scholarly journals EVALUATION OF THE PERFORMANCE OF RE-AODV ROUTING PROTOCOL WITH DIFFERENT MOBILITY MODELS IN WIRELESS SENSOR NETWORKS

2021 ◽  
Vol 56 (5) ◽  
pp. 457-463
Author(s):  
Outazgui Saloua ◽  
Fakhri Youssef

This paper aims to present a detailed study of different mobility models applicable for Wireless Sensor Networks (WSN). Wireless Sensor Networks (WSN) have evolved dramatically in mobile networks, providing the key advantage of offering access to information without considering a user's spatial and topological characteristics. Due to the exponential advancement of the Internet and the development of small handheld devices as a source of connectivity and data sharing, the wireless network has almost exploded over the past few years. As a routing protocol for WSN in different studies, the Ad-hoc On-demand Distance-vector routing protocol (AODV) has shown better performance than different routing protocols. It offers quick adaptation to dynamic link conditions, low processing, low memory overheads, and low network utilization. To develop an optimized routing protocol, in our previous work, we had proposed an enhancement of the AODV routing protocol to increase the performance of the classic AODV protocol by optimizing the energy consumption and automatically maximizing the network lifetime. In this paper, we present a detailed study of mobility models applicable for WSN. We describe various mobility models representing mobile nodes whose movements are independent (individual mobility models) and dependent (group mobility models). Furthermore, we will focus on studying the behavior of our optimized version of AODV that we named RE-AODV with different existing mobility models so that we can, in the end, select the best mobility model. In terms of network efficiency, simulation results in this Work demonstrate that the type of mobility model used makes the difference and influences the behavior of nodes.

Optik ◽  
2014 ◽  
Vol 125 (2) ◽  
pp. 748-750 ◽  
Author(s):  
Vinod Kumar Verma ◽  
Surinder Singh ◽  
Nagendra P. Pathak

Author(s):  
Nandoori Srikanth ◽  
Muktyala Sivaganga Prasad

<p>Wireless Sensor Networks (WSNs) can extant the individual profits and suppleness with regard to low-power and economical quick deployment for numerous applications. WSNs are widely utilized in medical health care, environmental monitoring, emergencies and remote control areas. Introducing of mobile nodes in clusters is a traditional approach, to assemble the data from sensor nodes and forward to the Base station. Energy efficiency and lifetime improvements are key research areas from past few decades. In this research, to solve the energy limitation to upsurge the network lifetime, Energy efficient trust node based routing protocol is proposed. An experimental validation of framework is focused on Packet Delivery Ratio, network lifetime, throughput, energy consumption and network loss among all other challenges. This protocol assigns some high energy nodes as trusted nodes, and it decides the mobility of data collector.  The energy of mobile nodes, and sensor nodes can save up to a great extent by collecting data from trusted nodes based on their trustworthiness and energy efficiency.  The simulation outcome of our evaluation shows an improvement in all these parameters than existing clustering and Routing algorithms.<strong></strong></p>


2014 ◽  
Vol 573 ◽  
pp. 418-423
Author(s):  
S. Asha Latha ◽  
A. Sivabalan

Wireless sensor networks consist of a network of autonomous sensors that can reconfigure themselves so as to sense the environment in the most significant manner. However, a significant challenge in the practical application of these networks exists in credible authentication and network security. This paper proposes a secure authentication protocol which is considered as a pro-active method, where a user is strongly verified before accessing the data, it is the modified Adhoc On-Demand Distance vector (AODV) Routing protocol that provides many security principles to the user such as checking sequence number, IP address and threshold values. The performance of proposed algorithm is compared with the existing alogorithm based on the following parameters such as Throughput, End to End delay and packet delivery ratio. The results shows that the proposed protocol possesses many advantages against the popular black hole attack. This work has been carried out using NS2 software and the result obtained testifies the effectiveness of the proposed protocol. Keyword: Authentication protocol, AES security, AODV routing protocol, Black hole attack, Wireless sensor network (WSN).


2014 ◽  
Vol 32 (1) ◽  
pp. 80-101 ◽  
Author(s):  
Paola Andrea Gómez Puerta ◽  
Gonzalo Alberto Posada Pérez ◽  
Mónica Ayde Vallejo Velásquez

Sign in / Sign up

Export Citation Format

Share Document