scholarly journals Maximizing Lifetime of Barrier Coverage Wireless Sensor Network with Tell Neighbor Algorithm

Author(s):  
Vinay Chowdary ◽  
Mukul Kumar Gupta ◽  
Sushabhan Choudhury

The maximizing lifetime of Barrier coverage in wireless sensor network has attracted researchers in recent past. In barrier coverage applications it is essential to prolong the lifetime of sensor networks which guarantees extended operating lifetime of the overall network. In this paper, we propose a novel Tell Neighbor Algorithm (TNA), which increases the operating lifetime of the overall network. Simulation results show that the lifetime obtained by TNA is better than some of the already existing state-of-art algorithms. Lifetime obtained by TNA is doubled when compared already existing algorithms.

2012 ◽  
Vol 157-158 ◽  
pp. 503-506 ◽  
Author(s):  
Tao Yang ◽  
Pan Guo Fan ◽  
De Jun Mu

Wireless sensor network is always deployed in specific area for intrusion detection and environmental monitoring. The sensor nodes suffer mostly from their limited battery capacity.Maximizing the lifetime of the entire networks is mainly necessary considered in the design. Sliding the sensors in different barriers under the optimal barrier construction is a good solution for both maximizing network lifetime and providing predetermined coverage ratio. The simulation results demonstrate that the scheme can effectively reduce the energy consumption of the wireless sensor network and increase the network lifetime.


2011 ◽  
Vol 20 (06) ◽  
pp. 1051-1066 ◽  
Author(s):  
LINFENG LIU

Underwater sensor networks will find many oceanic applications in near future, and the deployment problem in 3D sensor networks has not been paid enough attention at present. In order to maximize the network lifetime, a deployment algorithm (UDA) for underwater sensor networks in ocean environment is proposed. UDA can determine and select the best cluster shape, then partition the space into layers and clusters while maintaining full coverage and full connectivity. In addition, nodes closer to sinks are possible to bear a heavier data-relaying mission. UDA sets different node deployment densities at different layers in response to the potential relay discrepancy. The simulation results suggest UDA can choose the proper cluster shape to get the maximum underwater wireless sensor network lifetime approximately.


Author(s):  
Sara Hebal ◽  
Lemia Louail ◽  
Saad Harous

Protocols for wireless sensor networks are generally designed following the layered protocol stack where layers are independent. Uncorrelated decisions coming from different layers may affect certain metrics such as the latency of communications, the energy consumption, etc. Cross-layer approaches overcome this problem by exploiting the dependencies between the layers. In this article, the authors propose latency and energy mac-aware routing for wireless sensor networks (LEMAR-WSN), a new cross-layer routing approach using information of the TDMA schedule and exploiting the information of the energy consumed by each node in order to optimize the latency of communications and the energy consumption when relaying information to the sink in a wireless sensor network. Simulation results show that the proposed approach improves the average latency of communications up to 20% and the average.


2013 ◽  
Vol 479-480 ◽  
pp. 788-792
Author(s):  
Young Long Chen ◽  
Yi Nung Shih ◽  
Siao Jhu Shih

In this paper, we aim to improve theenergy efficiency via a Clustering Algorithm based on Social Insect Colonies (CASIC), inorder to extend the lifetime of Wireless Sensor Networks(WSNs). We propose a CASIC with Sub-clusters (CASIC-S) for reducing the energyconsumption of sensor nodes within the concentric layer during transmission orreception. We also investigate the CASIC-S scheme with different numbers ofnodes in our simulations. The simulation results show that our proposed scheme performs better in terms of first node death and the number of nodes alive.


2018 ◽  
Vol 7 (2.26) ◽  
pp. 25
Author(s):  
E Ramya ◽  
R Gobinath

Data mining plays an important role in analysis of data in modern sensor networks. A sensor network is greatly constrained by the various challenges facing a modern Wireless Sensor Network. This survey paper focuses on basic idea about the algorithms and measurements taken by the Researchers in the area of Wireless Sensor Network with Health Care. This survey also catego-ries various constraints in Wireless Body Area Sensor Networks data and finds the best suitable techniques for analysing the Sensor Data. Due to resource constraints and dynamic topology, the quality of service is facing a challenging issue in Wireless Sensor Networks. In this paper, we review the quality of service parameters with respect to protocols, algorithms and Simulations. 


2017 ◽  
Vol 13 (07) ◽  
pp. 36
Author(s):  
Yuxia Shen

<p><span style="font-size: medium;"><span style="font-family: 宋体;">In wireless sensor networks, for improving the time synchronization perfromance of online monitoring and application of ZigBee protocol, a scheme is designed. For this objective, first of all, the ZigBee protocol specification is summarized, a profound analysis of the hardware abstraction architecture of TinyOS operating system is made; the advantages of the ZigBee protocol compared with the traditional radio technology are comparatively analyzed. At the same time, the node design block diagram based on CC2430 and related development system is provided. In the TinyOS2.x operating system, we analyze CC2430 application program abstract architecture, and on this basis, give the realization process of program design. The research results showed that we achieve an on-line monitoring system based on ZigBee protocol, which has realistic significance of applying ZigBee protocol in wireless sensor network of electrical equipment online monitoring. Based on the above research, it is concluded that the online monitoring system can collect the temperature parameters of the monitored object in real time that it can be widely applied in wireless sensor networks.</span></span></p>


Author(s):  
Audrey NANGUE ◽  
◽  
Elie FUTE TAGNE ◽  
Emmanuel TONYE

The success of the mission assigned to a Wireless Sensor Network (WSN) depends heavily on the cooperation between the nodes of this network. Indeed, given the vulnerability of wireless sensor networks to attack, some entities may engage in malicious behavior aimed at undermining the proper functioning of the network. As a result, the selection of reliable nodes for task execution becomes a necessity for the network. To improve the cooperation and security of wireless sensor networks, the use of Trust Management Systems (TMS) is increasingly recommended due to their low resource consumption. The various existing trust management systems differ in their methods of estimating trust value. The existing ones are very rigid and not very accurate. In this paper, we propose a robust and accurate method (RATES) to compute direct and indirect trust between the network nodes. In RATES model, to compute the direct trust, we improve the Bayesian formula by applying the chaining of trust values, a local reward, a local penalty and a flexible global penalty based on the variation of successful interactions, failures and misbehaviors frequency. RATES thus manages to obtain a direct trust value that is accurate and representative of the node behavior in the network. In addition, we introduce the establishment of a simple confidence interval to filter out biased recommendations sent by malicious nodes to disrupt the estimation of a node's indirect trust. Mathematical theoretical analysis and evaluation of the simulation results show the best performance of our approach for detecting on-off attacks, bad-mouthing attacks and persistent attacks compared to the other existing approaches.


Author(s):  
Smriti Joshi ◽  
Anant Kr. Jayswal

Energy efficiency is the kernel issue in the designing of wireless sensor network(WSN) MAC protocols. Energy efficiency is a major consideration while designing wireless sensor network nodes. Most sensor network applications require energy autonomy for the complete lifetime of the node, which may span up to several years. These energy constraints require that the system be built such that Wireless sensor networks use battery-operated computing and sensing devices. A network of these devices will collaborate for a common application such as environmental monitoring. Each component consumes minimum possible power, ensure the average successful transmission rate, decrease the data packet average waiting time, and reduce the average energy consumption. Influencing by the design principles of traditional layered protocol stack, current MAC protocol designing for wireless sensor networks (WSN) seldom takes load balance into consideration, which greatly restricts WSN lifetime. As a novel Forwarding Election-based MAC protocol, is presented to prolong WSN lifetime by means of improving energy efficiency and enhancing load balance.


Author(s):  
Manoshri A. Ghawade ◽  
Dr. Sheetal S. Dhande

Intrusion detection in Wireless Sensor Network (WSN) is of practical interest in many applications such as detecting an intruder in a battlefield. The intrusion detection is defined as a mechanism for a WSN to detect the existence of inappropriate, incorrect, or anomalous moving attackers. In this paper, we consider this issue according to heterogeneous WSN models. Furthermore, we consider two sensing detection models: single-sensing detection and multiple-sensing detection... Our simulation results show the advantage of multiple sensor heterogeneous WSNs.


The emergence of sensor networks as one of the dominant technology trends in the coming decades has posed numerous unique challenges on their security to researchers. These networks are likely to be composed of thousands of tiny sensor nodes, which are low-cost devices equipped with limited memory, processing, radio, and in many cases, without access to renewable energy resources. While the set of challenges in sensor networks are diverse, we focus on security of Wireless Sensor Network in this paper. First, we propose some of the security goal for Wireless Sensor Network. To perform any task in WSN, the goal is to ensure the best possible utilization of sensor resources so that the network could be kept functional as long as possible. In contrast to this crucial objective of sensor network management, a Denial of Service (DoS) attack targets to degrade the efficient use of network resources and disrupts the essential services in the network. DoS attack could be considered as one of th


Sign in / Sign up

Export Citation Format

Share Document