scholarly journals An Enhanced Underwater Linear Wireless Sensor Network Deployment Strategy for Data Collection

Author(s):  
Zahoor Ahmed ◽  
Kamalrulnizam Abu Bakar

The deployment of Linear Wireless Sensor Network (LWSN) in underwater environment has attracted several research studies in the underwater data collection research domain. One of the major issues in underwater data collection is the lack of robust structure in the deployment of sensor nodes. The challenge is more obvious when considering a linear pipeline that covers hundreds of kilometers. In most of the previous work, nodes are deployed not considering heterogeneity and capacity of the various sensor nodes. This lead to the problem of inefficient data delivery from the sensor nodes on the underwater pipeline to the sink node at the water surface. Therefore, in this study, an Enhanced Underwater Linear Wireless Sensor Network Deployment (EULWSND) has been proposed in order to improve the robustness in linear sensor underwater data collection. To this end, this paper presents a review of related literature in an underwater linear wireless sensor network. Further, a deployment strategy is discussed considering linearity of the underwater pipeline and heterogeneity of sensor nodes. Some research challenges and directions are identified for future research work. Furthermore, the proposed deployment strategy is implemented using AQUASIM and compared with an existing data collection scheme. The result demonstrates that the proposed EULWSND outperforms the existing Dynamic Address Routing Protocol for Pipeline Monitoring (DARP-PM) in terms of overhead and packet delivery ratio metrics. The scheme performs better in terms of lower overhead with 17.4% and higher packet delivery with 20.5%.

2018 ◽  
Vol 7 (3) ◽  
pp. 1956
Author(s):  
A Felix Arokya Jose ◽  
C Anand Deva Durai ◽  
S John Livingston

Wireless Sensor Network (WSN) has an enormous scope of utilizations in detecting different parameters such as temperature, pressure, sound, pollution, etc. The sensed data in each sensor node are a valuable one. To communicate the information to the base station for further processing, a lot of strategies are available. Each sensor senses the data in different sampling rate depending upon the sudden raise in the sensing parameters. Data communication to the base station is very critical due to the dynamicity of the environment during the stipulated time.The sensed data should reach the base station before the data becomes invalid due to the violation of the deadline. In order to avoid deadline violation so that the sensed data becomes useless, this paper proposing a novel data collection algorithm based on the popular Earliest Deadline First (EDF) scheduling algorithm. The various simulation parameters are taken into account to verify the performance of the proposed method and the result shows that it achieves high throughput, low delay, high Packet Delivery Ratio (PDR) and low energy consumption.  


2017 ◽  
Vol 7 (1.1) ◽  
pp. 426
Author(s):  
V Jayaraj ◽  
S Alonshia

Although data collection has received much attention by effectively minimizing delay, computational complexity and increasing the total data transmitted, the transience of sensor nodes for multiple data collection of sensed node in wireless sensor network (WSN) renders quality of service a great challenge. To circumvent transience of sensor nodes for multiple data collection, Quality based Drip-Drag-Match Data Collection (QDDM-DC) scheme have been proposed. In Drip-Drag-Match data collection scheme, initially dripping of data is done on the sink by applying Equidistant-based Optimum Communication Path from the sensor nodes which reduces the data loss. Next the drag operation pulls out the required sensed data using Neighbourhood-based model from multiple locations to reduce the delay for storage. Finally, the matching operation, compares the sensed data received by the dragging operation to that of the corresponding sender sensor node (drip stage) and stores the sensed data accurately which in turn improves the throughput and quality of data collection. Simulation is carried for the QDDM-DC scheme with multiple scenarios (size of data, number of sinks, storage capacity) in WSN with both random and deterministic models. Simulation results show that QDDM-DC provides better performance than other data collection schemes, especially with high throughput, ensuring minimum delay and data loss for effective multiple data collection of sensed data in WSN.


Wireless Sensor Network (WSN) is developed extremely because of their low installation cost and various applications. WSN has compact and inexpensive sensor nodes for monitoring the physical environment. WSNs are susceptible to many attacks (e.g. malicious nodes) because of its distinct characteristics. The performance of node and network is affected by the malicious nodes. Moreover, the communication among the sensor nodes also required to be secured for preventing the data from the hackers. In this paper, the architecture of the WSN is generated by using the Fuzzy-C-Means clustering (FCM). Then the detection of the malicious nodes is performed by using the Acknowledgement Scheme (AS). This AS is integrated in the Ant Colony Optimization (ACO) based routing for avoiding the malicious nodes while generating the route from the source to the Base Station (BS). Then the Hybrid Encryption Algorithm (HEA) is used for performing the secure data transmission through the network and this proposed method is named as HEA-AS. The performance of the HEA-AS method is evaluated in terms of End to End Delay (EED), network lifetime, throughput, Packet Delivery Ratio (PDR) and Packet Loss Ratio (PLR). The proposed HEA-AS method is compared with the existing method called as CTCM to evaluate the effectiveness of the HEA-AS method.


Repositor ◽  
2020 ◽  
Vol 2 (8) ◽  
Author(s):  
Hawwin Purnama Akbar ◽  
Diah Risqiwati ◽  
Diah Risqiwati

Perkembangan ilmu pengetahuan pada bidang teknologi jaringan terjadi sangat cepat karena mengikuti perkembangan kebutuhan manusia. Salah satu teknologi jaringan yang saat ini menarik perhatian masyarakat adalah teknologi Wireless Sensor Network(WSN). WSN adalah jaringan dari kumpulan sensor yang terhubung menggunakan teknologi wireless secara ad-hoc dan setiap sensor node digunakan untuk proses pengumpulan data dan menghubungkan dengan node yang lain melalui jaringan wireless.Karena pada kebanyakan kasus aplikasi WSN digunakan pada lingkungan yang ekstrem dan sensor node harus dapat beroperasi secara otomatis tanpa campur tangan manusia, jaringan ini menjadi rentan akan beberapa ancaman jaringan dan dapat mempengaruhi performa dari jaringannya. Terdapat berbagai macam jenis serangan yang dapat membahayakan jaringan wireless sensor network diantaranya yang paling umum adalah sybil attack dan hello flood attack.            Dalam penelitian ini, penulis meneliti performa WSN saat diserang oleh Sybil attack dan hello flood attack dengan cara mengukur throughput, PDR(packet delivery ratio), jitter dan delay dalam jaringan WSN. Penelitian ini juga menganalisa jumlah node yang bervariasi dari 10 node sampai 30 node dengan waktu simulasi dari 10 detik sampai 30 detik lalu dianalisa jaringan ketika jaringan normal dan diserang oleh node penyerang yang bervariasi dari 1 sampai 3 penyerang. Dengan melakukan analisa tersebut, diperoleh data berupa perbandingan dampak serangan dari Sybil attack dan hello flood attack. Dampak dari sybil attack lebih berpengaruh pada parameter throughput dan pdr yang mengalami penurunan nilai hingga 69,9% untuk pdr dan 56,4% untuk throughput. Sedangkan dampak dari hello flood attack lebih berpengaruh pada parameter delay dan jitter yang mengalami kenaikandari nilai semula 0,05 detik menjadi 0,576 detikuntuk delay dan 0,579 detik untuk jitter.AbstractThe development of science in the field of network technology occurs very quickly because it follows the development of human needs. One of the network technology that is currently attracting public attention is wireless sensor network technology (WSN). WSN is a network of connected sensors using ad-hoc wireless technology and each node sensor are used to process data collection and connect with other nodes over a wireless network. Because in most cases WSN applications are used in extreme environments and node sensors must operate automatically without human intervention, these networks become vulnerable to some network threats and may affect the performance of their networks. There are various types of attacks that can harm wireless sensor network network among the most common is sybil attack and hello flood attack.             In this study, authors examined the performance of WSN when attacked by Sybil attack and hello flood attack by measuring throughput, PDR (packet delivery ratio), jitter and delay in WSN network. This study also analyzed the number of nodes that varied from 10 nodes to 30 nodes with simulated time from 10 seconds to 30 seconds and then analyzed the network when the network was normal and attacked by the attacking nodes that varied from 1 to 3 attackers. By doing the analysis, the datacan be obtained in the form of comparison of the impact of attacks from Sybil attack and hello flood attack. The impact of the sybil attack is more influential on the parameters of throughput and pdr which has decreased the maximum value up to 69.9% for pdr and 56.4% for throughput. While the impact of hello flood attack ismore influential on the delay and jitter parameters that increased from the original value of 0.05 seconds to 0.576 seconds for delay and 0.579 seconds for jitter. 


Author(s):  
Veerabadrappa Veerabadrappa ◽  
Booma Poolan Marikannan

Wireless sensor network (WSN) is a vital form of the underlying technology of the internet of things (IoT); WSN comprises several energy-constrained sensor nodes to monitor various physical parameters. Moreover, due to the energy constraint, load balancing plays a vital role considering the wireless sensor network as battery power. Although several clustering algorithms have been proposed for providing energy efficiency, there are chances of uneven load balancing and this causes the reduction in network lifetime as there exists inequality within the network. These scenarios occur due to the short lifetime of the cluster head. These cluster head (CH) are prime responsible for all the activity as it is also responsible for intra-cluster and inter-cluster communications. In this research work, a mechanism named lifetime centric load balancing mechanism (LCLBM) is developed that focuses on CH-selection, network design, and optimal CH distribution. Furthermore, under LCLBM, assistant cluster head (ACH) for balancing the load is developed. LCLBM is evaluated by considering the important metrics, such as energy consumption, communication overhead, number of failed nodes, and one-way delay. Further, evaluation is carried out by comparing with ES-Leach method, through the comparative analysis it is observed that the proposed model outperforms the existing model.


2021 ◽  
Author(s):  
Sathees Lingam Paulswamy ◽  
A.Andrew Roobert ◽  
K. Hariharan

Abstract Coverage of the bounded region gets importance in Wireless Sensor Network (WSN). Area coverage is based on effective surface coverage with a minimum number of sensor nodes. Most of the researchers contemplate the coverage region of interest as a square and manifest the radio ranges as a circle. The area of a circle is much higher than the area of a square because of the perimeter. To utilize the advantage of the circle, the coverage region of interest is presumed as a circle for sensor node deployment. This paper proposes a novel coverage improved disc shape deployment strategy. Comparative analysis has been observed between circle and square regions of interest based on the cumulative number of sensor nodes required to cover the entire region. A new strategy named as disc shape deployment strategy is also proposed. Traditional hexagon and strip-based deployment strategies are compared with the disc shape deployment strategy. The simulation result shows that the circle shape coverage region of interest extremely reduces the required number of sensor nodes. The proposed deployment strategy provides desirable coverage, and it requires few more sensor nodes than hexagon shape deployment strategy.


2015 ◽  
Vol 2015 ◽  
pp. 1-10 ◽  
Author(s):  
R. Beulah Jayakumari ◽  
V. Jawahar Senthilkumar

Wireless sensor network is widely used to monitor natural phenomena because natural disaster has globally increased which causes significant loss of life, economic setback, and social development. Saving energy in a wireless sensor network (WSN) is a critical factor to be considered. The sensor nodes are deployed to sense, compute, and communicate alerts in a WSN which are used to prevent natural hazards. Generally communication consumes more energy than sensing and computing; hence cluster based protocol is preferred. Even with clustering, multiclass traffic creates congested hotspots in the cluster, thereby causing packet loss and delay. In order to conserve energy and to avoid congestion during multiclass traffic a novel Priority Based Congestion Control Dynamic Clustering (PCCDC) protocol is developed. PCCDC is designed with mobile nodes which are organized dynamically into clusters to provide complete coverage and connectivity. PCCDC computes congestion at intra- and intercluster level using linear and binary feedback method. Each mobile node within the cluster has an appropriate queue model for scheduling prioritized packet during congestion without drop or delay. Simulation results have proven that packet drop, control overhead, and end-to-end delay are much lower in PCCDC which in turn significantly increases packet delivery ratio, network lifetime, and residual energy when compared with PASCC protocol.


Sign in / Sign up

Export Citation Format

Share Document