scholarly journals Prospect Convenient Steadfast Procedure in Wireless Sensor Network

Author(s):  
Jewan Singh ◽  
Vibhakar Mansotra

<p>This article objective is to improve the steadfast routing in Wireless Sensor Networks with little interfering and avoid packet collision. In the scheme, the entire node has the option of electing next Data Communication Node (DCN). The next data communication node is chosen depend on the intensity of link, remaining energy, and the node with distance towards the Base Station. Thus, the sender node transmits the information to the best DCN. Instantly, the DCN sends the acknowledgement (ACK) along with the number of packets received back to the node from which it obtains the data. The sender node assures the delivery of the transmitted packets by comparing the value of number of packets sent with the value obtained with the acknowledgement. If they are equivalent, it will send the verification identity to the DCN. If it is not equivalent, it will decide another node with highest link intensity. After that, the data chooses the DCN and repeat the process until the data reaches the Base Station.</p>

Author(s):  
Saloni Dhiman ◽  
Deepti Kakkar ◽  
Gurjot Kaur

Wireless sensor networks (WSNs) consist of several sensor nodes (SNs) that are powered by battery, so their lifetime is limited, which ultimately affects the lifespan and hence performance of the overall networks. Till now many techniques have been developed to solve this problem of WSN. Clustering is among the effective technique used for increasing the network lifespan. In this chapter, analysis of multi-hop routing protocol based on grid clustering with different selection criteria is presented. For analysis, the network is divided into equal-sized grids where each grid corresponds to a cluster and is assigned with a grid head (GH) responsible for collecting data from each SN belonging to respective grid and transferring it to the base station (BS) using multi-hop routing. The performance of the network has been analyzed for different position of BS, different number of grids, and different number of SNs.


Author(s):  
Shakera Shaikh ◽  
Veena Gulhane

A wireless sensor network(WSN) consisting of a large number of tiny sensors can be an effective tool for gathering data in diverse kinds of environments. The data collected by each sensor node is communicated to the base station, which forwards the data to the end user. In wireless sensor network data security plays an important role where confidentiality, authentication, integrity, non repudiation are given importance. This paper synthesizes existing user authentication schemes in wireless sensor networks and highlights the challenges in user authentication.


21st century is considered as the era of communication, and Wireless Sensor Networks (WSN) have assumed an extremely essential job in the correspondence period. A wireless sensor network is defined as a homogeneous or heterogeneous system contains a large number of sensors, namely called nodes used to monitor different environments in cooperatives. WSN is composed of sensor nodes (S.N.), base stations (B.S.), and cluster head (C.H.). The popularity of wireless sensor networks has been increased day by day exponentially because of its wide scope of utilizations. The applications of wireless sensor networks are air traffic control, healthcare systems, home services, military services, industrial & building automation, network communications, VAN, etc. Thus the wide range of applications attracts attackers. To secure from different types of attacks, mainly intruder, intrusion detection based on dynamic state context and hierarchical trust in WSNs (IDSHT) is proposed. The trust evaluation is carried out in hierarchical way. The trust of sensor nodes is evaluated by cluster head (C.H.), whereas the trust of the cluster head is evaluated by a neighbor cluster head or base station. Hence the content trust, honest trust, and interactive trust are put forward by combining direct evaluation and feedback based evaluation in the fixed hop range. In this way, the complexity of trust management is carried in a hierarchical manner, and trust evaluation overhead is minimized.


Author(s):  
Mohammad Sedighimanesh ◽  
Hesam Zandhesami ◽  
Ali Sedighimanesh

Background: Wireless sensor networks are considered as one of the 21st century's most important technologies. Sensors in wireless sensor networks usually have limited and sometimes non-rechargeable batteries, which they are supposed to be preserved for months or even years. That's why the energy consumption in these networks is of a great importance. Objective: One way to improve energy consumption in a wireless sensor network is to use clustering. In clustered networks, one node is known as the cluster head and other nodes as normal members, which normal nodes send the collected data to the cluster head, and the cluster head sends the information to the base station either by a single step or by multiple steps. Method: Using clustering simplifies resource management and increases scalability, reliability, and the network lifetime. Although the cluster formation involves a time- overhead and how to choose the cluster head is another problem, but its advantages are more than its disadvantages. : The primary aim of this study is to offer a solution to reduce energy consumption in the sensor network. In this study, during the selection of cluster heads, Honeybee Algorithm is used and also for routing, Harmonic Search Algorithm is used. In this paper, the simulation is performed by using MATLAB software and the proposed method is compared with the Low Energy Adaptive Clustering Hierarchy (LEACH) and the multi-objective fuzzy clustering algorithm (MOFCA). Result and Conclusion: By simulations of this study, we conclude that this research has remarkably increased the network lifetime with respect to EECS, LEACH, and MOFCA algorithms. In view of the energy constraints of the wireless sensor network and the non-rechargeable batteries in most cases, providing such solutions and using metaheuristic algorithms can result in a significant reduction in energy consumption and, consequently, increase in the network lifetime.


Author(s):  
Gaurav Kumar Nigam ◽  
Chetna Dabas

Background & Objective: Wireless sensor networks are made up of huge amount of less powered small sensor nodes that can audit the surroundings, collect meaningful data, and send it base station. Various energy management plans that pursue to lengthen the endurance of overall network has been proposed over the years, but energy conservation remains the major challenge as the sensor nodes have finite battery and low computational capabilities. Cluster based routing is the most fitting system to help for burden adjusting, adaptation to internal failure, and solid correspondence to draw out execution parameters of wireless sensor network. Low energy adaptive clustering hierarchy is an efficient clustering based hierarchical protocol that is used to enhance the lifetime of sensor nodes in wireless sensor network. It has some basic flaws that need to be overwhelmed in order to reduce the energy utilization and inflating the nodes lifetime. Methods : In this paper, an effective auxiliary cluster head selection is used to propose a new enhanced GC-LEACH algorithm in order to minimize the energy utilization and prolonged the lifespan of wireless sensor network. Results & Conclusion: Simulation is performed in NS-2 and the outcomes show that the GC-LEACH outperforms conventional LEACH and its existing versions in the context of frequent cluster head rotation in various rounds, number of data packets collected at base station, as well as reduces the energy consumption 14% - 19% and prolongs the system lifetime 8% - 15%.


2012 ◽  
Vol 6-7 ◽  
pp. 859-864
Author(s):  
Shu Qian Wang ◽  
Wei Zhang ◽  
Zhang Wei Zhu ◽  
Cheng Quan Hu ◽  
Li Li He

One of the bottlenecks that slow down the development the wireless sensor networks application is that people have to design different programs according to the different applications. A wireless sensor network application platform is presented which can be used to rapidly deploy an application by setting simple configuration parameters. The platform consists of two modules: Base station Module and Server Module. Base Station Module receives data from the coordinator by RS232 port,and sends them to the server through socket protocol. It also receives commands and parameters from server and delivers them to the coordinator. The platform also provides human-computer interactive function for users in the Browser/Server structure.


2021 ◽  
Vol 13 (0203) ◽  
pp. 124-128
Author(s):  
Suneela Kallakunta ◽  
Alluri Sreenivas

Wireless sensor networks (WSNs) are a new kind of wireless networks that are becoming very popular with a large number of civilian and military applications. A wireless sensor network (WSN) is a wireless network that contains distributed independent sensor devices that are meant to monitor physical or environmental conditions. AWireless Sensor Network consists of a set of connected tiny sensor nodes, which communicate with each other we can also interchange information and data. These nodes obtain information on the environment such as temperature, pressure, or humidity and this information is stored in a base station. The latter sends the info to a wired network or activates an alarm or an action, depending on the type of data being monitored.


2018 ◽  
Vol 1 (2) ◽  
pp. 65-72
Author(s):  
I Nyoman Buda Hartawan ◽  
I Gusti Made Ngurah Desnanjaya

Wireless sensor network is a technology used in supporting monitoring activities both inside and outside environment. Data communication on wireless sensor networks is done wirelessly. The Zigbee protocol is one of the protocols used in data communication on wireless sensor networks as an implementation of XBEE devices. In this study measurement of Zigbee protocol performance on XBEE devices inside and outside environment. The measurement conditions in the room are limited by the wall partition, while the outdoor conditions are line of sight. Measurements were made by sending packet data using XCTU software, by testing distance parameters, packet delay, packet loss, RSSI, and throughput with 84 Bytes packet data size. The results showed that the measurement results of XBEE Pro S2 devices that were carried out indoors were able to communicate with a maximum distance of 30 meters, while the outdoor measurements showed the communication capability of XBEE Pro S2 devices reached a maximum distance of 600 meters.


2020 ◽  
Vol 12 (1) ◽  
pp. 205-224
Author(s):  
Anshu Kumar Dwivedi DUBEY

Purpose ”“ In the recent scenario, there are various issues related to wireless sensor networks such as clustering, routing, packet loss, network strength. The core functionality of primarily wireless sensor networks is sensor nodes that are randomly scattered over a specific area. The sensor senses the data and sends it to the base station. Energy consumption is an important issue in wireless sensor networks. Clustering and cluster head selection is an important method used to extend the lifetime of wireless sensor networks. The main goal of this research article is to reduce energy consumption using a clustering process such as CH determination, cluster formation, and data dissemination.   Methodology/approach/design ”“ The simulation in this paper was finished utilizing MATLAB programming methodology and the proposed technique is contrasted with the LEACH and MOD-LEACH protocols.   Findings ”“ The simulation results of this research show that the energy consumption and dead node ratio are improved of wireless sensor networks as compared to the LEACH and MOD-LEACH algorithms.   Originality/value ”“ In the wireless sensor network there are various constraints energy is one of them. In order to solve this problem use CH selection algorithms to reduce energy consumption and consequently increase network lifetime.


Author(s):  
Neha Singh ◽  
Deepali Virmani ◽  
Xiao-Zhi Gao

Intrusion is one of the biggest problems in wireless sensor networks. Because of the evolution in wired and wireless mechanization, various archetypes are used for communication. But security is the major concern as networks are more prone to intrusions. An intrusion can be dealt in two ways: either by detecting an intrusion in a wireless sensor network or by preventing an intrusion in a wireless sensor network. Many researchers are working on detecting intrusions and less emphasis is given on intrusion prevention. One of the modern techniques for averting intrusions is through fuzzy logic. In this paper, we have defined a fuzzy rule-based system to avert intrusions in wireless sensor network. The proposed system works in three phases: feature extraction, membership value computation and fuzzified rule applicator. The proposed method revolves around predicting nodes in three categories as “red”, “orange” and “green”. “Red” represents that the node is malicious and prevents it from entering the network. “Orange” represents that the node “might be malicious” and marks it suspicious. “Green” represents that the node is not malicious and it is safe to enter the network. The parameters for the proposed FzMAI are packet send to base station, energy consumption, signal strength, a packet received and PDR. Evaluation results show an accuracy of 98.29% for the proposed system. A detailed comparative analysis concludes that the proposed system outperforms all the other considered fuzzy rule-based systems. The advantage of the proposed system is that it prevents a malicious node from entering the system, thus averting intrusion.


Sign in / Sign up

Export Citation Format

Share Document