Frequency Planning for Non-dedicated Relay Node Relay Based on Genetic Algorithm

Author(s):  
Yingteng Ma ◽  
Qiucheng Shan ◽  
Dongtang Ma ◽  
Jietao Diao ◽  
Jun Xiong
2018 ◽  
Vol 26 (10) ◽  
pp. 281-308
Author(s):  
Saif Khalid Musluh ◽  
Alaa Abid Muslam ◽  
Raid Abd Alreda Shekan

Wireless sensor networks (WSNs) play an important role in many real-world applications like surveillance. Wireless networks are also used to have data transfer. In such cases, there are problems with  resourcece-constraintnednetworks. The problems include a delay in communication and reduction in Quality of Service (QoS). Topology control can solve this problem to some extent. However, the delay performance and QoS need to be improved further to support intended operations in wireless networks. When relay node concept is considered, it is possible to optimize performance in such networks. In this paper, we proposed a Genetic Algorithm (GA) based relay configuration for optimizing delay performance in WSN. Relay nodes compute optimal positions using the proposed algorithm so as to improve QoS and reduce delay as much as possible. We implemented the algorithm using NS2 simulations. The results revealed that the proposed approach is able to improve QoS, reduce delay besides improving network performance in terms of throughput, network capacity, and energy efficiency.


2017 ◽  
Vol 2017 ◽  
pp. 1-10 ◽  
Author(s):  
Mahalakshmi Gunasekaran ◽  
Subathra Periakaruppan

Denial-of-sleep (DoSL) attack is a special category of denial-of-service attack that prevents the battery powered sensor nodes from going into the sleep mode, thus affecting the network performance. The existing schemes used for the DoSL attack detection do not provide an optimal energy conservation and key pairing operation. Hence, in this paper, an efficient Genetic Algorithm (GA) based denial-of-sleep attack detection (GA-DoSLD) algorithm is suggested for analyzing the misbehaviors of the nodes. The suggested algorithm implements a Modified-RSA (MRSA) algorithm in the base station (BS) for generating and distributing the key pair among the sensor nodes. Before sending/receiving the packets, the sensor nodes determine the optimal route using Ad Hoc On-Demand Distance Vector Routing (AODV) protocol and then ensure the trustworthiness of the relay node using the fitness calculation. The crossover and mutation operations detect and analyze the methods that the attackers use for implementing the attack. On determining an attacker node, the BS broadcasts the blocked information to all the other sensor nodes in the network. Simulation results prove that the suggested algorithm is optimal compared to the existing algorithms such as X-MAC, ZKP, and TE2P schemes.


1994 ◽  
Vol 4 (9) ◽  
pp. 1281-1285 ◽  
Author(s):  
P. Sutton ◽  
D. L. Hunter ◽  
N. Jan

Sign in / Sign up

Export Citation Format

Share Document