Performance Analysis of Multiple Relays Cooperative Truncated Automatic Repeat Request in Wireless Sensor Networks

2019 ◽  
Vol 17 (9) ◽  
pp. 733-738
Author(s):  
Yong-Qiang Zhou ◽  
Lei Dai ◽  
Suo-Ping Li

In this paper, we research the performance of direct and non-direct multiple relays cooperative truncated automatic repeat request (D/ND-MRCT-ARQ) protocols in wireless sensor networks (WSNs). We propose a method that named discrete time Markov chain (DTMC) with N + 2 states, which could obtain the throughput formulas of D/ND-MRCT-ARQ protocols. Furthermore, we solve the mathematical expressions of the average transmission delay of both protocols by truncating the number of packet retransmission. In addition, we derive energy efficiency formulas of both protocols under considering the different power consumption of each node. Simulation results demonstrate that the proposed D-MRCT-ARQ protocol achieve higher throughput and energy efficiency while fewer average packet transmission delay, as compared with the ND-MRCT-ARQ protocol.

2017 ◽  
Vol 2 (1) ◽  
Author(s):  
Palak Aggarwal ◽  
Santosh Kumar ◽  
Neha Garg ◽  
Sumeshwar Singh

Energy and security are very important issues in Wireless Sensor Networks (WSN) which need to be handled. These issues are interrelated because of limited energy there are some restrictions on implementation of security. Insider packet drop attack is one of the dangerous attacks for wireless sensor network that causes a heavy damage to WSN functionalities by dropping packets. It becomes necessary to identify such attack for secure routing of data in WSN. To detect this attack, trust mechanism has been proven as a successful technique. In this mechanism, each node verifies the trustworthiness of its neighbor node before packet transmission so that packets can only be transmitted to trustworthy nodes. But there is a problem of False Alarm with such trust-aware scheme. False alarm occurs when a good node’s trust value goes down due to natural packet dropping and being eliminated from the routing paths. This wastes network’s resources that further shortens network lifetime. In this paper, we have proposed a system for identification and recovery of false alarms (IRFA) which is the optimization of existing trust based system. But security solution needs to be energy efficient due to scarcity of energy resources in WSN. To provide energy efficiency, we have implemented proposed IRFA system in cluster based environment which detects insider packet drop attackers in an energy efficient manner. We have conducted OMNET++ simulation and results demonstrate that the proposed system performance is better than existing trust-based system in terms of packet delivery rate and energy efficiency which improves network lifetime.


2018 ◽  
Vol 7 (4.4) ◽  
pp. 33
Author(s):  
Jin Young Lee ◽  
Seong Cheol Kim ◽  
Hye Yun Kim

In this paper, we present an energy and time constrained packet transmission MAC Protocol which we call ED-MAC for event-driven applications such as fire detection in wireless sensor networks (WSNs). In this kind of WSNs, sensor nodes send a burst data when there is an event in the measuring field. These events are usually critical, so the measured burst data should be transmitted in limited time to their final destination node, sink node. Therefore, the packet transmission delay is considered to be a crucial requirement in event-driven applications. The ED-MAC protocol reduces the packet transmission delay and average node energy consumption in comparison to existing related MAC protocols. 


2019 ◽  
Vol 16 (9) ◽  
pp. 3961-3964
Author(s):  
Charu Sharma ◽  
Rohit Vaid

In designing Wireless Sensor Networks, energy efficiency and security should be considered very critically. Energy efficiency is achieved through data aggregation which eliminates the transmission of redundant data while security is achieved by preserving confidentiality among sensor node and the base station. In this paper, an energy efficient and secure cluster based aggregation mechanism is presented. In this model, for energy efficiency the network is divided into tracks and sectors so the cluster head’s are uniformly selected from the whole network. To achieve security the cluster head’s perform data aggregation with the help of some pattern codes and only distinctive data is transmitted from sensor nodes in encrypted form. To perform aggregation, the sensor nodes do not need to know about the actual sensor data therefore there is no need to use any encryption or decryption schemes between nodes and cluster head. Performance evaluation shows proposed model works better to enhance the network lifetime, security, average residual energy, and average packet transmission ratio than conventional data aggregation models.


Author(s):  
A. Radhika ◽  
D. Haritha

Wireless Sensor Networks, have witnessed significant amount of improvement in research across various areas like Routing, Security, Localization, Deployment and above all Energy Efficiency. Congestion is a problem of  importance in resource constrained Wireless Sensor Networks, especially for large networks, where the traffic loads exceed the available capacity of the resources . Sensor nodes are prone to failure and the misbehaviour of these faulty nodes creates further congestion. The resulting effect is a degradation in network performance, additional computation and increased energy consumption, which in turn decreases network lifetime. Hence, the data packet routing algorithm should consider congestion as one of the parameters, in addition to the role of the faulty nodes and not merely energy efficient protocols .Nowadays, the main central point of attraction is the concept of Swarm Intelligence based techniques integration in WSN.  Swarm Intelligence based Computational Swarm Intelligence Techniques have improvised WSN in terms of efficiency, Performance, robustness and scalability. The main objective of this research paper is to propose congestion aware , energy efficient, routing approach that utilizes Ant Colony Optimization, in which faulty nodes are isolated by means of the concept of trust further we compare the performance of various existing routing protocols like AODV, DSDV and DSR routing protocols, ACO Based Routing Protocol  with Trust Based Congestion aware ACO Based Routing in terms of End to End Delay, Packet Delivery Rate, Routing Overhead, Throughput and Energy Efficiency. Simulation based results and data analysis shows that overall TBC-ACO is 150% more efficient in terms of overall performance as compared to other existing routing protocols for Wireless Sensor Networks.


Sign in / Sign up

Export Citation Format

Share Document