308-9830 (Online) / ISSN 2410-0595 (Print) Achieving

More information

A Dynamic Approach for Load Balancing using Clusters

A Dynamic Approach for Load Balancing using Clusters A Dynamic Approach for Load Balancing using Clusters ShwetaRajani 1, RenuBagoria 2 Computer Science 1,2,Global Technical Campus, Jaipur 1,JaganNath University, Jaipur 2 Email: shwetarajani28@yahoo.in 1

More information

TRUST MANAGEMENT SCHEMES FOR INTRUSION DETECTION SYSTEMS -A SURVEY

TRUST MANAGEMENT SCHEMES FOR INTRUSION DETECTION SYSTEMS -A SURVEY TRUST MANAGEMENT SCHEMES FOR INTRUSION DETECTION SYSTEMS -A SURVEY 1 DEEPA S, 2 SUPRIYA M 1,2 Department of Computer Science and Engineering, Amrita School of Engineering, Amrita Vishwa Vidyapeetham, Bangalore,

More information

Partition-based Network Load Balanced Routing in Large Scale Multi-sink Wireless Sensor Networks

Partition-based Network Load Balanced Routing in Large Scale Multi-sink Wireless Sensor Networks Department of Electrical Engineering, Mathematics and Computer Science Partition-based Network Load Balanced Routing in Large Scale Multi-sink Wireless Sensor Networks Master Thesis Thijs Mutter 439 Supervisors

More information

Load balancing as a strategy learning task

Load balancing as a strategy learning task Scholarly Journal of Scientific Research and Essay (SJSRE) Vol. 1(2), pp. 30-34, April 2012 Available online at http:// www.scholarly-journals.com/sjsre ISSN 2315-6163 2012 Scholarly-Journals Review Load

More information

On Reliability of Dynamic Addressing Routing Protocols in Mobile Ad Hoc Networks

On Reliability of Dynamic Addressing Routing Protocols in Mobile Ad Hoc Networks On Reliability of Dynamic Addressing Routing Protocols in Mobile Ad Hoc Networks Marcello Caleffi, Giancarlo Ferraiuolo, Luigi Paura Department of Electronic and Telecommunication Engineering (DIET) University

More information

POWER AWARE QOS MULTIPATH ROUTING PROTOCOL FOR DISASTER RECOVERY NETWORKS

POWER AWARE QOS MULTIPATH ROUTING PROTOCOL FOR DISASTER RECOVERY NETWORKS POWER AWARE QOS MULTIPATH ROUTING PROTOCOL FOR DISASTER RECOVERY NETWORKS ABSTRACT S.Santhi 1, Dr.G.Sudha Sadasivam 2 1 Department of Information Technology,Dr.NGP Institute of Technology,Coimbatore,India

More information

Security Scheme for Distributed DoS in Mobile Ad Hoc Networks

Security Scheme for Distributed DoS in Mobile Ad Hoc Networks Security Scheme for Distributed DoS in Mobile Ad Hoc Networks Sugata Sanyal 1, Ajith Abraham 2, Dhaval Gada 3, Rajat Gogri 3, Punit Rathod 3, Zalak Dedhia 3 and Nirali Mody 3 1 School of Technology and

More information

TOPOLOGIES NETWORK SECURITY SERVICES

TOPOLOGIES NETWORK SECURITY SERVICES TOPOLOGIES NETWORK SECURITY SERVICES 1 R.DEEPA 1 Assitant Professor, Dept.of.Computer science, Raja s college of Tamil Studies & Sanskrit,Thiruvaiyaru ABSTRACT--In the paper propose about topology security

More information

Load Balancing and Resource Reservation in Mobile Ad-Hoc Networks 1

Load Balancing and Resource Reservation in Mobile Ad-Hoc Networks 1 Load Balancing and Resource Reservation in Mobile Ad-Hoc Networks 1 Gautam Chakrabarti Sandeep Kulkarni Department of Computer Science and Engineering Michigan State University Abstract To ensure uninterrupted

More information

Load Balancing of Web Server System Using Service Queue Length

Load Balancing of Web Server System Using Service Queue Length Load Balancing of Web Server System Using Service Queue Length Brajendra Kumar 1, Dr. Vineet Richhariya 2 1 M.tech Scholar (CSE) LNCT, Bhopal 2 HOD (CSE), LNCT, Bhopal Abstract- In this paper, we describe

More information

ISSN: 2321-7782 (Online) Volume 2, Issue 2, February 2014 International Journal of Advance Research in Computer Science and Management Studies

ISSN: 2321-7782 (Online) Volume 2, Issue 2, February 2014 International Journal of Advance Research in Computer Science and Management Studies ISSN: 2321-7782 (Online) Volume 2, Issue 2, February 2014 International Journal of Advance Research in Computer Science and Management Studies Research Article / Paper / Case Study Available online at:

More information

Power Aware Routing in Ad Hoc Wireless Networks

Power Aware Routing in Ad Hoc Wireless Networks Power Aware Routing in Ad Hoc Wireless Networks Vinay Rishiwal 1, Mano Yadav 2, S. Verma 3, S. K. Bajapai 4 1 MJP Rohilkhand University, Bareilly,UP, India. 2 ITS Engineering College, Greater Noida, UP,

More information

Load Balancing Routing Algorithm for Data Gathering Sensor Network

Load Balancing Routing Algorithm for Data Gathering Sensor Network Load Balancing Routing Algorithm for Data Gathering Sensor Network Evgeny Bakin, Grigory Evseev State University of Aerospace Instrumentation Saint-Petersburg, Russia {jenyb, egs}@vu.spb.ru Denis Dorum

More information

Fast and Secure Data Transmission by Using Hybrid Protocols in Mobile Ad Hoc Network

Fast and Secure Data Transmission by Using Hybrid Protocols in Mobile Ad Hoc Network Middle-East Journal of Scientific Research 15 (9): 1290-1294, 2013 ISSN 1990-9233 IDOSI Publications, 2013 DOI: 10.5829/idosi.mejsr.2013.15.9.11514 Fast and Secure Data Transmission by Using Hybrid Protocols

More information

Event Processing Middleware for Wireless Sensor Networks

Event Processing Middleware for Wireless Sensor Networks Event Processing Middleware for Wireless Sensor Networks Selvakennedy Selvadurai University of Sydney Outline Introduction System Assumptions EPM Architecture Group Management and Centre Localisation Components

More information

Keywords Wireless Sensor Networks, energy efficient, security, security mechanisms. Figure 1. WSN Architecture

Keywords Wireless Sensor Networks, energy efficient, security, security mechanisms. Figure 1. WSN Architecture Volume 4, Issue 5, May 2014 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Secure Energy Efficient

More information

A Survey on Lifetime Maximization of Wireless Sensor Network using Load Balancing

A Survey on Lifetime Maximization of Wireless Sensor Network using Load Balancing A Survey on Lifetime Maximization of Wireless Sensor Network using Load Balancing Radhika Sarad, Kiran Bhame, Vaibhav Wabale, Amol Katake B.E. Students, Dept. of Computer Engineering, KJCOEMR, Pune, Maharashtra,

More information

Adaptive Multiple Metrics Routing Protocols for Heterogeneous Multi-Hop Wireless Networks

Adaptive Multiple Metrics Routing Protocols for Heterogeneous Multi-Hop Wireless Networks Adaptive Multiple Metrics Routing Protocols for Heterogeneous Multi-Hop Wireless Networks Lijuan Cao Kashif Sharif Yu Wang Teresa Dahlberg Department of Computer Science, University of North Carolina at

More information

Adaptive Bandwidth Management and QoS Provisioning in Large Scale Ad Hoc Networks

Adaptive Bandwidth Management and QoS Provisioning in Large Scale Ad Hoc Networks Adaptive Bandwidth Management and QoS Provisioning in Large Scale Ad Hoc Networks Kaixin Xu, Ken Tang, Rajive Bagrodia Scalable Network Technologies, Inc. {xkx, ktang,rlb}@scalable-networks.com Mario Gerla

More information

Wireless Sensor Networks Chapter 3: Network architecture

Wireless Sensor Networks Chapter 3: Network architecture Wireless Sensor Networks Chapter 3: Network architecture António Grilo Courtesy: Holger Karl, UPB Goals of this chapter Having looked at the individual nodes in the previous chapter, we look at general

More information

A SECURE DATA TRANSMISSION FOR CLUSTER- BASED WIRELESS SENSOR NETWORKS IS INTRODUCED

A SECURE DATA TRANSMISSION FOR CLUSTER- BASED WIRELESS SENSOR NETWORKS IS INTRODUCED A SECURE DATA TRANSMISSION FOR CLUSTER- BASED WIRELESS SENSOR NETWORKS IS INTRODUCED J Karunamayi 1, Annapurna V K 2 1 Student, Computer Network and Engineering,The National Institute of Engineering, Mysuru,

More information

INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY

INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY A PATH FOR HORIZING YOUR INNOVATIVE WORK AN OVERVIEW OF MOBILE ADHOC NETWORK: INTRUSION DETECTION, TYPES OF ATTACKS AND

More information