Hole Detection and Healing Using Heal Algorithm



Similar documents
Holes in Wireless Sensor Network

Keywords coverage holes, energy efficient, hole detection, hole healing

Modified Sensor Deployment Algorithm for Hole Detection and Healing using NS2

Distributed Coordinate-free Hole Recovery

A Novel Multi Ring Forwarding Protocol for Avoiding the Void Nodes for Balanced Energy Consumption

QUALITY OF SERVICE METRICS FOR DATA TRANSMISSION IN MESH TOPOLOGIES

OPTIMIZED SENSOR NODES BY FAULT NODE RECOVERY ALGORITHM

AN EFFICIENT STRATEGY OF AGGREGATE SECURE DATA TRANSMISSION

Mobile Network Analysis - Hole Healing

Connectivity-based Distributed Coverage Hole Detection in Wireless Sensor Networks

Optimal Hole Coverage Using Hole Detection and Replacing Algorithm in Wireless Sensor Networks

Implementation of Energy Efficient Adaptive Load Balancing Algorithm by Rainbow Mechanism in Wireless Sensor Networks

A Comparison Study of Qos Using Different Routing Algorithms In Mobile Ad Hoc Networks

Load Balancing Geo-routing and routing around Holes in Wireless Sensor Networks Ashwini S R 1, Dr.Nataraj K R 2 1 PG Student, DCN, SJBIT, Bangalore

EBHEAL: Distributed and Localized Mechanism for Coverage Hole Detection and Healing

An Empirical Approach - Distributed Mobility Management for Target Tracking in MANETs

Behavior Analysis of TCP Traffic in Mobile Ad Hoc Network using Reactive Routing Protocols

Modified Coverage Hole Detection Algorithm for Distributed WSNs

Thwarting Selective Insider Jamming Attacks in Wireless Network by Delaying Real Time Packet Classification

A NOVEL OVERLAY IDS FOR WIRELESS SENSOR NETWORKS

Review of Prevention techniques for Denial of Service Attacks in Wireless Sensor Network

ENHANCED GREEN FIREWALL FOR EFFICIENT DETECTION AND PREVENTION OF MOBILE INTRUDER USING GREYLISTING METHOD

Int. J. Sensor Networks, Vol. 5, No. 3,

A Hierarchical Structure based Coverage Repair in Wireless Sensor Networks

COMPARATIVE ANALYSIS OF ON -DEMAND MOBILE AD-HOC NETWORK

Anomaly Intrusion Detection System in Wireless Sensor Networks: Security Threats and Existing Approaches

Detecting Multiple Selfish Attack Nodes Using Replica Allocation in Cognitive Radio Ad-Hoc Networks

CROSS LAYER BASED MULTIPATH ROUTING FOR LOAD BALANCING

Security and Privacy Issues in Wireless Ad Hoc, Mesh, and Sensor Networks

MAXIMIZING THE LIFETIME OF NETWORK SECURITY BY DSDV PROTOCOL USING GAME THEORY TECHNIQUES IN WIRELESS SENSOR NETWORK

The Feasibility of SET-IBS and SET-IBOOS Protocols in Cluster-Based Wireless Sensor Network

Some Security Trends over Wireless Sensor Networks

ISSN: (Online) Volume 2, Issue 2, February 2014 International Journal of Advance Research in Computer Science and Management Studies

Survey on Network Lifetime Enhancement Method

Survey on Load balancing protocols in MANET S (mobile ad-hoc networks)

Preventing DDOS attack in Mobile Ad-hoc Network using a Secure Intrusion Detection System

Securing MANET Using Diffie Hellman Digital Signature Scheme

Attacks on neighbor discovery

Analysis on Leveraging social networks for p2p content-based file sharing in disconnected manets

Enhanced routing performance and overhead in Mobile Ad-hoc network for big data Transmission in Telemedicine using computer communication network

Secure Data Aggregation and Data Recovery in Wireless Sensor Networks

An Extended AODV Protocol to Support Mobility in Hybrid Networks

LOAD BALANCING AND EFFICIENT CLUSTERING FOR IMPROVING NETWORK PERFORMANCE IN AD-HOC NETWORKS

Location Information Services in Mobile Ad Hoc Networks

Mobile Security Wireless Mesh Network Security. Sascha Alexander Jopen

Coverage Related Issues in Networks

Study And Comparison Of Mobile Ad-Hoc Networks Using Ant Colony Optimization

Energy Efficient and Improved Certificate Revocation Technique for Mobile Ad Hoc Networks

SECURE DATA TRANSMISSION USING INDISCRIMINATE DATA PATHS FOR STAGNANT DESTINATION IN MANET

Consecutive Geographic Multicasting Protocol in Large-Scale Wireless Sensor Networks

Student, Haryana Engineering College, Haryana, India 2 H.O.D (CSE), Haryana Engineering College, Haryana, India

INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY

Secure Data Transmission in Wireless Sensor Network Using Randomized Dispersive Routing Algorithm

{p t [D1t(p t ) + D2t(p t )]}. Proposition 1. With a dynamic centralized pricing mechanism, p cen

SPY AGENT BASED SECURE DATA AGGREGATION IN WSN

Power Efficiency Metrics for Geographical Routing In Multihop Wireless Networks

Efficient Load Balancing Routing in Wireless Mesh Networks

Step by Step Procedural Comparison of DSR, AODV and DSDV Routing protocol

PERFORMANCE ANALYSIS OF AODV, DSR AND ZRP ROUTING PROTOCOLS IN MANET USING DIRECTIONAL ANTENNA

A Review on Failure Node Recovery Algorithms in Wireless Sensor Actor Networks

Routing Analysis in Wireless Mesh Network with Bandwidth Allocation

Formal Measure of the Effect of MANET size over the Performance of Various Routing Protocols

CHARACTERIZING OF INFRASTRUCTURE BY KNOWLEDGE OF MOBILE HYBRID SYSTEM

Efficient File Sharing Scheme in Mobile Adhoc Network

Energy Efficient Load Balancing among Heterogeneous Nodes of Wireless Sensor Network

Coverage-Hole Trap Model in Target Tracking using Distributed Relay-Robot Network

A Catechistic Method for Traffic Pattern Discovery in MANET

PERFORMANCE STUDY AND SIMULATION OF AN ANYCAST PROTOCOL FOR WIRELESS MOBILE AD HOC NETWORKS

A Bidding Protocol for Deploying Mobile Sensors

Repairing Sensor Network Using Mobile Robots

Minimum-Hop Load-Balancing Graph Routing Algorithm for Wireless HART

A Security Architecture for. Wireless Sensor Networks Environmental

Dynamic Antenna Mode Selection for Link Maintenances in Mobile Ad Hoc Network

Wireless Sensor Network: Challenges, Issues and Research


ROUTE MECHANISMS FOR WIRELESS ADHOC NETWORKS: -CLASSIFICATIONS AND COMPARISON ANALYSIS

Load Balanced Data Transmission within the Probabilistic Wireless Sensor Network

Secured Data Transmissions In Manet Using Neighbor Position Verfication Protocol

Comparison of WCA with AODV and WCA with ACO using clustering algorithm

Security Enhanced Cooperative Game Theory for Mobile Ad-Hoc Network

Wireless Sensor Network: Improving the Network Energy Consumption

Bandwidth Management Framework for Multicasting in Wireless Mesh Networks

NetworkPathDiscoveryMechanismforFailuresinMobileAdhocNetworks

Technology Longowal, Punjab, India

PERFORMANCE ANALYSIS OF AD-HOC ON DEMAND DISTANCE VECTOR FOR MOBILE AD- HOC NETWORK

Vampire Attack Detecting and Preventing in Wireless Sensor Network

An Implementation of Secure Wireless Network for Avoiding Black hole Attack

Hybrid Energy Efficient Distributed Protocol for Heterogeneous Wireless Sensor Network

A Routing Method for Top-k Query Processing in Mobile Ad Hoc Networks

A Graph-Center-Based Scheme for Energy-Efficient Data Collection in Wireless Sensor Networks

DESIGN AND DEVELOPMENT OF LOAD SHARING MULTIPATH ROUTING PROTCOL FOR MOBILE AD HOC NETWORKS

EFFICIENT DETECTION IN DDOS ATTACK FOR TOPOLOGY GRAPH DEPENDENT PERFORMANCE IN PPM LARGE SCALE IPTRACEBACK

Wireless Sensor Network Security. Seth A. Hellbusch CMPE 257

Distributive Reprogramming of Wireless Sensor Nodes with Secure Data Transmission

DAG based In-Network Aggregation for Sensor Network Monitoring

Node Degree based Clustering for WSN

Adaptive Multiple Metrics Routing Protocols for Heterogeneous Multi-Hop Wireless Networks

Research Article Energy-Efficient Probabilistic Routing Algorithm for Internet of Things

Transcription:

Hole Detection and Healing Using Heal Algorithm Divya K Suku, Phini Ann Philip Pursuing M.Tech, Department of ECE, CAARMEL Engineering College, Pathanamthitta, Kerala, India Assistant Professor, Department of ECE, CAARMEL Engineering College, Pathanamthitta, Kerala, India ABSTRACT: Wireless Sensor Networks is one of the fast growing technologies in the present scenario. Here we monitor a specified region of interest (RoI). The hole in the region of interest is due to random deployment, environmental factors and external attack. Several anomalies are present in WSNs, one such problem is hole. The formation of hole in a WSN is unavoidable due to the inner nature of the networks. HEAL deals with holes of various forms and sizes and provides a cost-effective and an accurate solution for hole detection and healing. This paper deals with detecting and healing such holes in an on demand basis. KEYWORDS: Wireless sensor network, hole detection, hole healing, coverage I. INTRODUCTION The Wireless Sensor Networks(WSN) is created with tiny nodes and these tiny sensor nodes is capable of sensing some limited data processing and communicating with each other. These tiny sensor nodes are deployed in the target field in large numbers and they collaborate to form an adhoc network capable of reporting the phenomenon to a data collection point called sink or base station. Several anomalies can occur in WSNs that damages the desired functionalities resulting in the formation of different kinds of holes such as; coverage holes, routing holes, jamming holes and worm holes. In this work we are interested in large bounded holes and they are circumscribed by sensor nodes. One of the fundamental services provided by a WSN is the monitoring of a specified region of interest (RoI), where the main duty is sensing the environment and communicating the information to the sink. Assuring that the RoI is completely covered at all time is very important [2]. However, the emergence of holes in the RoI is unavoidable due to the inner nature of WSNs, random deployment, environmental factors, and external attacks. Thus, an event occurring within these holes is neither detected nor reported and therefore, the main task of the network will not be completed. Thus, we provide a self-organizing mechanism to detect and recover holes. Some of the major reason for node destruction and hole creation are: Power depletion Physical destruction Existence of obstacles Lower density regions Unlike existing algorithms, our algorithm relocates only the adequate nodes within the shortest times with the lowest cost. WSN are deployed in hostile environment and the hole formation is due to, a group of sensor nodes fails to carry out the network operations. This paper seeks the problem of hole detection and healing in an on demand basis. II. RELATED WORK There has been much related work done on this topic. In this section we highlight the work done in order to detect holes inside the networks.. I.Khan et al. [2] give a detail description of work done for boundary recognition and hole detection in wireless sensor networks. Fang et al. [4] detects holes inside the network by assuming that nodes are Copyright to IJIRCCE DOI: 10.15680/IJIRCCE.2015. 0308076 7466

equipped with location awareness devices. The algorithms [10, 26, 27, 28, 29, 30, 35] under this category, use the connectivity information of sensor nodes to detect the boundary of the sensor networks and detect holes inside the wireless sensor network. The algorithms [31, 32, 33] proposed under this category identify the nodes, as either inner or boundary nodes, by assuming that the node distribution in the network follows some statistical functions. Ghrist and Muhammad [4] employed a central control algorithm that requires connectivity information for all nodes in the RoI. In [5], the complexity does not depend on the overall size of the network, whereas the homology algorithm encounters severe difficulties with dense networks. Additionally, the message forwarding overhead can be impractically large, since the algorithm is centralized. Funke in [6] presented a heuristic for detecting holes based on the topology of the communication graph. The heuristic computation is not localized as it requires the computation of distance field over the whole network. In a more recent paper [7], Funke and Klein described a linear-time algorithm for hole detection. They require that the communication graph follows the unit disk graph model. Compared to the heuristic approach presented in [6], the algorithm does slightly worse. Furthermore, when decreasing the node density, the algorithm breaks down more and more.wang et al. [16] proposed three different deployment protocols that relocate mobile sensors once coverage holes are detected using Voronoi diagrams. In [14], the authors proposed a scheme called Co-Fi that relocates mobile nodes to replace low energy nodes. Authors in [15] developed three hole-movement strategies for moving an existing big hole in a way that either the total energy consumption is minimized or the power consumption of sensors is balanced. The incompleteness of previous work motivates our research presented here. Our proposed hole and border detection algorithm is distributed and lightweight, and thus more suited to the energy constrained WSNs. It does not require flooding for gathering the topology information, as is the case in [10] or synchronization among nodes. III. PROPOSED SYSTEM In our algorithm we propose a mechanism to detect and heal holes. Our hole detection mechanism deals with holes of various forms and sizes. We try to alert a limited number of nodes surrounding the hole, only those nodes have the task of moving and repairing the hole. When designing a hole healing algorithm, the following issues need to be addressed: 1) How to detect a hole and how to estimate its size? 2) Where are the best target locations to relocate mobile nodes to repair coverage holes? 3) How to dispatch mobile nodes to the target locations while minimizing the moving and messaging cost? Fig1: holes in a sensor network Our DHD algorithm allows us to discover the holes, to compute their characteristics and to discover the boundary network. In a second phase, HEAL performs a local healing where only the nodes located at an appropriate distance from the hole will be involved in the healing process. If every point in that target area is covered by at least k sensors, Copyright to IJIRCCE DOI: 10.15680/IJIRCCE.2015. 0308076 7467

where k is the required degree of coverage for a particular application (see Fig. 1). It is pertinent to mention that the coverage hole problem defined is dependent on application requirements. Some applications may require a higher degree of coverage of a given target area for fault tolerance using triangulation-based positioning protocols [7] or trilateration based localization [8]. Fig 2: healing process We defined an attractive force that acts from the hole center and attracts the nodes towards the hole center. At the same time, a repulsive force is defined among nodes to minimize the overlapping among them (see fig2). These forces will be effective in a limited area, which we call the HHA. The proposed algorithms consist of hole detection and hole healing steps. The identification of holes in a wireless sensor network is of primary interest since the breakdown of sensor nodes in a larger area often indicates one of the special events to be monitored by the network in the first place (e.g. outbreak of a fire, destruction by an earthquakes etc.). This task of identifying holes is especially challenging since typical wireless sensor networks consist of lightweight, low capability nodes that are unaware of their geographic location. But there is also a secondary interest in detecting holes in a network recently routing schemes have been proposed that do not assume knowledge of the geographic location of the network nodes. Our hole detection algorithm is based purely on the topology of the communication graph, i.e. the only information available is which nodes can communicate with each other. First we have to access the existence of a hole, which is done by identifying stuck nodes All the nodes that are marked as stuck nodes. From this module we can identify the hole characteristics such as hole position and radius. DHD is the algorithm used for the detection of the holes, it can detect multiple number of holes in WSN. DHD is a distributed and localized hole detection algorithm that operates over the Gabriel graph of the network. Algorithm: Hole detection & Healing : 1) Initialize the Htimer and Neigh_timer 2) If timer expire generate the hello message Attach node id Position info Broadcast Hello message Set new schedule for next hello 3) If hello received Check in neigh_table If sender info already found Increase the expire time Else Create new entry Copyright to IJIRCCE DOI: 10.15680/IJIRCCE.2015. 0308076 7468

4) If neigh_timer expires If neigh_info expire Delete Set as failed neighbor Share the info to next neighbors Set new schedule for next verification 5) If failure sharing receive If Hole id is same but not generated by own Make confirmation of node failure Cal max dist from orignator Send to next node with own info Else if own pkt recv Set as HM Calc hole dist Calc hole center point Else If hop count < Th_hop Forward to next node 6) If the node is HM Send healing message Update hole point Update Distance to hole 7) If Healing message is received Checks the hole point & dist If own dist less then HM dis Start move to center point to the hole point In our proposed system we have developed actor node for healing the hole in the network. Hole will be occurred due to the inner nature of WSNs, random deployment, environmental factors, and external attacks. During normal operation of the network, a great loss of nodes occurs, due to an external attack for example, causing the creation of one or several large holes within the network making it ineffective. IV. SIMULATION RESULTS For evaluating the performance of the proposed system, the Hole Healing Algorithm has been taken. This is implemented on NS2. The figure above shows the Hole Healing result. Here we can see 15 nodes and one actor node. Actor node is a mobile sensor node. It moves at where the hole is detected and temporarily healing process is preceded. By this we can avoid the packet loss. Mean while we detect the node that is to be acted as bridge for healing the hole. We compare some performance characteristics of existing and the proposed systems. The no. of nodes moves and delay characteristics of of the proposed system with the existing technique is compared here. The results are showed in Xgraph. No. of nodes moved: The movement of nodes in the existing and proposed system is compared and examined. The X- graph figure shown below represents this comparison Copyright to IJIRCCE DOI: 10.15680/IJIRCCE.2015. 0308076 7469

Fig3: No. of nodes moved Delay analysis: The figure below shows the delay comparison of the existing and the proposed system. The delay of the proposed system is much less than that of existing system. Fig4: Delay Analysis PDF (Packet delivery fraction) Comparison: The PDF is higher in the recovery schemes and lower in the failure case. It is defined as the ratio of packet that is successfully delivered to the destination compared to the number of the packet that has been sent out by the sender. Copyright to IJIRCCE DOI: 10.15680/IJIRCCE.2015. 0308076 7470

Fig5: PDF Comparison V. CONCLUSION AND FUTURE WORK This paper has proposed and implemented a lightweight and comprehensive two-phase protocol, HEAL, for ensuring area coverage employing a mobile WSN. The protocol uses a distributed DHD to detect holes in the network.. Compared to the existing schemes, DHD has a very low complexity and deals with holes of various forms and sizes despite the nodes distribution and density. By exploiting the virtual forces concept, our approach relocates only the adequate nodes within the shortest time and at the lowest cost. Through the performance evaluation, we validated HEAL, using different criteria and showed that it detects and heals the holes despite their number or size with less mobility in various situations. The evaluation results demonstrate that HEAL provides a cost-effective and an accurate solution for hole detection and healing in mobile WSNs. In the future, we plan to investigate the interaction between HEAL and the network layer for hole detection and healing. REFERENCES. 1. N. Ahmed, S.S. Kanhere, and S. Jha, The Holes Problem in Wireless Sensor Networks: A Survey, SIGMOBILE Mobile Computing Comm. Rev., vol. 9, no. 2, pp. 4-18, 2005. 2. B. Wang, Coverage Control in Sensor Networks. Springer, 2010. 3. B. Kun, T. Kun, G. Naijie, L.D. Wan, and L. Xiaohu, Topological Hole Detection in Sensor Networks with Cooperative Neighbors, Proc. Int l Conf. Systems and Networks Comm. (ICSN 06), p. 31, 2006. 4. R. Ghrist and A. Muhammad, Coverage and Hole-Detection in Sensor Networks via Homology, Proc. Fourth Int l Symp. Information Processing in Sensor Networks (IPSN 05), pp. 254-260, Apr. 2005. 5. V. De Silva, R. Ghrist, and A. Muhammad, Blind Swarms for Coverage in 2-D, Proc. Robotics: Science and Systems, pp. 335-342, June 2005. 6. Spector, A. Z. 1989. Achieving application requirements. In Distributed Systems, S. Mullende. 7. Patcha; A. Mishra; Collaborative security architecture for black hole attack prevention in mobile ad hoc networks[c]; Radio and Wireless Conference, 2003, 75-78. 8. F. Stefan, Topological Hole Detection in Wireless Sensor Networks and its Applications, Proc. Joint Workshop on Foundations of Mobile Computing, p. 44-53, 2005. 9. D. Boneh; C. Gentry; B. Lynn; H. Shacham. Aggregate and Verifiably Encrypted Signatures from Bilinear Maps. Advances in Cryptology- EUROCRYPT 03: LNCS 2656. Berlin: SpringerVeralg, 2003. 416-432. 10. J.W. Cai; P. Yi, Y. Tian, Y.K. Zhou, N. Liu, The Simulation and Comparison of Routing Attacks on DSR Protocol[C], WiCOM 2009, in press. 11..M. Shila; T. Anjali; Defending selective forwarding attacks in WMNs, IEEE International Conference on Electro/Information Technology, 2008, 96-101. 12. ] I.F. Akyildiz; X. Wang (2005). A Survey on Wireless Mesh Networks [J]. IEEE Communications Magazine, 43 (9), 23-30 13. D.S.J.D. Couto; D. Aguayo; J. Bicket; R. Morris, A HighThroughput Path Metric for Multi-Hop Wireless routing, in ACM Mobicom, 2003. Copyright to IJIRCCE DOI: 10.15680/IJIRCCE.2015. 0308076 7471

14. S. Ganeriwal, A. Kansal, and M.B. Srivastava, Self Aware Actuation for Fault Repair in Sensor Networks, Proc. IEEE Int l Conf. Robotics and Automation (ICRA 04), pp. 5244-5249, May 2004. 15. C.Y. Chang, L.L. Hung, S.W. Chang, and Y.C. Chen, Decentralized and Energy-Balanced Algorithms for Main- taining Temporal Full- Coverage in Mobile WSNs, J. Wire- less Comm. and Mobile Computing, vol. 12, no. 5, pp. 445-462, 2012. G. Wang, G. Cao, and T.F.L. La Porta, Movement-Assisted Sensor Deployment, IEEE Trans. Mobile Computing, vol. 5, no. 6, pp. 640-652, June 2006. BIOGRAPHY Divya K Suku received her Bachelor of Engineering in Electronics from Anna University, Chennai, 2013. At present, she is pursuing M.Tech in Communication Engineering at Caarmel Engineering College, Kerala, Affiliated to MG University. Her research interests include Digital Image Processing and Computer Networks. Phini Ann Philip received her M.Tech in VLSI Design from Francis Xavier Engineering College, Tirunelveli Affiliated to Anna University and B.Tech in Electronics from Mount Zion College of Engineering, Affiliated to MG University. Currently, she is working as the Assistant Professor in Department of Electronics, Caarmel Engineering College. Her research interests are Digital Image Processing and VLSI. Copyright to IJIRCCE DOI: 10.15680/IJIRCCE.2015. 0308076 7472