scholarly journals Designing a Channel Access Mechanism for Wireless Sensor Network

2017 ◽  
Vol 2017 ◽  
pp. 1-31 ◽  
Author(s):  
Basma M. Mohammad El-Basioni ◽  
Abdellatif I. Moustafa ◽  
Sherine M. Abd El-Kader ◽  
Hussein A. Konber

Although there are various Medium Access Control (MAC) protocols proposed for Wireless Sensor Network (WSN), there is no protocol accepted as a standard specific to it. This paper deals with completing the design of our previously proposed MAC for WSN by proposing a channel access mechanism (CAM). The CAM is based on developing a backoff mechanism which mainly differentiates nodes’ backoffs depending on their different identification numbers, and it employs a performance tuning parameter for reaching a required performance objective. The probability distribution of the backoff period is constructed and Markov chain modeling is used to analyze and evaluate the CAM against the IEEE802.15.4 slotted CSMA/CA based on single- and multihop communication with respect to the reliability, the average delay, the power consumption, and the throughput. The analysis reveals that the required performance of CAM against the IEEE slotted CSMA/CA can be obtained by choosing the maximum backoff stages number and the tuning parameter value and that CAM performs better than the IEEE with larger nodes number. The multihop scenario results in a good end-to-end performance of CAM with respect to the reliability and delay becomes better with lengthier paths at the expense of increasing the energy consumption.

2019 ◽  
Vol 8 (2) ◽  
pp. 2612-2616

Intrusion detection is the one of the challenging task in wireless sensor network and prevents the system and network resources from being intrude or compromised. One of the ongoing strategies for recognizing any anomalous activities presented in a network is done by intrusion detection systems (IDS) and it becomes an essential part of defense system against attacker problems. The primary goal of our work is to study and analyze intrusion detection technique meant for improving the performance of Intrusion Detection using hybrid ANN based Clustering technique. To estimate the effectiveness of the proposed strategy, KDD CUP 99 dataset is utilized for testing and assessment. Based on the analysis, it is noticed that the proposed ANN clustering performs much better than other methods with respect to accuracy which attains an average high accuracy of 93.91%when compared with other methods.


2021 ◽  
Vol ahead-of-print (ahead-of-print) ◽  
Author(s):  
Prashant R. Dike ◽  
T.S. Vishwanath ◽  
Vandana Rohakale

PurposeSince communication usually accounts as the foremost problem for power consumption, there are some approaches, such as topology control and network coding (NC), for diminishing the activity of sensors’ transceivers. If such approaches are employed simultaneously, then the overall performance does raise as expected. In a wireless sensor network (WSN), the linear NC has been shown to enhance the performance of network throughput and reduce delay. However, the NC condition of existing NC-aware routings may experience the issue of false-coding effect in some scenarios and usually neglect node energy, which highly affects the energy efficiency performance. The purpose of this paper is to propose a new NC scheduling in a WSN with the intention of maximizing the throughput and minimizing the energy consumption of the network.Design/methodology/approachThe improved meta-heuristic algorithm called the improved mutation-based lion algorithm (IM-LA) is used to solve the problem of NC scheduling in a WSN. The main intention of implementing improved optimization is to maximize the throughput and minimize the energy consumption of the network during the transmission from the source to the destination node. The parameters like topology and time slots are taken for optimizing in order to obtain the concerned objective function. While solving the current optimization problem, it has considered a few constraints like timeshare constraint, data-flow constraint and domain constraint. Thus, the network performance is proved to be enhanced by the proposed model when compared to the conventional model.FindingsWhen 20 nodes are fixed for the convergence analysis, performed in terms of multi-objective function, it is noted that during the 400th iteration, the proposed IM-LA was 10.34, 13.91 and 50% better than gray wolf algorithm (GWO), firefly algorithm (FF) and particle swarm optimization (PSO), respectively, and same as LA. Therefore, it is concluded that the proposed IM-LA performs extremely better than other conventional methods in minimizing the cost function, and hence, the optimal scheduling of nodes in a WSN in terms of the multi-objective function, i.e. minimizing energy consumption and maximizing throughput using NC has been successfully done.Originality/valueThis paper adopts the latest optimization algorithm called IM-LA, which is used to solve the problem of network coding scheduling in a WSN. This is the first work that utilizes IM-LA for optimal network coding in a WSN.


Author(s):  
R S Uppal ◽  
Shakti Kumar

This paper proposes soft computing technique Big Bang-Big Crunch (BB-BC) to address the main issue of deployment of wireless sensor networks. Deployment is the main factor that significantly affects the performance of the wireless sensor network. This approach maximizes the coverage area of the given set of sensors. We implemented our approach in MATLAB and compared it with ABC approach and found that the proposed approach is much better than the said approach.


Sign in / Sign up

Export Citation Format

Share Document