scholarly journals A Protocol for the Effective Utilization of Energy in Wireless Sensor Network

2018 ◽  
Vol 7 (3.3) ◽  
pp. 82
Author(s):  
Santosh Anand ◽  
Pillai Atulya Radhakrishna

In current technology Adhoc network is most commonly used in communication network. Major parts of the Adhoc network devices are based on the sensor nodes. Sensor devices operated on the battery so energy is vital constraint. Effective Utilization of the energy of the sensor nodes and sensor networks to the full extent is highly impracticable. Optimization of the network root and the load balancing in coverage helps to maximize the lifetime of the sensor network considerably. The research carry out on sensor network, deployment model is proposed which essentially finds the optimized roots with the help of  neighbour discovery algorithm which find the neighbour and non neighbour nodes and analysis the load of the network based on Packet Retrieval in RREQ, throughput, average energy consumption, packet delivery ratio and packet drop. 

Sensors ◽  
2018 ◽  
Vol 18 (11) ◽  
pp. 3884 ◽  
Author(s):  
Hongxian Tian ◽  
Mary Weitnauer ◽  
Gedeon Nyengele

We study the placement of gateways in a low-power wide-area sensor network, when the gateways perform interference cancellation and when the model of the residual error of interference cancellation is proportional to the power of the packet being canceled. For the case of two sensor nodes sending packets that collide, by which we mean overlap in time, we deduce a symmetric two-crescent region wherein a gateway can decode both collided packets. For a large network of many sensors and multiple gateways, we propose two greedy algorithms to optimize the locations of the gateways. Simulation results show that the gateway placements by our algorithms achieve lower average contention, which means higher packet delivery ratio in the same conditions, than when gateways are naively placed, for several area distributions of sensors.


Author(s):  
Zahoor Ahmed ◽  
Kamalrulnizam Abu Bakar

The deployment of Linear Wireless Sensor Network (LWSN) in underwater environment has attracted several research studies in the underwater data collection research domain. One of the major issues in underwater data collection is the lack of robust structure in the deployment of sensor nodes. The challenge is more obvious when considering a linear pipeline that covers hundreds of kilometers. In most of the previous work, nodes are deployed not considering heterogeneity and capacity of the various sensor nodes. This lead to the problem of inefficient data delivery from the sensor nodes on the underwater pipeline to the sink node at the water surface. Therefore, in this study, an Enhanced Underwater Linear Wireless Sensor Network Deployment (EULWSND) has been proposed in order to improve the robustness in linear sensor underwater data collection. To this end, this paper presents a review of related literature in an underwater linear wireless sensor network. Further, a deployment strategy is discussed considering linearity of the underwater pipeline and heterogeneity of sensor nodes. Some research challenges and directions are identified for future research work. Furthermore, the proposed deployment strategy is implemented using AQUASIM and compared with an existing data collection scheme. The result demonstrates that the proposed EULWSND outperforms the existing Dynamic Address Routing Protocol for Pipeline Monitoring (DARP-PM) in terms of overhead and packet delivery ratio metrics. The scheme performs better in terms of lower overhead with 17.4% and higher packet delivery with 20.5%.


2018 ◽  
Vol 7 (4.20) ◽  
pp. 15
Author(s):  
Ashwala Mohan ◽  
Dr. Bhanu Bhaskara

With the increased interest in the utilization of smart applications, the IoT has gained a lot of popularity in the real world scenario. Due to the integration of different heterogeneous devices in a single network, various types of security issues will arise in the IoT. To ensure more security in IoT, this paper proposes a new trust aware routing framework based on the inherent communication and data properties of devices connected in the network. A new trust metric is derived in this paper by combining two different trusts based on the communication between nodes and the information passing through them. Further to achieve a prolonged network lifetime with optimal resource conservation, a clustering based communication strategy is accomplished. Extensive simulations are carried out by varying the malicious nature of network and the performance is measured through the metrics, packet loss ratio, packet delivery ratio, delay, network lifetime and average energy consumption. 


Author(s):  
Kirti A. Adoni ◽  
Anil S. Tavildar ◽  
Krishna K. Warhade

Background: The performance of Mobile Ad-hoc Networks get severely degraded due to various attacks including Selfish Behaviour attack. The detection of malicious nodes and avoidance of such nodes for data forwarding is important to enhance the MANET’s performance. Methods: A probabilistic model based on Single Sided Laplacian distribution for the random ON/OFF switching time of this attack is proposed. The model is used to make appropriate decisions regarding assignment of trust levels to suspicious nodes. The proposed protocol, based on this trust along with Confidence values of nodes, referred to as OLSRT-C protocol is used to select the optimum path for data forwarding. Simulations are carried out using Network Simulator NS2.35. Results: The random behavior of Selfish Behaviour attack is analyzed by considering all the possible random parameters. The random deployment of mobile nodes, number of malicious nodes, number of times the malicious nodes switch and timing instances at which these nodes change their states are considered. From the results, it is observed that, the OLSRTC protocol gives stable performance for Packet Delivery Ratio and Routing Overheads whereas for OLSR protocol, Packet Delivery Ratio gradually reduces and Routing Overheads increase, for percentage of malicious nodes increase from 10% to 50%. For OLSRT-C protocol, Average Energy Consumption per node increases marginally compared to OLSR protocol. Conclusion: The proposed OLSRT-C protocol successfully mitigates randomized Selfish Behaviour attack with marginal increase in the Average Energy Consumption per node. The Protocol Efficacy for OLSRT-C protocol is much higher compared to OLSR protocol.


Author(s):  
Kirti A. Adoni ◽  
Anil S. Tavildar ◽  
Krishna K. Warhade

Background and Objective: Random Black Hole (BH) attack significantly degrades MANET’s performance. For strategic applications, the performance parameters like Packet Delivery Ratio, Routing Overheads, etc. are important. The objectives are: (a) To model random BH attack, (b) To propose a routing strategy for the protocol to mitigate random BH attack, (c) To evaluate and compare the network performance of modified protocol with the standard protocol. Methods: The random BH attack is modelled probabilistically. The analysis is carried out by varying Black Hole Attack (BHA) time as Early, Median, Late occurrences and mix of these three categories. The blocking performance is also analysed by varying the percentages of malicious presence in the network. Normal Optimized Link State Routing (OLSR) protocol is used to simulate the MANET performance using a typical medium size network. The protocol has then been modified using Trust- Confidence aware routing strategy, named as TCAOLSR, with a view to combat the degradations due to the random BH attack. Results: The random behavior of Black Hole attack is analyzed with all the possible random parameters, like deployment of mobile nodes, number of malicious nodes and timing instances at which these nodes change their state. From the results of individual type- Early, Median and Late, it is observed that the TCAOLSR protocol gives stable performance for Packet Delivery Ratio (PDR) and Routing Overheads (RO), whereas for OLSR protocol PDR gradually reduces and RO increases. For individual and mix type, Average Energy Consumption (AEC) per node increases marginally for TCAOLSR protocol. For the mix type, PDR for TCAOLSR is 40-60% better whereas RO for TCAOLSR is very less compared to OLSR protocol. The efficacy of the TCAOLSR protocol remains stable for different categories of BH attack with various percentages of malicious nodes compared to OLSR with the same environment. Conclusion: Simulations reveal that the modified protocol TCAOLSR, effectively mitigates the network degradation for Packet Delivery Ratio and Routing Overheads considerably, at the cost of a slight increase in Average Energy Consumption per node of the network. Efficacy of the OLSR and TCAOLSR protocols has also been defined and compared to prove robustness of the TCAOLSR protocol.


2019 ◽  
Vol 8 (3) ◽  
pp. 6013-6018

MANETs are a trending topic in the wireless communication network. MANETs are formed automatically by an autonomous system of mobile nodes that are connected via wireless links. Cluster-head gateway switch routing protocol (CGSR) is a proactive protocol which is also called table-driven protocol. It consists of routing table information before setting up a connection. Ad-hoc on-demand distance vector protocol (AODV) is a reactive protocol, it sets path only when demanded by the network. CGSR protocol forms a group of nodes into clusters and selects a node as cluster-head based on some clustering algorithms for each cluster. In this paper, we have proposed a protocol, which combines the advantages of both CGSR and AODV to minimize traffic congestion in an ad-hoc wireless network. The performance metrics such as routing overhead, end-end delay, packet delivery ratio, throughput, and average energy consumption are enhanced and compared with other clustering protocols such as CGSR and LEACH protocols. The comparison result reveals that the routing overhead, end-end delay, and the average energy consumption is reduced and packet delivery ratio, throughput is improved.


Author(s):  
Mr. Raghavendra Y. M. ◽  
Dr. U. B. Mahadevaswamy

In Wireless Sensor Networks (WSNs), the reduction of energy consumption in the batteries of a sensor node is an important task. Sensor nodes of WSNs perform three significant functions such as data sensing, data transmitting and data relaying. Routing technique is one of the methods to enhance the sensor nodes battery lifetime. Energy optimization is done by using one of the heuristic routing methods for sensing and transmitting the data. To enhance the energy optimization mainly concentrated on data relaying. In this work stochastic hill climbing is adapted. The proposed solution for data relaying utilizes geographical routing and mobile sink technique. The sink collects the data from cluster heads and movement of the sink is routed by stochastic hill climbing. Network simulator 2 is used for experimentation purpose. This work also compares with the existing routing protocols like Energy-efficient Low Duty Cycle (ELDC), Threshold sensitive Energy Efficient sensor Network (TEEN) and Adaptive clustering protocol. The proposed work shows promising results with respect to lifetime, average energy of nodes and packet delivery ratio.


2022 ◽  
Vol 14 (1) ◽  
pp. 28
Author(s):  
Yelena Trofimova ◽  
Pavel Tvrdík

In wireless ad hoc networks, security and communication challenges are frequently addressed by deploying a trust mechanism. A number of approaches for evaluating trust of ad hoc network nodes have been proposed, including the one that uses neural networks. We proposed to use packet delivery ratios as input to the neural network. In this article, we present a new method, called TARA (Trust-Aware Reactive Ad Hoc routing), to incorporate node trusts into reactive ad hoc routing protocols. The novelty of the TARA method is that it does not require changes to the routing protocol itself. Instead, it influences the routing choice from outside by delaying the route request messages of untrusted nodes. The performance of the method was evaluated on the use case of sensor nodes sending data to a sink node. The experiments showed that the method improves the packet delivery ratio in the network by about 70%. Performance analysis of the TARA method provided recommendations for its application in a particular ad hoc network.


This paper develops a method to detect the failures of wireless links between one sensor nodes to another sensor node in WSN environment. Every node in WSN has certain properties which may vary time to time based on its ability to transfer or receive the packets on it. This property or features are obtained from every node and they are classified using Neural Networks (NN) classifier with predetermined feature set which are belonging to both weak link and good link between nodes in wireless networks. The proposed system performance is analyzed by computing Packet Delivery Ratio (PDR), Link Failure Detection Rate (LFDR) and latency report.


Author(s):  
Atif Sharif ◽  
Vidyasagar Potdar ◽  
A. J. D. Rathnayaka

In WSN transport, layer protocol plays a significant role in maintaining the node’s energy budget. To find out the dependency of Transport layer on MAC/PHY layer, the authors have extensively tested various transport protocols using IEEE 802.11, IEEE 802.15.4 MAC/PHY protocols for WSN. For IEEE802.11 and IEEE802.15.4 with RTS/CTS ON the TCP variants has shown >80% packet delivery ratio and 5-20% packet loss, while for UDP it is around >63% and 19.54-35.18% respectively. On average 1-3% additional energy is consumed for packet retransmissions in IEEE 802.11 with RTS/CTS OFF whereas significant energy efficiency is observed in IEEE802.15.4 case. For IEEE 802.11 with RTS/CTS ON high throughput, low packet drop rate and increased E-2-E delay is observed, while for IEEE 802.15.4 improved power efficiency and jitter behavior is observed. This has led the foundation for the future development of the cross-layered energy efficient transport protocol for WSN.


Sign in / Sign up

Export Citation Format

Share Document