Mobile Ad Hoc Network and Wireless Sensor Network: A Study of Recent Research Trends in Worldwide Aspects

Author(s):  
Ishu Varshney
Author(s):  
Lokeshwar Singh ◽  
Ashish Sharma

There are many advantages and reasons for wireless sensor network to be popular. The key concern while establishing wireless sensor network (Mobile ad-hoc network) is the routing protocol to be applied. Routing process is the process of discovering the path that a data packet will follow to get it from the source node to the destination node. As the mobile ad-hoc network consists of mobile nodes with no controlling unit in which each and every step of communication is handled by the nodes within the network itself. The selection of routing protocol is one of the difficult tasks and the key challenge faced by the routing is the energy consumption issue apart from the others. In this research, the routing technique is developed with a basic focus on reduction of the energy consumption while improving the overall performance of the network.  Presently, various efficient routing protocols have been estimated for wireless sensor network. In the presence of malicious nodes, the network becomes penetrable to different kind of attacks. In wireless sensor network, routing-attacks are relatively serious. It has number of potential-applications in completely un-predictable in dynamic environment. Routing protocol utilized here are in a form of reactive-routing protocol known as OLSR. This routing protocol route is based on demand.The proposed work has designed and implemented wireless sensor network in OLSR routing protocol. The gray hole attack is mitigated using Fuzzy Logic based on rule sets to have better routing process and ABC (Artificial Bee Colony) algorithm at superior rate for optimizing the route set at novel objective function.  In this work, the performance analysis of the network with the scenarios consisting 50 nodes moving with the speed of the 5-10m/s within the  area (1000X1000) m2 has been done in regards to the parameters, namely, Throughput, End-to-End Delay, BER (bit error rate) and Energy consumption).  


2019 ◽  
Vol 8 (2) ◽  
pp. 1717-1721

Wireless sensor network are a kind of network in which the communication between the senor nodes are in a peer-to-peer fashion. Hence, WSN is an ad-hoc network. Sensor node performs operations like sensing, gather information and transfer the data to all other nodes, which will increase the loads. This proposed research work is based on the comparison of on demand protocols for WSN that will enhance the load balancing in network. A performance comparison of DSR and AODV protocols are demonstrated using ns2. The parameters used for the comparison of the protocols are energy, PDR, packet drop and throughput. We also discuss the concept of a new one combining the efficiency of AODV and DSR.


2020 ◽  
pp. 1199-1225
Author(s):  
Anwesha Mukherjee ◽  
Priti Deb ◽  
Debashis De

Nature inspired computing has been widely used to solve various research challenges of mobile network. Mobile network refers to mobile network, sensor network and ad hoc network. This chapter has focused on the application of nature inspired computing in mobile network. In this chapter, the bio-inspired techniques for wireless sensor network, mobile ad hoc network and mobile cloud computing are discussed. Ant colony optimization is used in sensor network and mobile cloud computing for efficient routing and scheduling respectively. Bee swarm intelligence is used to develop routing schemes for mobile ad hoc network. Bird flocking behavior is used for congestion control in wireless sensor network. The research challenges of bio-inspired mobile network are also illustrated.


2018 ◽  
Vol 7 (4.12) ◽  
pp. 73
Author(s):  
Radhika Gupta ◽  
Dr. Sahil Verma ◽  
Dr. Kavita ◽  
Anup Ial Yadav

The wireless sensor network is a type of ad hoc network which is vulnerable to security attacks, specifically insider attacks. In spite of the fact that confidentiality, integrity and authentication helps in forestalling the particular sort of attacks, but they come at an expense. A traditional and evergreen concept of the trust evaluation and management, among the nodes of a network, for communication is a good and effective security measure. Overseeing trust in a distributed wireless sensor network is a challenging task when coordinated effort or participation is must in accomplishing mission and framework objectives. The paper represents a survey of various trust applications which are very helpful for carrying out a secure data transmission in a sensor network. The analysed trust applications malicious attack detection, secure data aggregation, secure node selection and secure routing.    


Author(s):  
Anwesha Mukherjee ◽  
Priti Deb ◽  
Debashis De

Nature inspired computing has been widely used to solve various research challenges of mobile network. Mobile network refers to mobile network, sensor network and ad hoc network. This chapter has focused on the application of nature inspired computing in mobile network. In this chapter, the bio-inspired techniques for wireless sensor network, mobile ad hoc network and mobile cloud computing are discussed. Ant colony optimization is used in sensor network and mobile cloud computing for efficient routing and scheduling respectively. Bee swarm intelligence is used to develop routing schemes for mobile ad hoc network. Bird flocking behavior is used for congestion control in wireless sensor network. The research challenges of bio-inspired mobile network are also illustrated.


Author(s):  
Puneet Kaur ◽  
Navpreet Kaur

Due to advanced features of wireless sensor devices, the usage of these devices are rises tremendously all over the world. Many researchers work on wireless devices for new enhancement in ad hoc network. WSN (Wireless Sensor Network) included small, low-cost and resource constrained nodes. In order to provide the unique communication protocols many researches have been done in the existing algorithms by introducing new methods and algorithms. In this study, some approaches to eliminate the Sinkhole Attack are introduced that happened in WSN. Apart from this, various routing protocols that can be used to improve the performance of network during transmission of data are discussed in this paper. The performance prediction of routing protocol is very tough task due to varying network scenarios. The performance of WSN is measured using various parameters like throughput, end to end delay are also discussed in this paper.


Sign in / Sign up

Export Citation Format

Share Document