Holes Detection in Wireless Sensor Networks: A Survey



Similar documents
AN EFFICIENT STRATEGY OF AGGREGATE SECURE DATA TRANSMISSION

Introduction to Wireless Sensor Network Security

An Implementation of Secure Wireless Network for Avoiding Black hole Attack

ISSN: (Online) Volume 2, Issue 2, February 2014 International Journal of Advance Research in Computer Science and Management Studies

A Security Architecture for. Wireless Sensor Networks Environmental

Wireless Sensor Network: Challenges, Issues and Research

Secure Routing in Wireless Sensor Networks

ENHANCED GREEN FIREWALL FOR EFFICIENT DETECTION AND PREVENTION OF MOBILE INTRUDER USING GREYLISTING METHOD

Security and Privacy Issues in Wireless Ad Hoc, Mesh, and Sensor Networks

Mobile Security Wireless Mesh Network Security. Sascha Alexander Jopen

Protecting Privacy Secure Mechanism for Data Reporting In Wireless Sensor Networks

Anomaly Intrusion Detection System in Wireless Sensor Networks: Security Threats and Existing Approaches

A Novel Pathway for Portability of Networks and Handing-on between Networks

Prediction of DDoS Attack Scheme

A Secure Intrusion detection system against DDOS attack in Wireless Mobile Ad-hoc Network Abstract

SECURITY ASPECTS IN MOBILE AD HOC NETWORK (MANETS)

Wireless Sensor Network Security. Seth A. Hellbusch CMPE 257

Security in Ad Hoc Network

Survey on Load balancing protocols in MANET S (mobile ad-hoc networks)

On Frequency Assignment in Cellular Networks

EBHEAL: Distributed and Localized Mechanism for Coverage Hole Detection and Healing

Preventing DDOS attack in Mobile Ad-hoc Network using a Secure Intrusion Detection System

Vulnerabilities of Intrusion Detection Systems in Mobile Ad-hoc Networks - The routing problem

International Journal of Advanced Research in Computer Science and Software Engineering

New System Security Model for a Mobile Operator s Meshed Access Network

CSC 774 Advanced Network Security. Outline. Related Work

Bandwidth Management Framework for Multicasting in Wireless Mesh Networks

A NOVEL OVERLAY IDS FOR WIRELESS SENSOR NETWORKS

Design of an U-slot Folded Shorted Patch Antenna for RF Energy Harvesting

A Dynamically Configurable Topology Control for Hybrid Ad Hoc Networks with Internet Gateways

LOAD BALANCING AND EFFICIENT CLUSTERING FOR IMPROVING NETWORK PERFORMANCE IN AD-HOC NETWORKS

Performance Evaluation of Wired and Wireless Local Area Networks

Optimal Hole Coverage Using Hole Detection and Replacing Algorithm in Wireless Sensor Networks

An Empirical Approach - Distributed Mobility Management for Target Tracking in MANETs

Dipak Wajgi Dept. of Computer Science and Engineering Ramdeobaba College of Engg. and Management Nagpur, India

CROSS LAYER BASED MULTIPATH ROUTING FOR LOAD BALANCING

INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY

Preventing Resource Exhaustion Attacks in Ad Hoc Networks

3-12 Autonomous Access Control among Nodes in Sensor Networks with Security Policies

QUALITY OF SERVICE METRICS FOR DATA TRANSMISSION IN MESH TOPOLOGIES

Load Balancing in Periodic Wireless Sensor Networks for Lifetime Maximisation

Internet Layer. Routing Tables. Routing in the Internet. Routing Protocols

An Efficient Hybrid Data Gathering Scheme in Wireless Sensor Networks

Research Article ISSN Copyright by the authors - Licensee IJACIT- Under Creative Commons license 3.0

Detecting Multiple Selfish Attack Nodes Using Replica Allocation in Cognitive Radio Ad-Hoc Networks

An in-building multi-server cloud system based on shortest Path algorithm depending on the distance and measured Signal strength

Fast and Secure Data Transmission by Using Hybrid Protocols in Mobile Ad Hoc Network

Restricted and Mobile: Security in Mobile Wireless Sensor Networks Kısıtlı ve Hareketli: Mobil Telsiz Duyarga Ağlarında Güvenlik

Securing MANET Using Diffie Hellman Digital Signature Scheme

Design of Remote data acquisition system based on Internet of Things

Security Threats in Mobile Ad Hoc Networks

Dynamic and Adaptive Organization of Data-Collection Infrastructures in Sustainable Wireless Sensor Networks

Load Balanced Link Reversal Routing in Wireless Ad Hoc Networks

SECURITY KEY MANAGEMENT AND AUTHENTICATION SCHEME FOR WIRELESS SENSOR NETWORKS

A REVIEW: MOBILE AD-HOC NETWORK PROTOCOLS AND SECURITY ISSUES

Energy Effective Routing Protocol for Maximizing Network Lifetime of WSN

A Secure Data Transmission for Cluster based Wireless Sensor Network Using LEACH Protocol

Provide Practical Security Mechanism to Wireless Sensor Networks Using Modified Motesec Protocol

Simulation Analysis of Different Routing Protocols Using Directional Antenna in Qualnet 6.1

Guide for Performing a Wireless Site Survey. 2.4 GHz IEEE g/802.11b/

RT-QoS for Wireless ad-hoc Networks of Embedded Systems

Denial of Service in Sensor Networks

On Game Theory for Load Balancing in Wireless Networks

Some Security Trends over Wireless Sensor Networks

A Novel Approach for Load Balancing In Heterogeneous Cellular Network

Reproduction of Load Balancing optimal Solution Using Multi Hop Wireless Sensor Networks

An Efficient Energy-Aware Coverage- Preserving Hierarchical Routing Protocol for WSN

Analysis of Denial-of-Service attacks on Wireless Sensor Networks Using Simulation

PEDAMACS: Power efficient and delay aware medium access protocol for sensor networks

Congestion Control in WSN using Cluster and Adaptive Load Balanced Routing Protocol

Quality of Service Routing Network and Performance Evaluation*

SECURE AND RELIABLE DATA TRANSMISSION IN WIRELESS SENSOR NETWORKS

Energy Efficient Load Balancing among Heterogeneous Nodes of Wireless Sensor Network

Design of Simple and Efficient Revocation List Distribution in Urban areas for VANET s

Implementation of Energy Efficient Adaptive Load Balancing Algorithm by Rainbow Mechanism in Wireless Sensor Networks

Transcription:

I.J. Modern ducation and omputer cience, 204, 4, 24-30 Published Online pril 204 in M (http://www.mecs-press.org/) OI: 0.585/ijmecs.204.04.04 s etection in Wireless ensor Networks: urvey mita Karmakar epartment of Information Technology, Tripura University, uryamaninagar, India mail: smita_bcatu@rediffmail.com lak Roy epartment of Information Technology, Tripura University, uryamaninagar, India mail: alakroy@tripurauniv.in bstract Now a day s, it has been a great idea of research on using Wireless ensor Networks (WNs) to assist in the initial deployment of sensor nodes. problem in WNs is the most fundamental Problem in WNs. means a communication gap in WNs. inding an optimal sensor deployment strategy that would minimize the cost, reduce the node failure and also reduce the communication overhead. Then it provides a maximum degree of with lower cost of deployment of sensor nodes, best possible communication and maintaining the network connectivity. However, it increases the quality of service in WNs that is extremely challenging. In this article, we present various types of holes, a comparative study of various types of holes and various types of holes. t the end, we proposed an lgorithm to detect hole. In this paper, we aim to give the solution of hole problems of in WNs. Index Terms s, overage, detection, ize estimation of hole. I. INTROUTION wireless sensor networks (WNs) consist of distributed autonomous sensor-nodes to monitor physical or environmental characteristics, such as temperature, humidity, sound, pollution levels, pressure, direction and wind speed etc. In WNs, data is transferred from one sensor node to another sensor node through the network []. The WNs are bi-directional. The applications of WNs are military applications, many industrial and consumer applications, monitoring etc [2]. possible example of WNs architecture is given in fig., where red colored solid lines represent all the possible communication links and orange color dashed represent sensing, blue colored circles represent all the sensors. black colored line represents communication lines between sender and receiver.. ubsystems in WNs WN consists of three subsystems those are [3]: ) ensor subsystem: It senses the with the help of properties like humidity, pressure, temperature etc. 2) processing sub system: It provides local commutation processes on sensed message. 3) ommunication subsystem: ach sensor communicate with any other sensors by transferring the message.. haracteristics of a WNs The main characteristics [4] of WNs are: Power consumption constrains for nodes using batteries or energy harvesting bility to cope with sensor node failures Mobility of sensor nodes ommunication calability to the large of deployment bility to monitor environmental conditions ase of use The rest of the paper is organized as follows. In ection II, holes in WNs, different types of holes are discussed. In ection III, we have discussed existing solutions to hole detection. Proposed algorithm for hole detection is given in ection IV. inally the paper concludes with future research direction in ection V. ensor Node Gateway ensor Node ig. n example of WNs architecture. opyright 204 M I.J. Modern ducation and omputer cience, 204, 4, 24-30

s etection in Wireless ensor Networks: urvey 25 overage ased on static sensor Routing rea Point arrier Jamming ased on moving sensor Trap lac k Worm II. HOL IN WN s are one of the challenges in deployment of WNs in a large. s generally considered as a communication gap among sensor nodes. taxonomy of various types of holes are given in ig 2, they are hole, Routing hole, Jamming hole, ink/lack hole and Worm hole. comparative study of various types of holes are given in Table with their basic mechanisms and features. ig 2. Taxonomy of various types of s in WNs. Table : omparative study of various types of holes. Type ensor Node tatus Mechanism eatures overage live overage holes depend upon various factors, such as buildings, mountains, technologies, and radio frequency Unintentional, communication is not possible in that region Routing ead (failured) or act as dead. ue to failure of the sensor node, holes are created Routing hole can be unintentional Jamming ctive ue to radio frequency in the communication way among the sensors Jamming holes are created Jamming hole can be unintentional or deliberate lack/ink Worm ender and Receiver are alive ender and Receiver Nodes are alive, but they are attacked by enial of ervice attack. When incoming or outgoing or both traffic is discarded, without informing the sender, then the data can not reach to its intended receiver Malicious nodes create a tunnel among themselves. They start forwarding packets and receives from one part of the network to the other end of the tunnel using a separate communication radio channel,then worm holes are created. aused for limited bandwidth and channel accessed by neighboring sensors It causes nodes located in different parts of networks to believe that they are neighbors, resulting in incorrect routing convergence. overage One main fundamental issue in WNs is problem (i.e. holes). overage of a sensor node means that the geographic where the sensor node can communicate with other sensor nodes in WNs. overage of a sensor node mainly depends on two factors. These are - (i) the range (i.e. ) and sensitivity of that sensing nodes, and (ii) density and location of that sensing node in a given region. overage holes depend upon various factors, such as buildings, mountains, technologies, and radio frequency etc. There are various types of holes. These are described below: overage problem in WNs can be categorized into two sub types; they are ased on static object (sensor) and ased on moving object (sensor). i. ased on static sensor ased on static sensor/object problem in WNs can be categorized into the following types: a) rea overage: The main objective of any sensor network is to cover a geographical. ensors may cover a geographical by different shapes as shown in fig. 3, they are circular- or angle- or triangular- or square- [5]. ircular ngle Triangular quare ig 3. ifferent shapes in geographical are covered by sensor. opyright 204 M I.J. Modern ducation and omputer cience, 204, 4, 24-30

26 s etection in Wireless ensor Networks: urvey s exist in a geographical due to improper positioning of sensor nodes in that as shown in fig. 4(a), fig. 5, fig. 7, fig. 9. ut such problems can be solved by proper positioning of sensor nodes so that nodes can cover and sense the geographical without any gap as shown in fig. 4(b), fig. 6, fig. 8, fig. 0. ig 0. quare- geographical without hole. b) Point overage : In the point problem, the objective is to cover a set of points. Here, a particular point of is covered and rest is not covered. This is due to insufficient of sensor nodes deployed than required. ig 4. (a) in circular- geographical (b) ircular- geographical without hole. ig. Point overage. ig 5. in ngular- geographical. ig 6. ngular- geographical without hole. c) arrier overage: The barrier is the with the goal of minimizing the probability of undetected penetration through the barrier in sensor network. In ig 2, mountain is the barrier that separates both the (a) and (b). Here, (a) is covered by all the sensors. ut, due to the barrier, (b) is not covered by the sensors. ig 7. in Triangular- geographical. ig 2. arrier overage. ii. ased on moving sensor: ased on moving sensors/objects can be ig 8. Triangular- geographical without hole. ig 9. in quare- geographical. a) Trap overage : new model of, called trap overage that scales well with large deployment region. sensor network providing trap guarantees that any moving object or phenomena can move at most a (known) displacement before it is guaranteed to be detected by the network, for any trajectory and speed. In the below fig3, deployment, d is the diameter of the largest hole. lthough the diameter line intersects this covered, it still represents the largest displacement that a moving object can travel without being detected in the target region. comparative study of various types of holes are given in Table 2. opyright 204 M I.J. Modern ducation and omputer cience, 204, 4, 24-30

s etection in Wireless ensor Networks: urvey 27 ig 3. Trap overage. Routing : Routing hole is one type of hole where either sensor nodes are not active or the active sensor nodes can not participate in the actual routing of the data due to several reasons. These holes in WNs can be formed either due to some problems in wireless links or because of failure of sensor nodes due to several reasons such as battery depletion, external events (such as fire), natural obstacles or disaster suffered s. Routing hole is shown in fig 4, where node c can not participate in routing process. T T I N OR MO VI NG N OR Table 2: comparative study of different types of. Types of overage Mechanism Limitation enefit r e a o v e r a g e ircular ngle Triangle quare Point overage arrier overage Trap overage geographical circularly. ngle- geographical. Triangle- geographical. quare- geographical. ensors cover a set of points. set of sensors randomly deployed to cover a set of points. The goal of barrier is minimizing the probability of undetected penetration through the barrier (sensor network). It scales well with large deployment region. Here, sensors are moving. When a large region is covered by circular, then, there may have some chances to become holes. Unintentionally, when this type of hole occurs, then communication is not possible in that region. When this type of hole occurs, then communication is not possible in that region. It also has probabilities to become holes. It covers small region. ) t the time of covering the region, when the network is bent down from the barrier, then it does not cover the whole region. That time it covers small. 2) It is complex, trying to cover whole region. ecause sensor waves can t penetrate the wall or barrier. 3) ensors may not be conveniently placed. i) moving object can travel within the target region without being detected. so, there is a probability to make a hole. ii) Very tough to maintain. It covers some region around the sensor. or angle region, it will be very useful when we want to covered an angle. ) asy to maintain. 2) ize of the hole is small. ) asy to maintain. 2) ize of the hole is small. It is simple to tackle. ) Number of waves is more in the region. g, (a) in fig 3. 2) Low bandwidth. i) ensors cover the region dynamically. ii) It uses moving sensors. opyright 204 M I.J. Modern ducation and omputer cience, 204, 4, 24-30

28 s etection in Wireless ensor Networks: urvey ig 4. (a) typical example of Routing.. ink/lack : In WNs, black or sink holes means a place, where incoming or outgoing or both traffic is discarded, without informing the sender(source) that the data did not reach its intended receiver(destination). lack hole can be detected by checking the lost traffic. The creation of sink hole is caused for limited bandwidth and channel accessed by neighboring sensor nodes. [7]. T High Traffic T2 ig 6. ink /lack R ig 4. (b) olution to a typical example of Routing.. Jamming jamming hole is another type of hole that can occur in tracking applications when the sensor node is tracked with jammers by jamming the radio frequency being used for communication among all the sensor nodes, here sensor node is able to find another sensor node in WNs, but unable to communicate among them because of communication jamming [5, 9]. Generally, jamming can be unintentional or deliberates. Unintentional jamming results if one or more sensor nodes continuously use the wireless channels to deny the communication facility among all the neighboring sensor nodes. In deliberate jamming, the opposition sensor node is trying to impair the communication among all the sensors nodes of the WNs by interfering with the communication ability of the sensor nodes [6]. ig. 5 depicts an example of jamming hole where node acts as jammer that radiates high radio frequency because of which all neighbor nodes cannot communicate with each other.. Worm : Worm hole is one kind of enial Of ervice(o) attack [8]. It is an active attack. Here, the contents of the original message are modified in some way. abrication causes O attack. abrication is possible in absence of proper authentication mechanism. Here all the malicious sensor nodes, located in different parts of WNs, form tunnels among themselves. They start forwarding data packets received at one part of the WNs to the other end of the tunnel using other communication channel. The receiving malicious sensor node then replays the message in other part of the WNs. This causes sensor nodes located in different parts of WNs to believe that they are neighbors, but resulting in incorrect routing convergence. 6 5 Tunnel 4 3 7 2 6 5 3 ig 5. Jamming Here jamming hole is roughly similar to the routing hole. ut routing hole is more dangerous than jamming hole, because, in jamming hole sensor nodes are alive, but in routing hole, sensor nodes are dead or act as dead. 4 High Radio requency ig 7. Worm In ig. 7, sensor node 3 and 6 create a tunnel between them, because of which sensor node and 4 can not communicate with sensor node 5 and 2 respectively. Next section gives an overview of existing solutions proposed by researcher to detect hole in WNs. III.XITING OLUTION TO HOL TTION In this section, we present two different solutions for hole detection proposed by researchers, they are vornoi diagram and triangular oriented diagram. 2 opyright 204 M I.J. Modern ducation and omputer cience, 204, 4, 24-30

s etection in Wireless ensor Networks: urvey 29. Voronoi iagram pproach Voronoi diagram approach is used to detect a hole and calculate the size of a hole [0, ]. Voronoi diagram consists of [2] N sensors s, s2,, sn. plane is divided into N cells. ach cell contains one sensor. Two Voronoi cells meet along a voronoi edge. sensor node is a voronoi neighbour of other sensor node, if they both share a voronoi edge. ig. 6 illustrates a Voronoi diagram approach in a plane. (failure). When the sensor node is dead, then the geographical is not covered by that sensor node, so this will be treated as hole. t first phase, cluster head sensor node sends a signal to each of the sensor node in the cluster geographically deployed over an. If anyone of the sensor nodes replies to the cluster head node, then that sensor node is alive or active, otherwise sensor node is dead. Using this algorithm, we can easily find out the alive nodes and dead nodes (or can referred as hole) in WNs. When a node is dead, then the sensing of this node will detect a hole in that. lgorithm ig 8. Illustration of using Voronoi diagram to detect a hole and decide the hole size.. Triangular Oriented iagram pproach One of the solutions to hole detection problem is triangular structure. uthors [2] use the triangular oriented diagram to calculate the size of hole exactly. ig. 9 shows triangular oriented structure that can be used to detect a hole and calculate the size of a hole [2]. ig 9. onstruction the triangular oriented structure. Voronoi diagram approach has few limitations like-here shape of each cell is different. o, it is very tough to calculate the exact size of the hole. The limitation of triangular oriented structure is that, it is not a proper hole detection solution because, in a large WNs, it is complex to connect the centre of three adjacent sensors. There are lots of research works going on in this [3, 4, 5, 6, 7, 8] to find a good and effective solution to find hole in a wireless sensor network. In the next section, we propose a simple but efficient hole detection algorithm. IV.PROPO LGORITHM OR HOL TTION: In this section, we have proposed a new algorithm to detect holes in WNs, the proposed algorithm initially find out whether a sensor node is alive (active) or dead i : integer /* ounter */ N : integer /* Number of sensor nodes in the list of WNs*/ List : array [0 to N-] of integer /* rray of sensor nodes */ Request : integer /* ender ignal */ Reply : integer /* Receiver ignal */ live-node : integer /* ctive sensor node */ ead-node : integer /* ead sensor node */ egin for all (i= to N) do begin send(request,node[i]); /* end a request from master sensor node to the sensor node[i] in the list of WNs */ wait(reply,node[i]); /* Wait for replies from sensor node[i] to master node */ nd; If (receiver(reply)==) then Mark(live); /* When receiver sensor node[i] replies, then marks the sensor node[i] as alive */ live-node := live-node + ; /* ount the number of alive nodes */ lse If (receiver(reply)!= ) then Mark(ead); /* When receiver sensor node[i] does not reply, then marks the sensor node[i] as dead */ ead-node := ead-node + ; /* ount the number of dead nodes */ nd if; nd for; We expect that the proposed algorithm for hole detection will work more efficiently than the others discussed in section III. nalysis and simulation of the proposed algorithm will be done in near future and we will do further research to find the exact solutions that will detect all type of the holes by minimizing the cost and maximizing the sensing with minimum number of sensor nodes. We will also try to find more efficient algorithm as a solutions to solve hole problem. opyright 204 M I.J. Modern ducation and omputer cience, 204, 4, 24-30

30 s etection in Wireless ensor Networks: urvey V.ONLUION N UTUR RRH IRTION In this paper, we considered the hole problem, which can be used to deal with sensor or node failure. We also proposed a simple and straight-forward algorithm to find out hole. In future, we would like to find out the exact amount of hole and exact size of each hole to give the exact solution for the hole problem in WNs. nd also we would try to get maximum without any hole by minimum sensors. RRN [] Y. Jennifer,. Mukherjee, and. Ghosal, "Wireless sensor network survey," omputer networks, 52 (), pp. 2292-2330, 2008. [2] I.. kyildiz, W. u, Y. ankarasubramaniam, and. ayirci, "Wireless sensor networks: a survey," omputer networks, 38 (4), pp. 393-422, 2002. [3].J Pottie and W.J. Kaiser, Wireless Integrated Network ensors, ommunication of the M, 43 (5), pp. 5-58, May 2000. [4] http://en.wikipedia.org/wiki/wireless_sensor_network# haracteristics. Last accessed on November 08, 203. [5].. Wood, J.. tankovic, and. H. on, JM: jammed- mapping service for sensor networks, In 24th I Real Time ystem ymposium (RT 03), pp. 286 298, ec 2003. [6]. Karlof and. Wagner, ecure routing in wireless sensor networks: ttacks and counter measures, In st I International Workshop NP 03, May 2003. [7].. Wood and J.. tankovic, enial of service in sensor networks, I omputer, 35(0), pp 48 56, Oct 2002. [8]. Ghiasi,. rivatava, X. Yang, and M. anafzadeh, Optimal nergy ware lustering in lustering in ensor Networks, in ensors, 2, pp. 258-269, eb 2002. [9] http://en.wikipedia.org/wiki/orography. Last accessed on November 08, 203. [0]. Ghosh, "stimating holes and enhancing in mixed sensor networks." In Local omputer Networks, 2004, 29th nnual I International onference on, I, pp. 68-76, 2004. [] G. Wang, G. ao, P. erman, T..L. Porta, idding protocols for deploying mobile sensors, I Transactions on Mobile omputing, 6(5), pp. 55 528, 2007. [2]. abaie, and.. Pirahesh. " detection for increasing in wireless sensor network using triangular structure", IJI International Journal of omputer cience Issues, 9(2), January 202. [3] H.. Jun, and Y.. Hua, ata ollection Method with Mobile ink Node in Wireless ensor Network, International Journal of Wireless and Microwave Technologies (IJWMT), 2(4), 46, 202. [4]. K. Nagpal,. Kumar,. hushan, and. Gupta, tudy of lack ttack on MNT Performance, International Journal of Modern ducation & omputer cience, 4(8), 202. [5] H. HongNing, L. Zhong, and L. Lu, Real-Time irected Routing Protocol ased on Projection of onvex s on Underwater coustic Networks, International Journal of Wireless and Microwave Technologies (IJWMT), 2(2), 65, 202. [6] X. Yu,. Wu,. hen, and N. Hu, Level et ased overage s etection and s Healing cheme in Hybrid ensor Network, International Journal of istributed ensor Networks, 203. [7]. Kong,. erworn, J. Tran,. Herman,. oleshill, and K. G. erpanis, Toward the automatic detection of access holes in disaster rubble, In afety, ecurity, and Rescue Robotics (RR), 203 I International ymposium on (pp. -6). I, Oct 203. [8] M. L. Zheng, P. P. Zhai, and X. Zou, Research of Location Technology ased on Wireless ensor Network, dvanced Materials Research, 860, 287-2824, 204. mita Karmakar is pursuing her Master in omputer pplication degree from Tripura University. he has completed achelor in omputer pplication degree from Tripura University in 20. Her main research includes, Wireless ensor Network and Mobile ommunication. lak Roy is a Ph student at Tezpur University doing research in the field of Underwater ensor Network. He received Tech (omputer cience and ngineering) and MTech (Information Technology) degrees from North astern Regional Institute of cience and Technology and Tezpur University in 2008, and 200 respectively. In 20, he was a faculty in National Institute of Technology gartala, India. He is currently employed as an ssistant Professor in the department of Information Technology, Tripura University, India. His primary research interests is in wireless sensor networking with an emphasis on energy efficiency, medium access control issues in underground and underwater sensor network. opyright 204 M I.J. Modern ducation and omputer cience, 204, 4, 24-30