scholarly journals Performance Analysis of Modified AODV Routing Protocol With Lifetime Extension of Wireless Sensor Networks

IEEE Access ◽  
2020 ◽  
Vol 8 ◽  
pp. 10606-10613 ◽  
Author(s):  
Mohit Angurala ◽  
Manju Bala ◽  
Sukhvinder Singh Bamber
Optik ◽  
2014 ◽  
Vol 125 (2) ◽  
pp. 748-750 ◽  
Author(s):  
Vinod Kumar Verma ◽  
Surinder Singh ◽  
Nagendra P. Pathak

Author(s):  
Saloni Dhiman ◽  
Deepti Kakkar ◽  
Gurjot Kaur

Wireless sensor networks (WSNs) consist of several sensor nodes (SNs) that are powered by battery, so their lifetime is limited, which ultimately affects the lifespan and hence performance of the overall networks. Till now many techniques have been developed to solve this problem of WSN. Clustering is among the effective technique used for increasing the network lifespan. In this chapter, analysis of multi-hop routing protocol based on grid clustering with different selection criteria is presented. For analysis, the network is divided into equal-sized grids where each grid corresponds to a cluster and is assigned with a grid head (GH) responsible for collecting data from each SN belonging to respective grid and transferring it to the base station (BS) using multi-hop routing. The performance of the network has been analyzed for different position of BS, different number of grids, and different number of SNs.


2014 ◽  
Vol 573 ◽  
pp. 418-423
Author(s):  
S. Asha Latha ◽  
A. Sivabalan

Wireless sensor networks consist of a network of autonomous sensors that can reconfigure themselves so as to sense the environment in the most significant manner. However, a significant challenge in the practical application of these networks exists in credible authentication and network security. This paper proposes a secure authentication protocol which is considered as a pro-active method, where a user is strongly verified before accessing the data, it is the modified Adhoc On-Demand Distance vector (AODV) Routing protocol that provides many security principles to the user such as checking sequence number, IP address and threshold values. The performance of proposed algorithm is compared with the existing alogorithm based on the following parameters such as Throughput, End to End delay and packet delivery ratio. The results shows that the proposed protocol possesses many advantages against the popular black hole attack. This work has been carried out using NS2 software and the result obtained testifies the effectiveness of the proposed protocol. Keyword: Authentication protocol, AES security, AODV routing protocol, Black hole attack, Wireless sensor network (WSN).


2021 ◽  
Vol 56 (5) ◽  
pp. 457-463
Author(s):  
Outazgui Saloua ◽  
Fakhri Youssef

This paper aims to present a detailed study of different mobility models applicable for Wireless Sensor Networks (WSN). Wireless Sensor Networks (WSN) have evolved dramatically in mobile networks, providing the key advantage of offering access to information without considering a user's spatial and topological characteristics. Due to the exponential advancement of the Internet and the development of small handheld devices as a source of connectivity and data sharing, the wireless network has almost exploded over the past few years. As a routing protocol for WSN in different studies, the Ad-hoc On-demand Distance-vector routing protocol (AODV) has shown better performance than different routing protocols. It offers quick adaptation to dynamic link conditions, low processing, low memory overheads, and low network utilization. To develop an optimized routing protocol, in our previous work, we had proposed an enhancement of the AODV routing protocol to increase the performance of the classic AODV protocol by optimizing the energy consumption and automatically maximizing the network lifetime. In this paper, we present a detailed study of mobility models applicable for WSN. We describe various mobility models representing mobile nodes whose movements are independent (individual mobility models) and dependent (group mobility models). Furthermore, we will focus on studying the behavior of our optimized version of AODV that we named RE-AODV with different existing mobility models so that we can, in the end, select the best mobility model. In terms of network efficiency, simulation results in this Work demonstrate that the type of mobility model used makes the difference and influences the behavior of nodes.


2014 ◽  
Vol 32 (1) ◽  
pp. 80-101 ◽  
Author(s):  
Paola Andrea Gómez Puerta ◽  
Gonzalo Alberto Posada Pérez ◽  
Mónica Ayde Vallejo Velásquez

Sign in / Sign up

Export Citation Format

Share Document