A Cross Layer Design and Flower Pollination Optimization Algorithm for Secured Energy Efficient Framework in Wireless Sensor Network

2020 ◽  
Vol 112 (3) ◽  
pp. 1601-1628
Author(s):  
S. Subashini ◽  
P. Mathiyalagan

2019 ◽  
Vol 8 (4) ◽  
pp. 1019-1026

Over the last decade, Wireless Sensor Network (WSN) has gained considerable attention in various real-time applications. Since WSN works with battery operated nodes, utilization and optimization of node energy is one the primary challenge. For effectively handling and controlling the energy consumption problem in WSN, cross-layer optimization is one of the important methods. For a researcher working in the domain of WSN, energy constraint is a huge challenge to deal with. MAC layer is one of the major source of energy consumption so, an innovative energy efficient MAC protocol using a cross-layer approach in the heterogeneous wireless sensor network is proposed. In this protocol, first, packet retransmission by reducing packet loss is addressed by considering buffer space, channel state and remaining energy. Second, the synchronization scheme for a global schedule is implemented by deliberating adaptive listening using the length of the transmission queue. Finally, sleep time issue is worked out to reduce energy consumption. In this scenario, the nodes will be in sleep mode unless it has some packets to send or receive. The proposed protocol is implemented in Network Simulation (NS2). The simulation results show that the heterogeneous wireless network performs better in terms of energy consumption, packet data rate and energy buffer state while implementing through the proposed protocol.



2020 ◽  
pp. 1-16
Author(s):  
Monali Prajapati ◽  
Dr. Jay Joshi

In the wireless sensor network (WSN), wireless communication is said to be the dominant power-consuming operation and it is a challenging one. Virtual Multiple-Input–Multiple-Output (V-MIMO) technology is considered to be the energy-saving method in the WSN. In this paper, a novel multihop virtual MIMO communication protocol is designed in the WSN via cross-layer design to enhance the energy efficiency, reliability, and end-to-end (ETE) and Quality of Service (QoS) provisioning. On the basis of the proposed protocol, the optimal set of parameters concerning the transmission and the overall consumed energy by each of the packets is found. Furthermore, the modeling of ETE latency and throughput of the protocol takes place with respect to the bit-error-rate (BER). A novel hybrid optimization algorithm referred as Flight Straight Moth Updated Particle Swarm Optimization (FS-MUP) is introduced to find the optimal BER that meets the QoS, ETE requirements of each link with lower power consumption. Finally, the performance of the proposed model is evaluated over the extant models in terms of Energy Consumption and BER as well.





Author(s):  
Rakesh Saini ◽  
Naveen Kumar

: Safe direction-finding is extremely necessary for multihop wireless systems such as Wireless Sensor Networks. Multihop wireless systems are more defenseless to safety outbreaks as associated to single stage wireless networks. Cross layer design production a precise significant character for wireless sensor network submissions. Advanced security is actual significant for the achievement of announcement among sensor nodes in wireless sensor network because the numbers composed is regularly slight and the network is mostly susceptible. Numerous Security methods have been suggested to deliver safety resolutions beside numerous extortions to the Cross-layer modification techniques in Wireless sensor network. In this paper we overview the existing schemes for the security of cross-layer design in wireless sensor network. Proposed Security model will provide more security between sensor nodes and base station in wireless sensor network. Security is important for the success of the wireless sensor network because the data collected are often sensitive and the network is particularly vulnerable. In the cross-layer design, constraints are substituted between changed layers to protection well-organized use of energy. In this paper, we propose a secure security model that is based on cross layer design. It uses a cross layer optimization Mechanism. Reproduction consequences confirmation that our proposed safety model can achieve better in many situations and in unfriendly violence-disposed to situation.



Sign in / Sign up

Export Citation Format

Share Document