scholarly journals An Efficient and Reliable Algorithm for Wireless Sensor Network

Sensors ◽  
2021 ◽  
Vol 21 (24) ◽  
pp. 8355
Author(s):  
Faheem Khan ◽  
Shabir Ahmad ◽  
Huseiyn Guruler ◽  
Gurcan Cetin ◽  
Taegkeun Whangbo ◽  
...  

In wireless sensor networks (WSN), flooding increases the reliability in terms of successful transmission of a packet with higher overhead. The flooding consumes the resources of the network quickly, especially in sensor networks, mobile ad-hoc networks, and vehicular ad-hoc networks in terms of the lifetime of the node, lifetime of the network, and battery lifetime, etc. This paper aims to develop an efficient and reliable protocol by using multicasting and unicasting to overcome the issue of higher overhead due to flooding. Unicasting is used when the desired destination is at a minimum distance to avoid an extra overhead and increases the efficiency of the network in terms of overhead and energy because unicasting is favorable where the distance is minimum. Similarly, multicasting is used when the desired destination is at maximum distance and increases the network’s reliability in terms of throughput. The results are implemented in the Department of Computer Science, Bacha Khan University Charsadda (BKUC), Pakistan, as well as in the Network Simulator-2 (NS-2). The results are compared with benchmark schemes such as PUMA and ERASCA, and based on the results, the performance of the proposed approach is improved in terms of overhead, throughput, and packet delivery fraction by avoiding flooding.

Author(s):  
Sudha Singh ◽  
D. K. Singh ◽  
Mr. Sudipta Mondal

The growth of laptop and 802.11/Wi-Fi wireless networking have made Mobile Ad hoc NETworks (MANETs) a popular research topic since the mid to late 1990s. Many academic papers evaluate protocols and abilities assuming varying degrees of mobility within a bounded space, usually with all nodes within a few hops of each other and usually with nodes sending data at a constant rate. Different protocols are then evaluated based on the packet drop rate, the overhead introduced by the routing protocols, and other measures. Research in MANET is like playing in a vast playground with only few known rules and large number of unknown rules applied to its different areas. Some areas are still unknown and some areas are at its early stage. Some of the research challenges that MANET present are dynamic topologies, battery lifetime, disconnected operations, security, et cetera. In general there are three types of MANET: vehicular ad hoc networks, intelligent vehicular ad hoc network, and Internet based mobile ad hoc networks. Each of these three types has its own research areas.


2012 ◽  
pp. 864-892
Author(s):  
Jianmin Chen ◽  
Jie Wu

Many secure mobile ad hoc networks (MANETs) and wireless sensor networks (WSNs) use techniques of applied cryptography. Numerous security routing protocols and key management schemes have been designed based on public key infrastructure (PKI) and identity-based cryptography. Some of these security protocols are fully adapted to fit the limited power, storage, and CPUs of these networks. For example, one-way hash functions have been used to construct disposable secret keys instead of creating public/private keys for the public key infrastructure. In this survey of MANET and WSN applications we present many network security schemes using cryptographic techniques and give three case studies of popular designs.


Author(s):  
Jianmin Chen ◽  
Jie Wu

Many secure mobile ad hoc networks (MANETs) and wireless sensor networks (WSNs) use techniques of applied cryptography. Numerous security routing protocols and key management schemes have been designed based on public key infrastructure (PKI) and identity-based cryptography. Some of these security protocols are fully adapted to fit the limited power, storage, and CPUs of these networks. For example, one-way hash functions have been used to construct disposable secret keys instead of creating public/private keys for the public key infrastructure. In this survey of MANET and WSN applications we present many network security schemes using cryptographic techniques and give three case studies of popular designs.


Sign in / Sign up

Export Citation Format

Share Document