An improved ELGossiping data distribution technique with emphasis on reliability and resource constraints in wireless sensor network

Author(s):  
Ali Norouzi ◽  
Alireza Hatamizadeh ◽  
Mehdi Dabbaghian ◽  
Burak Berk Ustundag ◽  
Fatemeh Amiri
2018 ◽  
Vol 7 (2.26) ◽  
pp. 25
Author(s):  
E Ramya ◽  
R Gobinath

Data mining plays an important role in analysis of data in modern sensor networks. A sensor network is greatly constrained by the various challenges facing a modern Wireless Sensor Network. This survey paper focuses on basic idea about the algorithms and measurements taken by the Researchers in the area of Wireless Sensor Network with Health Care. This survey also catego-ries various constraints in Wireless Body Area Sensor Networks data and finds the best suitable techniques for analysing the Sensor Data. Due to resource constraints and dynamic topology, the quality of service is facing a challenging issue in Wireless Sensor Networks. In this paper, we review the quality of service parameters with respect to protocols, algorithms and Simulations. 


2019 ◽  
Vol 8 (4) ◽  
pp. 2440-2448

Wireless sensor networks have a lot of sensor nodes that are small, cheap and resource-constraints, but are often used to perform various monitoring operations in unmanned and demanding environments. Networks are vulnerable to different application-based and application-independent attacks. We examine node replication attacks, which are typical threats in the sensor network. In this attack, the enemy generates its own sensor node using stealing sensor from network. The attacker physically occupies the node, takes his secret credentials, and duplicates a large number of nodes with some controlled counterparts. The defense against clone node attacks has become an important research element in the safety of the sensor network. In this study, we classify and examine the different proposals in each category. We also compare the memory and communication cost of different clone node detection approach.


2013 ◽  
Vol 2013 ◽  
pp. 1-11 ◽  
Author(s):  
Mohammed Abazeed ◽  
Norshiela Faisal ◽  
Suleiman Zubair ◽  
Adel Ali

Multimedia applications have become an essential part of our daily lives, and their use is flourishing day by day. The area of wireless sensor network is not an exception where the multimedia sensors are attracting the attention of the researchers increasingly, and it has shifted the focus from traditional scalar sensors to sensors equipped with multimedia devices. The multimedia sensors have the ability to capture video, image, audio, and scalar sensor data and deliver the multimedia content through sensors network. Due to the resource constraints nature of WSN introducing multimedia will add more challenges, so the protocols designed for multimedia wireless sensor network should be aware of the resource constraints nature of WSN and multimedia transmission requirement. This paper discusses the design challenges of routing protocols proposed for WMSN. A survey and comprehensive discussion are given for proposed protocols of WMSN followed by their limitations and features.


The research on wireless sensor network has evolved with applications being developed in several domains. However, applications designed for wireless sensor network are attributed with programming which occurs at lower levels of abstractions of the operating system. The application designer has to be aware of both the domain of the application and its corresponding hardware platform. This creates a strong coupling between the implemented code and hardware platform. Hence all applications are designed for specific platforms and become difficult to maintain, modify and reuse. Our proposal creates UML models for a WSN application to formalize it according to a development life cycle. Secure Index on Distributed data (SIDD) is an application that addresses two issues of data distribution and security. The UML model helps to harmonize the domains of security and application. Hence the paper focusses on converging the designing process into a formal development mode using UML representations.


2012 ◽  
Vol 2 (8) ◽  
pp. 188-190
Author(s):  
Targol Abrishami ◽  
◽  
Dr. N. M. Kulkarni Dr. N. M. Kulkarni ◽  
Dr. A. D. Shaligram Dr. A. D. Shaligram

Sign in / Sign up

Export Citation Format

Share Document