Neighbor Co-ordination based Fault Node Detection Algorithm for Distributed Wireless Sensor Networks

Size: px
Start display at page:

Download "Neighbor Co-ordination based Fault Node Detection Algorithm for Distributed Wireless Sensor Networks"

Transcription

1 Neighbor Co-ordination based Node Detection Algorithm for Distributed Wireless Sensor Networks Prashant Shukla*, Rama Ranjan Panda Department of Computer Science and Engineering RSR Rungta College of Engineering & Technology Kohka-Kurud Road, Bhilai, Chhattisgarh Abstract In this paper a neighbor coordination approach based fault node detection technique for distributed wireless sensor networks (WSNs) is presented. Because of large deviation in incorrect data transmitted by various faulty sensor nodes(sns), the statistical based approach of fault detection using mean, mode, median and other hypothetical test based schemes becomes inappropriate for large scale distributed WSNs. This research concentrates on fault node identification in distributed WSNs where the neighboring nodes attempt to identify the faulty SN through comparing their sensed data with all of their neighbor s data. The main aim of this study is to design a less complex fault node detection algorithm, which can easily detect faulty sensor nodes present in distributed WSNs by using a neighbor coordination approach based fault node detection technique. The simulation results show the proposed algorithm is effective in terms of performance measures like detection accuracy, false alarm rate and false positive rate which are far better in than conventional methods used to detect the faulty SNs in WSNs. Keywords Wireless Sensor Networks; Node Detection; Neighbor Coordination Approach. I. INTRODUCTION The problem of fault node detection in distributed wireless sensor networks (WSNs) have acquired universal scientific interest not only because of their small dimension, power efficient hardware platforms which incorporates sensing and processing of data along with wireless communication capability, but also due to their wide range of applications and ease of deployment. In the recent years, WSNs have influenced our daily life by providing various services like remote environmental monitoring, infrastructure management, target tracking, target localization, home and office security, public safety, event detection, event boundary identification, medicine, transportation and many more [1, 2]. SNs have large number of hardware and software restrictions in terms of processing capability, memory power, power efficient, and communication capability due to their small dimensions. However SNs are likely to have faults because of many reasons like mechanical or electrical problems in their internal circuits, environmental degradation, power-supply depletion, or even hostile tampering. Sometimes SNs may also be expected to operate autonomously, if they are installed in unattended or harsh environments. Because of this reason faults are likely to occur frequently in WSNs. Moreover, if deployment of small, cheap SNs is done on a large scale then it will lead to node failure due to fabrication defects and due to which occurrence of faults in SNs will be quite common. Thus, it is quite essential to identify and trace out the faulty SNs in the network, and exclude them before routine operation as they can be used as typical sensing nodes [3, 4]. The sensor faults can be broadly divided into two major categories as crash faults and soft faults. In crash fault, a SN is unable to communicate with rest of the nodes and becomes dormant in the network, while in soft fault, the SN starts behaving randomly in the network. Therefore it becomes very important to identify the set of faulty SNs within a network. The process of determining whether the SN is good or faulty is known as fault detection in WSNs [13, 14]. Several fault node detection and fault diagnosis techniques of distributed WSNs have been proposed in [5-10]. Krishnamachari et al. [5] have proposed a Bayesian fault identification approach to resolve the fault event disambiguation problem in WSNs. Koushanfar et al. [6] have presented a cross validation based approach for online detection of faulty SNs in WSNs. In this approach, statistical methods are used to detect the sensors which are having the highest of faults. Ruiz et al. [7] have proposed an external manager based fault node identification approach for event driven based WSNs. Even though the external manager is capable of performing more complex tasks than the typical SNs, still there exist a problem of communication between the SNs and the external manager. Ding et al. [8] have presented a neighbor co-ordination based localized fault node detection approach, in which each SN compares its own sensed data with the median of all of its neighboring node s data to evaluate its fault status. Luo et al. [9] have presented an energy-efficient fault-tolerant event detection approach for distributed WSNs, in which minimum numbers of neighbors are selected for fault node detection in order to minimize the communication overhead. Chen et al. [10] have presented a distributed fault node detection approach for WSNs. In this approach, local comparisons are done using a modified majority voting technique. In this approach, each SN compares its own sensed data with its neighboring node s data and based on which, a decision has to be taken by taking all neighboring nodes in confidence. However, the approach becomes little complicated because the exchange of information between two neighboring nodes is done twice in order to reach a local decision of fault status which is based on a threshold value. 261

2 In this paper, we have presented an efficient algorithm for identifying faulty SNs in a distributed WSNs based on a neighbor coordination approach based fault node detection technique. Examples and simulation results have validated its efficiency. II. MODEL AND PROBLEM FORMULATION In recent past, fault node detection in WSNs has become prime area of study. node detection approach can be categorized into two basic types: centralized approach and distributed approach. In this section, model for the distributed sensor network is implemented by using the open source software NS2 and the problem of fault node detection is investigated using distributed approach. Distributed approach is based upon ultra-reliable SNs having high computation capacity and large storage. The SNs are connected with each other within a specified transmission range T. Here the connection of one node with other neighbor nodes is based upon disc that formed by transmission range T. All the nodes within the disc are connected with each other and share their sensed data among themselves. Each node compares its own sensed data with the data of its neighbors, which are inside a disk and hence identifies its own fault status within a WSN. Distributed WSNs consist of a large number of SNs which are presented using network simulator NS2. The parameters selected for this simulation are listed in Table I. TABLE I. PARAMETERS USED IN NS2 SIMULATION Number of Sensor Nodes(N) 50 Simulation Area Simulation Time Routing Protocol Transmission Range Traffic Type Packet size 20 x 20 meters 0.02 sec per node UDP 1 meter CBR(Constant Bit Rate) 25 Bytes We have implemented a distributed topology which consist of 50 nodes (N=50) and simulated in network simulator NS2 as shown in Fig. 1. Each SNs are treated as the vertices in a graph G = G (V,E) where V is the number of vertices (nodes) and E is the number of edges between two vertices in the graph G. Each node-n present inside a disc and its neighbor nodes are linked with each other. Each node communicates its sensed data with all other SN present inside the disc and thus identifies its fault status using data of all the neighboring SNs in WSN. In this paper, the statistical distributed fault node detection algorithm to detect the soft faulty nodes in WSN is described. The overall algorithm can be divided into three distinct major stages:- 1. Data Collection stage 2. Analysis stage 3. Decision stage In various stages, every SN Ni does various tasks. In the initial stage, every SN Ni requests all their neighbors by transmitting their own sensed data X(i) at an instance of time. At the same instance of time, every node Ni collects sensed data X(j) from all their neighbor nodes Nj ϵ Neb(i) which are present in its transmission range T. Now in analysis phase, every SN Ni estimates its probable sensed value with the help of all of their neighbor s data. In decision stage, after estimation of probable sensed data, every SN Ni equates its sensed data with the probable sensed data to evaluate its fault status. Based on this fault status, Ni will actively participate in the network operation. The perceptive descriptions of all events that occur during the three various stages of the suggested distributed fault detection algorithm are as follows:- 1) Data Collection Stage: In this stage, each SN Ni, transmits its own sensed data X(i) to all neighbor nodes within its transmission range T. Based on the received data, every SN Ni identifies its neighbor nodes Nj ϵ Neb(i). It is supposed that at the time of installation, every SN Ni deployed in network is good and free from faults. Hence initial fault status of SN IFS(i)=0. 2) Analysis stage: Every SN Ni computes their estimated sensed data PX(i) from the data which is received from their neighbor nodes Nj which are present in its transmission range T. A Z-score test is a statistical approach, in which the dissemination of the test statistics under the null hypothesis can be estimated by a normal distribution. Since it is assumed that the data received by various SNs are independent of each other. Hence if the degree of the each node is high, the z-score test is preferable. The value of mean M(i) of the data received by neighbor node N(j) at SN Ni is calculated by using the formula. M(i) = 1 Neb(i) X(j) Degree(Ni) j=1 (1) Now, to evaluate the value of standard deviation S(i) of the data received by node N(i), the following formulas is used. S(i) = Neb(i) j=1 (X(j) Degree(Ni) 1 µ) 2 (2) Finally, by using z-score test and with the help of values of M(i) and S(i), we can calculate the value of PX(i) as follows. Fig.1. Unit disk model based network topology SE(i) = S Degree(Ni) (3) 262

3 PX(i) = X(i) M SE(i) 3) Decision Stage: In this stage every SN Ni compares its own estimated data PX(i) with the actual sensed data X(i). (4) D(i) = X(i)-PX(i) (5) If difference between the sensed data X(i) and estimated data PX(i) is within the range of 2 to 3 then SN Ni declares itself as a fault free node otherwise it is decided as a faulty SN. FFS(i)={ 0 if 2 D(i) 3 (good) 1 if D(i) < 2 or D(i) > 3 (faulty) Since the algorithm is based on distributed WSN, so all the stages in the given algorithm A are to be executed by the every individual SN Ni of a WSN. The notations used for developing this algorithm are summarized in Table II. Once again the detection accuracy (), fault alarm rate () and positive rate () calculated for different probabilities of faulty nodes. But as the presence of outliers affect the actual mean (M) and standard deviation (S), estimated mean (M) and standard deviation (S) this leads to further investigation. We have analyzed the presence of faulty SN in WSNs by calculating the Z-score. The neighbor coordination algorithms for detecting the faulty node in distributed WSNs can be described as follows: A. Algorithm for detection of y Node Input: SN Position (xi, yi), sensed data X[i]. Output: detection accuracy (), fault alarm rate () and fault positive rate (). 1. FOR each node i = 1 to N DO 2. Generate sensed data X[i] 3. Find all neighbors and keep them in set Neb[i] 4. Set IFS[i] = 0; 5. END FOR 6. Calculate F = N * P 7. FOR j = 1 to F DO 8. random[j] = generate(n) 9. set UIFS[random[j]]=1 10. END FOR 11. Sum[i] = 0; 12. FOR j = 1 to Neb[i] and N[j] = Neb[i] DO 13. Sum[i]=Sum[i] + X[i]; 14. END FOR 15. [i] = Sum[i] / Degree(Ni); 16. CSD[i] = 0; 17. FOR j = 1 to Neb[i] and N[j]=Neb[i] DO 18. CSD[i] = CSD[i] + (X[j] - [i]) 2 ; 19. END FOR 20. SD[i] = sqrt (CSD / (Degree(Ni) - 1)); 21. SE[i] = sqrt (SD[i] / Degree(Ni)); 22. PX[i] = X[i] CRDN[i] / SE[i]; 23. If ( X[i]-PX[i] >= 2) and ( X[i]-PX[i] <= 3) then 24. Sensor node Ni is detected as -Free 25. FFS[i] = 0; 26. Else 27. Sensor node Ni is detected as y 28. FFS[i] = 1; 29. FOR i = 1 to N DO (6) 30. IF UIFS[i] == 1 && FFS[i] == 1 THEN 31. initialize count_ = count_ END IF 33. IF UIFS[i] = = 0 && FFS[i] = = 1 THEN 34. initialize count_ = count_ END IF 36. IF UIFS[i] = = 1 && FFS[i] = = 0 THEN 37. Initialize count_ = count_ END IF 39. END FOR 40. Evaluate = count_ / F 41. Evaluate = count_ / N-F 42. Evaluate = count_ / F First of all, we have used neighbor coordination based distributed algorithm to evaluate the value of, and using mean. Then we have used neighbor coordination based distributed algorithm to evaluate the value of, and using z-score. The list of parameters which are used to develop the neighbor coordination based distributed algorithm for detection of faulty SN in WSNs are given in Table II. TABLE II. PARAMETER USED TODEVELOP THE ALGORITHM Parameter N Ni T X[i] Neb[i] Degree[i] Sum[i] [i] CSD[i] SD[i] PX[i] P F Generate(N) random[i] IFS[i] FFS[i] Count_ Count_ Count_ Description of Parameter Number of sensor nodes Sensor node at location (xi, yi) Transmission range of sensor node Ni Sensed data of sensor node Ni Set of neighbor nodes of sensor node Ni Degree of sensor node Ni Sum of sensed data of all neighbors nodes at sensor node Ni Estimated mean value of all neighbors nodes at sensor node Ni Cumulative standard deviation of sensed data of all neighbors at sensor node Ni Standard deviation of sensed data of all neighbor nodes at sensor node Ni Z score test value of sensor node Ni Probability of fault node Total number of fault node Pseudo random number generation for fault node Array to store Pseudo random number for fault node i Initial fault status of the sensor node Ni Final fault status of the sensor node Ni Counter for data accuracy() Counter for fault alarm rate() Counter for fault positive rate () Detection Accuracy Alarm Rate Positive Rate 263

4 III. EXPERIMENTAL RESULT The performance measures of the proposed neighbor coordination based fault node detection algorithms are evaluated by using network simulation. We have build a distributed sensor network in network simulator tool (NS2) and network is simulated using the proposed algorithm described in the section II to evaluate the detection accuracy (), fault alarm rate () and fault positive rate () over different of fault nodes (p). Where can be defined as the ratio of the number of faulty SNs detected to the total number of faulty SNs, can be defined as the ratio of the number of fault-free nodes detected as faulty to the total number of fault-free node and can be defined as the ratio of the number of faulty SNs diagnosed as fault free to the total number of faulty SNs present in the network. Initially we have analyzed the faulty SNs in a WSN with algorithm-a to evaluate the, and for 1024 nodes with the help of actual sensed data X(i) and standard deviation S(i). Then we have used Z-score with algorithm-a to evaluate the, and with estimated PX(i) and standard deviation S(i). Here the performance is improved as compared to the actual sensed data X(i) and standard deviation S(i). TABLE III. DETECTION ACCURACY () WITH MEAN AND Z-SCORE Table III shows the comparison of using and using, over various values of fault p. With the increase in value of fault p, the value of decreases. When the value of p=0.05, 99.8% of the faulty nodes are accurately detected using where as 99.9% of the faulty nodes are accurately detected using Z-score. Fig.2 shows the graph between with respect to fault p using and. In case of decreases from 99.8% to 87.8% against the increasing values of fault p from 0.05 to 0.5, where as in case Z-score the performance gets improved, as the decreases from 99.9% to 93.4% against the increasing values of fault p from 0.05 to 0.5. The presence of outliers affect the actual sensed data X(i) and standard deviation S(i) from estimated data PX(i) and standard deviation S(i) which leads to further investigation. From the result we can observe that z-score gives better result as compared to mean. Detection Accuracy Probability of fault Fig. 2. Detection accuracy () versus Probability of by and Z- score. Table IV shows a comparison analysis of over various values of fault p using and. With the increase in value of fault p, the increases. In case of the values of increases from 2.8% to 16.7% against the increasing values of p form 0.05 to 0.5. TABLE IV. FAULT ALARM RATE () WITH MEAN AND Z-SCORE. using using Similarly for Z-score test the value of increases from 2% to 13.5% against the increasing values of p form 0.05 to 0.5. The Fig.3 shows the with respect to fault p using and Z-score test. 264

5 Alarm Ratio using using Z-score IV. CONCLUSION In this paper, we have proposed a neighbor coordination based solution for identifying faulty SNs in WSNs. The simulation results show that the proposed fault node detection algorithm is effective in terms of performance measures like, and. Moreover, the proposed fault node detection algorithm does not use any complex operations, which makes it energy efficient. However in this study, the number of faulty SNs is kept fixed during the whole simulation process. Hence, this work will be improved for dealing with varying number of faulty SNs in a network. Also, we will extend and modify the proposed fault node detection algorithm to tolerate transient faults as our further work Probability of Fig. 3. Alarm Rate () versus Probability of using and Z- score. Table V shows another comparison analysis of over various values of p using and. With the increase in value of fault p, the increases. In case of the increases from 0.4% to 9.4% against the increasing values of p form 0.05 to 0.5. TABLE V. FAULT POSITIVE RATE () WITH MEAN AND Z-SCORE Similarly for Z-score test the value increases from 0.1% to 8.5% against the increasing values of p from 0.05 to 0.5. In case of mean is larger as compared to that of in Z-score. The Fig.5 shows the with respect to fault p, using and Z-score test. Positive Ratio using using 0 Probability of Fig. 5. positive rate () versus Probability of using and Z-score. REFERENCES [1] B. R. Badrinath, M. Srivastava, K. Mills, J. Scholtz,and K. Sollins. Special issue on smart spaces and environments. IEEE Personal Communications, Oct [2] S. Lindsey, C. Raghavendra, and K. Sivalingam. Data gathering in sensor networks using the energy delay metric. In International Workshop on Parallel and Distributed Computing: Issues in Wireless Networks and Mobile Computing, San Francisco, USA, Apr [3] Aboelaze M, Aloul F. Current and future trends in sensor networks: A survey. Wireless and Optical Communications Networks, 2005: [4] Koushanfar F, Potkonjak M, Sangiovanni-Vincentell A. tolerance techniques for wireless ad hoc sensor networks. In: Proceedings of IEEE on Sensors : [5] B. Krishnamachari, S. Iyengar, Distributed Bayesian algorithms for fault tolerant event region detection in wireless sensor networks, IEEE Transactions on Computers 53 (3) (2004). [6] F. Koushanfar, M. Potkonjak, A. Sangiovanni-Vincentelli, On-line fault detection of sensor measurements, IEEE Sensors 2 (2003) [7] L.B. Ruiz, I.G. Siqueir a, L.B. Oliveira, H.C. W ong, J.M.S. Nogueira, A.A.F. Liureiro, management in event-driven wireless sensor networks, in: MSWIM 04, [8] M. Ding, D. Chen, K. Xing, X. Cheng, Localized fault-tolerant event boundary detection in sensor networ ks, IEEE Info com (2005) [9] X. Luo, M. Dong, Y. Hu ang, On distributed fault-tolerant detection in wireless sensor networks, IEEE Tr ansactions on Computers 55 (1) (2006) [10] J. Chen, S. Kher, A. Somani, Distributed fault detection of wireless sensor networks, in: Proceedings of 2006 Workshop DIWANS, pp [11] S. Chessa, P. Santi, Comparion-based system-level fault diagnosis in ad hoc networks,20 th Symp. Reliable Dist. Syst., pp ,2011. [12] T. Panigrahi,M. Panda and G.Panda, Tolerant Distributed Estimation in Wireless Sensor Networks,Journal of Network and Computer Applications, vol. 69, 2016, pp [13] M. Panda, P.M. Khilar Distributed self fault diagnosis algorithm for large scale wireless sensor networks using modified three sigma edit test, Ad Hoc Networks, vol. 25, 2015, [14] A Mahapatro,PM Khilar, Diagnosis in Wireless Sensor Networks: A Survey,IEEE communication surveys & tutorials,vol.15,no.4,fourth Quarter 2013, pp [15] R. R. Panda, B.S.Gaudo and T. Panigrahi, Efficient Node Detection Algorithm for Wireless Sensor Networks, in the IEEE International Conference on High Performance,Computing and Application (ICHPCA-2014), Dec [16] T. Panigrahi,B.Mulgrew and B.Majhi, Robust Distributed Linear Parameter Estimation in Wireless Sensor Network, in the IEEE International Conference on Energy, Automation and Signal (ICEAS- 2011), Dec

Scalable Distributed Diagnosis Algorithm for Wireless Sensor Networks

Scalable Distributed Diagnosis Algorithm for Wireless Sensor Networks Scalable Distributed Diagnosis Algorithm for Wireless Sensor Networks Arunanshu Mahapatro and Pabitra Mohan Khilar Department of CSE, National Institute of Technology, Rourkela, India arun227@gmail.com,

More information

New Active Caching Method to Guarantee Desired Communication Reliability in Wireless Sensor Networks

New Active Caching Method to Guarantee Desired Communication Reliability in Wireless Sensor Networks J. Basic. Appl. Sci. Res., 2(5)4880-4885, 2012 2012, TextRoad Publication ISSN 2090-4304 Journal of Basic and Applied Scientific Research www.textroad.com New Active Caching Method to Guarantee Desired

More information

Design and Implementation of detecting the failure of sensor node based on RTT time and RTPs in WSNs

Design and Implementation of detecting the failure of sensor node based on RTT time and RTPs in WSNs Design and Implementation of detecting the failure of sensor node based on RTT time and RTPs in WSNs Girish K 1 and Mrs. Shruthi G 2 1 Department of CSE, PG Student Karnataka, India 2 Department of CSE,

More information

Markov Modeling of Fault-Tolerant Wireless Sensor Networks

Markov Modeling of Fault-Tolerant Wireless Sensor Networks Markov Modeling of Fault-Tolerant Wireless Sensor Networks Arslan Munir and Ann Gordon-Ross Department of Electrical and Computer Engineering University of Florida, Gainesville, Florida, USA e-mail: {amunir@ufl.edu,

More information

International Journal of Innovative Research in Advanced Engineering (IJIRAE) ISSN: Issue 2, Volume 2 (February 2015)

International Journal of Innovative Research in Advanced Engineering (IJIRAE) ISSN: Issue 2, Volume 2 (February 2015) FAULT TOLERANCE IN WIRELESS SENSOR NETWORKS C.Ahila Jerlin #1 Anand Institute of Higher Technology, Department of ME Embedded System Technologies, Kazhipattur, Chennai-603103 N.Rajkamal #2 Anand Institute

More information

A Fault Detection and Recovery Algorithm in Wireless Sensor Networks

A Fault Detection and Recovery Algorithm in Wireless Sensor Networks International Journal of Latest Trends in Computing (E-ISSN: 2045-5364) 1 A Fault Detection and Recovery Algorithm in Wireless Sensor Networks Abolfazl Akbari Department of computer Engineering Islamic

More information

Impact of Node Velocity and Density on Probabilistic Flooding and its Effectiveness in MANET

Impact of Node Velocity and Density on Probabilistic Flooding and its Effectiveness in MANET Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 12, December 2014,

More information

Quadratic Route Factor Estimation Technique for Routing Attack Detection in Wireless Adhoc Networks

Quadratic Route Factor Estimation Technique for Routing Attack Detection in Wireless Adhoc Networks European Journal of Applied Sciences 8 (1): 41-46, 2016 ISSN 2079-2077 IDOSI Publications, 2016 DOI: 10.5829/idosi.ejas.2016.8.1.22852 Quadratic Route Factor Estimation Technique for Routing Attack Detection

More information

International Journal of Advanced Engineering Research and Science (IJAERS) [Vol-1, Issue-2, July 2014] ISSN:

International Journal of Advanced Engineering Research and Science (IJAERS) [Vol-1, Issue-2, July 2014] ISSN: Cluster Based Id Revocation with Vindication Capability for Wireless Network S. Janani Devi* *Assistant Professor, ECE, A.S.L.Pauls College of Engineering and Technology, Tamilnadu, India ABSTRACT: The

More information

A Robust Bloom Filter

A Robust Bloom Filter A Robust Bloom Filter Yoon-Hwa Choi Department of Computer Engineering, Hongik University, Seoul, Korea. Orcid: 0000-0003-4585-2875 Abstract A Bloom filter is a space-efficient randomized data structure

More information

Figure 1. Clustering in MANET.

Figure 1. Clustering in MANET. Volume 6, Issue 12, December 2016 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Performance

More information

SUMMERY, CONCLUSIONS AND FUTURE WORK

SUMMERY, CONCLUSIONS AND FUTURE WORK Chapter - 6 SUMMERY, CONCLUSIONS AND FUTURE WORK The entire Research Work on On-Demand Routing in Multi-Hop Wireless Mobile Ad hoc Networks has been presented in simplified and easy-to-read form in six

More information

Performance Analysis of Mobile Ad Hoc Network in the Presence of Wormhole Attack

Performance Analysis of Mobile Ad Hoc Network in the Presence of Wormhole Attack Performance Analysis of Mobile Ad Hoc Network in the Presence of Wormhole Attack F. Anne Jenefer & D. Vydeki E-mail : annejenefer@gmail.com, vydeki.d@srmeaswari.ac.in Abstract Mobile Ad-Hoc Network (MANET)

More information

Novel Cluster Based Routing Protocol in Wireless Sensor Networks

Novel Cluster Based Routing Protocol in Wireless Sensor Networks ISSN (Online): 1694-0784 ISSN (Print): 1694-0814 32 Novel Cluster Based Routing Protocol in Wireless Sensor Networks Bager Zarei 1, Mohammad Zeynali 2 and Vahid Majid Nezhad 3 1 Department of Computer

More information

Fault-tolerant Event Boundary Detection in Wireless Sensor Networks

Fault-tolerant Event Boundary Detection in Wireless Sensor Networks Fault-tolerant Event Boundary Detection in Wireless Sensor Networks Kui en, Kai Zeng and Wenjing Lou Department of ECE, Worcester Polytechnic Institute, MA 169 {kren, kzeng, wjlou}@wpi.edu Abstract Event

More information

Quadratic Route Factor Estimation Technique for Routing Attack Detection in Wireless Adhoc Networks

Quadratic Route Factor Estimation Technique for Routing Attack Detection in Wireless Adhoc Networks European Journal of Applied Sciences 8 (1): 55-61, 2016 ISSN 2079-2077 IDOSI Publications, 2016 DOI: 10.5829/idosi.ejas.2016.8.1.22863 Quadratic Route Factor Estimation Technique for Routing Attack Detection

More information

Computation of Multiple Node Disjoint Paths

Computation of Multiple Node Disjoint Paths Chapter 5 Computation of Multiple Node Disjoint Paths 5.1 Introduction In recent years, on demand routing protocols have attained more attention in mobile Ad Hoc networks as compared to other routing schemes

More information

The Impact of Clustering on the Average Path Length in Wireless Sensor Networks

The Impact of Clustering on the Average Path Length in Wireless Sensor Networks The Impact of Clustering on the Average Path Length in Wireless Sensor Networks Azrina Abd Aziz Y. Ahmet Şekercioğlu Department of Electrical and Computer Systems Engineering, Monash University, Australia

More information

QoS Routing By Ad-Hoc on Demand Vector Routing Protocol for MANET

QoS Routing By Ad-Hoc on Demand Vector Routing Protocol for MANET 2011 International Conference on Information and Network Technology IPCSIT vol.4 (2011) (2011) IACSIT Press, Singapore QoS Routing By Ad-Hoc on Demand Vector Routing Protocol for MANET Ashwini V. Biradar

More information

Impact of Black Hole and Sink Hole Attacks on Routing Protocols for WSN

Impact of Black Hole and Sink Hole Attacks on Routing Protocols for WSN Impact of Black Hole and Sink Hole Attacks on Routing Protocols for WSN Padmalaya Nayak V. Bhavani B. Lavanya ABSTRACT With the drastic growth of Internet and VLSI design, applications of WSNs are increasing

More information

Chapter 55 Elimination of Black Hole and False Data Injection Attacks in Wireless Sensor Networks

Chapter 55 Elimination of Black Hole and False Data Injection Attacks in Wireless Sensor Networks Chapter 55 Elimination of Black Hole and False Data Injection Attacks in Wireless Sensor Networks R. Tanuja, M. K. Rekha, S. H. Manjula, K. R. Venugopal, S. S. Iyengar and L. M. Patnaik Abstract Wireless

More information

Ms A.Naveena Electronics and Telematics department, GNITS, Hyderabad, India.

Ms A.Naveena Electronics and Telematics department, GNITS, Hyderabad, India. Dynamic Training Intrusion Detection Scheme for Blackhole Attack in MANETs Ms A.Naveena Electronics and Telematics department, GNITS, Hyderabad, India. Dr. K.Rama Linga Reddy Electronics and Telematics

More information

Dynamic Key Ring Update Mechanism for Mobile Wireless Sensor Networks

Dynamic Key Ring Update Mechanism for Mobile Wireless Sensor Networks Dynamic Key Ring Update Mechanism for Mobile Wireless Sensor Networks Merve Şahin Sabancı University Istanbul, Turkey mervesahin@sabanciuniv.edu Abstract Key distribution is an important issue to provide

More information

Analysis of Cluster-Based Energy-Dynamic Routing Protocols in WSN

Analysis of Cluster-Based Energy-Dynamic Routing Protocols in WSN Analysis of Cluster-Based Energy-Dynamic Routing Protocols in WSN Mr. V. Narsing Rao 1, Dr.K.Bhargavi 2 1,2 Asst. Professor in CSE Dept., Sphoorthy Engineering College, Hyderabad Abstract- Wireless Sensor

More information

Multi-metrics based Congestion Control protocol in Wireless Sensor Network

Multi-metrics based Congestion Control protocol in Wireless Sensor Network e-issn 2455 1392 Volume 2 Issue 5, May 2016 pp. 536 543 Scientific Journal Impact Factor : 3.468 http://www.ijcter.com Multi-metrics based Congestion Control protocol in Wireless Sensor Network Sushma

More information

Performance Analysis of AODV Routing Protocol with and without Malicious Attack in Mobile Adhoc Networks

Performance Analysis of AODV Routing Protocol with and without Malicious Attack in Mobile Adhoc Networks , pp.63-70 http://dx.doi.org/10.14257/ijast.2015.82.06 Performance Analysis of AODV Routing Protocol with and without Malicious Attack in Mobile Adhoc Networks Kulbir Kaur Waraich 1 and Barinderpal Singh

More information

A Comparative Analysis of Traffic Flows for AODV and DSDV Protocols in Manet

A Comparative Analysis of Traffic Flows for AODV and DSDV Protocols in Manet A Comparative Analysis of Traffic Flows for and Protocols in Manet Ranichitra.A 1, Radhika.S 2 1 Assistant Professor, 2 M.Phil Scholar, Department of Computer Science, Sri S.R.N.M College, Sattur, India

More information

Routing Protocols in MANETs

Routing Protocols in MANETs Chapter 4 Routing Protocols in MANETs 4.1 Introduction The main aim of any Ad Hoc network routing protocol is to meet the challenges of the dynamically changing topology and establish a correct and an

More information

PERFORMANCE ANALYSIS OF AODV ROUTING PROTOCOL IN MANETS

PERFORMANCE ANALYSIS OF AODV ROUTING PROTOCOL IN MANETS PERFORMANCE ANALYSIS OF AODV ROUTING PROTOCOL IN MANETS AMANDEEP University College of Engineering, Punjabi University Patiala, Punjab, India amandeep8848@gmail.com GURMEET KAUR University College of Engineering,

More information

Dynamic Deferred Acknowledgment Mechanism for Improving the Performance of TCP in Multi-Hop Wireless Networks

Dynamic Deferred Acknowledgment Mechanism for Improving the Performance of TCP in Multi-Hop Wireless Networks Dynamic Deferred Acknowledgment Mechanism for Improving the Performance of TCP in Multi-Hop Wireless Networks Dodda Sunitha Dr.A.Nagaraju Dr. G.Narsimha Assistant Professor of IT Dept. Central University

More information

Fault Tolerance in WSN using Hand-off and Dynamic Power Adjustment

Fault Tolerance in WSN using Hand-off and Dynamic Power Adjustment Chapter 2 Fault Tolerance in WSN using Hand-off and Dynamic Power Adjustment Wireless Sensor Network (WSN) is deployed to monitor physical conditions in various places such as geographical regions, agriculture

More information

Mobile Agent Driven Time Synchronized Energy Efficient WSN

Mobile Agent Driven Time Synchronized Energy Efficient WSN Mobile Agent Driven Time Synchronized Energy Efficient WSN Sharanu 1, Padmapriya Patil 2 1 M.Tech, Department of Electronics and Communication Engineering, Poojya Doddappa Appa College of Engineering,

More information

End-To-End Delay Optimization in Wireless Sensor Network (WSN)

End-To-End Delay Optimization in Wireless Sensor Network (WSN) Shweta K. Kanhere 1, Mahesh Goudar 2, Vijay M. Wadhai 3 1,2 Dept. of Electronics Engineering Maharashtra Academy of Engineering, Alandi (D), Pune, India 3 MITCOE Pune, India E-mail: shweta.kanhere@gmail.com,

More information

A Fault Management Architecture For Wireless Sensor Network

A Fault Management Architecture For Wireless Sensor Network A Fault Management Architecture For Wireless Sensor Network M.Asim, H.Mokhtar, and M.Merabti School of Computing and Mathematical Sciences Liverpool John Moores University M.Asim@2006.ljmu.ac.uk, H.M.Mokhtar@ljmu.ac.uk,

More information

A Neighbor Coverage Based Probabilistic Rebroadcast Reducing Routing Overhead in MANETs

A Neighbor Coverage Based Probabilistic Rebroadcast Reducing Routing Overhead in MANETs A Neighbor Coverage Based Probabilistic Rebroadcast Reducing Routing Overhead in MANETs Ankita G. Rathi #1, Mrs. J. H. Patil #2, Mr. S. A. Hashmi #3 # Computer Science-Information Technology Department,

More information

ROUTING ALGORITHMS Part 2: Data centric and hierarchical protocols

ROUTING ALGORITHMS Part 2: Data centric and hierarchical protocols ROUTING ALGORITHMS Part 2: Data centric and hierarchical protocols 1 Negative Reinforcement Time out Explicitly degrade the path by re-sending interest with lower data rate. Source Gradient New Data Path

More information

Connectivity, Energy and Mobility Driven Clustering Algorithm for Mobile Ad Hoc Networks

Connectivity, Energy and Mobility Driven Clustering Algorithm for Mobile Ad Hoc Networks Connectivity, Energy and Mobility Driven Clustering Algorithm for Mobile Ad Hoc Networks Fatiha Djemili Tolba University of Haute Alsace GRTC Colmar, France fatiha.tolba@uha.fr Damien Magoni University

More information

MALICIOUS NODE DETECTION USING A DUAL THRESHOLD IN WIRELESS SENSOR NETWORKS

MALICIOUS NODE DETECTION USING A DUAL THRESHOLD IN WIRELESS SENSOR NETWORKS MALICIOUS NODE DETECTION USING A DUAL THRESHOLD IN WIRELESS SENSOR NETWORKS Vimala.T PG Student,Master of Computer Applications, Bharathidasan Institute of Technology, Anna University, Tiruchirappalli.

More information

CHAPTER 5 OUTLIER CLEANING AND SENSOR DATA AGGREGATION USING MODIFIED Z-SCORE TECHNIQUE

CHAPTER 5 OUTLIER CLEANING AND SENSOR DATA AGGREGATION USING MODIFIED Z-SCORE TECHNIQUE 72 CHAPTER 5 OUTLIER CLEANING AND SENSOR DATA AGGREGATION USING MODIFIED Z-SCORE TECHNIQUE 5.1 INTRODUCTION The outlier detection is an important preprocessing routine that is required to ensure robustness

More information

Implementation of an Adaptive MAC Protocol in WSN using Network Simulator-2

Implementation of an Adaptive MAC Protocol in WSN using Network Simulator-2 Implementation of an Adaptive MAC Protocol in WSN using Network Simulator-2 1 Suresh, 2 C.B.Vinutha, 3 Dr.M.Z Kurian 1 4 th Sem, M.Tech (Digital Electronics), SSIT, Tumkur 2 Lecturer, Dept.of E&C, SSIT,

More information

Simulation of Intrusion Prevention System

Simulation of Intrusion Prevention System 106 Simulation of Intrusion Prevention System S.S.CHOPADE and Prof. Nitiket N.Mhala DMIETR,Wardha,M.S.,India H.O.D. of Electronics Engg, Bapurao Deshmukh COE, Sevagram,Wardha,M.S.,India ABSTRACT The security

More information

DISTANCE BASED CLUSTER FORMATION FOR ENHANCING THE NETWORK LIFE TIME IN MANETS

DISTANCE BASED CLUSTER FORMATION FOR ENHANCING THE NETWORK LIFE TIME IN MANETS International Research Journal of Engineering and Technology (IRJET) e-issn: 2395-56 DISTANCE BASED CLUSTER FORMATION FOR ENHANCING THE NETWORK LIFE TIME IN MANETS Haftom Gebrehiwet Kidanu 1, Prof. Pallam

More information

Effective Cluster Based Certificate Revocation with Vindication Capability in MANETS Project Report

Effective Cluster Based Certificate Revocation with Vindication Capability in MANETS Project Report Effective Cluster Based Certificate Revocation with Vindication Capability in MANETS Project Report Mandadapu Sravya M.Tech, Department of CSE, G. Narayanamma Institute of Technology and Science. Ch.Mandakini

More information

Significance of DSSD towards Cut Detection in Wireless Sensor Network

Significance of DSSD towards Cut Detection in Wireless Sensor Network Significance of DSSD towards Cut Detection in Wireless Sensor Network 1 G V N LAKSHMI PRIYANKA, 2 TELUGU KAVITHA, 3 B SWATHI and 4 P.SUMAN PRAKASH 1, 2, 3 Department of IT, GPCET, Kurnool. Andhra Pradesh,

More information

CHAPTER 5 ANT-FUZZY META HEURISTIC GENETIC SENSOR NETWORK SYSTEM FOR MULTI - SINK AGGREGATED DATA TRANSMISSION

CHAPTER 5 ANT-FUZZY META HEURISTIC GENETIC SENSOR NETWORK SYSTEM FOR MULTI - SINK AGGREGATED DATA TRANSMISSION CHAPTER 5 ANT-FUZZY META HEURISTIC GENETIC SENSOR NETWORK SYSTEM FOR MULTI - SINK AGGREGATED DATA TRANSMISSION 5.1 INTRODUCTION Generally, deployment of Wireless Sensor Network (WSN) is based on a many

More information

Catching BlackHole Attacks in Wireless Sensor Networks

Catching BlackHole Attacks in Wireless Sensor Networks Catching BlackHole Attacks in Wireless Sensor Networks Ashish M 1 and Mr. Jason Martis 2 1 M. Tech, Department Of ISE, NMAM Institute of Technology, Nitte 2 Asst. Prof, Department Of ISE, NMAM Institute

More information

On Distributed Algorithms for Maximizing the Network Lifetime in Wireless Sensor Networks

On Distributed Algorithms for Maximizing the Network Lifetime in Wireless Sensor Networks On Distributed Algorithms for Maximizing the Network Lifetime in Wireless Sensor Networks Akshaye Dhawan Georgia State University Atlanta, Ga 30303 akshaye@cs.gsu.edu Abstract A key challenge in Wireless

More information

Performance Analysis of AODV using HTTP traffic under Black Hole Attack in MANET

Performance Analysis of AODV using HTTP traffic under Black Hole Attack in MANET Performance Analysis of AODV using HTTP traffic under Black Hole Attack in MANET Ekta Barkhodia 1, Parulpreet Singh 2, Gurleen Kaur Walia 3 Lovely Professional University, Phagwara, India ektab0@gmail.com,

More information

Sleep/Wake Aware Local Monitoring (SLAM)

Sleep/Wake Aware Local Monitoring (SLAM) Sleep/Wake Aware Local Monitoring (SLAM) Issa Khalil, Saurabh Bagchi, Ness Shroff Dependable Computing Systems Lab (DCSL) & Center for Wireless Systems and Applications (CWSA) School of Electrical and

More information

FAULT DETECTION IN WIRELESS SENSOR NETWORKS

FAULT DETECTION IN WIRELESS SENSOR NETWORKS FAULT DETECTION IN WIRELESS SENSOR NETWORKS Manisha 1, Mr. Deepak Nandal 2 1 M.Tech (CSE), GJUS&T, Hisar, India 2 Assistant Professor, GJUS&T, Hisar, India ABSTRACT Wireless Sensor Networks are infrastructures

More information

Fig. 2: Architecture of sensor node

Fig. 2: Architecture of sensor node Volume 4, Issue 11, November 2014 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com To Reduce

More information

Improving the Fault Tolerance of a Computer System with Space-Time Triple Modular Redundancy

Improving the Fault Tolerance of a Computer System with Space-Time Triple Modular Redundancy Improving the Fault Tolerance of a Computer System with Space-Time Triple Modular Redundancy Wei Chen, Rui Gong, Fang Liu, Kui Dai, Zhiying Wang School of Computer, National University of Defense Technology,

More information

CONCLUSIONS AND SCOPE FOR FUTURE WORK

CONCLUSIONS AND SCOPE FOR FUTURE WORK Introduction CONCLUSIONS AND SCOPE FOR FUTURE WORK 7.1 Conclusions... 154 7.2 Scope for Future Work... 157 7 1 Chapter 7 150 Department of Computer Science Conclusion and scope for future work In this

More information

Regression Based Cluster Formation for Enhancement of Lifetime of WSN

Regression Based Cluster Formation for Enhancement of Lifetime of WSN Regression Based Cluster Formation for Enhancement of Lifetime of WSN K. Lakshmi Joshitha Assistant Professor Sri Sai Ram Engineering College Chennai, India lakshmijoshitha@yahoo.com A. Gangasri PG Scholar

More information

Spoofing Detection in Wireless Networks

Spoofing Detection in Wireless Networks RESEARCH ARTICLE OPEN ACCESS Spoofing Detection in Wireless Networks S.Manikandan 1,C.Murugesh 2 1 PG Scholar, Department of CSE, National College of Engineering, India.mkmanikndn86@gmail.com 2 Associate

More information

Sungkyunkwan University, Suwon 16419, Republic of Korea 2 College of Software Sungkyunkwan University Suwon 16419, Republic of Korea

Sungkyunkwan University, Suwon 16419, Republic of Korea 2 College of Software Sungkyunkwan University Suwon 16419, Republic of Korea Kalpa Publications in Computing Volume 2, 2017, Pages 196 204 ICRISET2017. International Conference on Research and Innovations in Science, Engineering &Technology. Selected Papers in Computing Modeling

More information

An Industrial Employee Development Application Protocol Using Wireless Sensor Networks

An Industrial Employee Development Application Protocol Using Wireless Sensor Networks RESEARCH ARTICLE An Industrial Employee Development Application Protocol Using Wireless Sensor Networks 1 N.Roja Ramani, 2 A.Stenila 1,2 Asst.professor, Dept.of.Computer Application, Annai Vailankanni

More information

Anil Saini Ph.D. Research Scholar Department of Comp. Sci. & Applns, India. Keywords AODV, CBR, DSDV, DSR, MANETs, PDF, Pause Time, Speed, Throughput.

Anil Saini Ph.D. Research Scholar Department of Comp. Sci. & Applns, India. Keywords AODV, CBR, DSDV, DSR, MANETs, PDF, Pause Time, Speed, Throughput. Volume 6, Issue 7, July 2016 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Performance Analysis

More information

Project Report: QoS Enhancement for Real-Time Traffic in IEEE WLAN

Project Report: QoS Enhancement for Real-Time Traffic in IEEE WLAN Project Report: QoS Enhancement for Real-Time Traffic in IEEE802.11 WLAN Abstract A key issue in IEEE802.11 WLAN MAC is how to provide QoS support, especially for time-bounded traffic. Although much work

More information

Energy Efficient Clustering Protocol for Wireless Sensor Network

Energy Efficient Clustering Protocol for Wireless Sensor Network Energy Efficient Clustering Protocol for Wireless Sensor Network Shraddha Agrawal #1, Rajeev Pandey #2, Mahesh Motwani #3 # Department of Computer Science and Engineering UIT RGPV, Bhopal, India 1 45shraddha@gmail.com

More information

Energy Aware Node Placement Algorithm for Wireless Sensor Network

Energy Aware Node Placement Algorithm for Wireless Sensor Network Advance in Electronic and Electric Engineering. ISSN 2231-1297, Volume 4, Number 6 (2014), pp. 541-548 Research India Publications http://www.ripublication.com/aeee.htm Energy Aware Node Placement Algorithm

More information

Experimental Evaluation on the Performance of Zigbee Protocol

Experimental Evaluation on the Performance of Zigbee Protocol Experimental Evaluation on the Performance of Zigbee Protocol Mohd Izzuddin Jumali, Aizat Faiz Ramli, Muhyi Yaakob, Hafiz Basarudin, Mohamad Ismail Sulaiman Universiti Kuala Lumpur British Malaysian Institute

More information

Performance Evaluation of CoAP and UDP using NS-2 for Fire Alarm System

Performance Evaluation of CoAP and UDP using NS-2 for Fire Alarm System Indian Journal of Science and Technology, Vol 9(20), DOI: 10.17485/ijst/2016/v9i20/92603, May 2016 ISSN (Print) : 0974-6846 ISSN (Online) : 0974-5645 Performance Evaluation of CoAP and UDP using NS-2 for

More information

Efficient Cluster Based Data Collection Using Mobile Data Collector for Wireless Sensor Network

Efficient Cluster Based Data Collection Using Mobile Data Collector for Wireless Sensor Network ISSN (e): 2250 3005 Volume, 06 Issue, 06 June 2016 International Journal of Computational Engineering Research (IJCER) Efficient Cluster Based Data Collection Using Mobile Data Collector for Wireless Sensor

More information

DATA REPOSITORY FOR SENSOR NETWORK: A DATA MINING APPROACH

DATA REPOSITORY FOR SENSOR NETWORK: A DATA MINING APPROACH International Journal of Database Management Systems ( IJDMS ) Vol6, No4, August 2014 DATA REPOSITORY FOR SENSOR NETWORK: A DATA MINING APPROACH Doreswamy and Srinivas Narasegouda Department of Computer

More information

Exploration of Fault Diagnosis Technology for Air Compressor Based on Internet of Things

Exploration of Fault Diagnosis Technology for Air Compressor Based on Internet of Things Exploration of Fault Diagnosis Technology for Air Compressor Based on Internet of Things Zheng Yue-zhai and Chen Xiao-ying Abstract With the development of network and communication technology, this article

More information

1 Multipath Node-Disjoint Routing with Backup List Based on the AODV Protocol

1 Multipath Node-Disjoint Routing with Backup List Based on the AODV Protocol 1 Multipath Node-Disjoint Routing with Backup List Based on the AODV Protocol Vahid Zangeneh i and Shahriar Mohammadi ii * ABSTRACT In recent years, routing has been the most focused area in ad hoc networks

More information

Cluster-based and cellular approach to fault detection and recovery in wireless sensor network. Branch, Amol, Iran

Cluster-based and cellular approach to fault detection and recovery in wireless sensor network. Branch, Amol, Iran Cluster-based and cellular approach to fault detection and recovery in wireless sensor network Abolfazl Akbari 1 and Neda Beikmahdavi 2 and Bahman Shahamat Naderi 3 1 Department of Computer Engineering,

More information

IJREAT International Journal of Research in Engineering & Advanced Technology, Volume 1, Issue 2, April-May, 2013 ISSN:

IJREAT International Journal of Research in Engineering & Advanced Technology, Volume 1, Issue 2, April-May, 2013 ISSN: Fast Data Collection with Reduced Interference and Increased Life Time in Wireless Sensor Networks Jayachandran.J 1 and Ramalakshmi.R 2 1 M.Tech Network Engineering, Kalasalingam University, Krishnan koil.

More information

Analyzing the Performance of Data Dissemination Algorithms to Application Requirements in Wireless Sensor Network

Analyzing the Performance of Data Dissemination Algorithms to Application Requirements in Wireless Sensor Network Analyzing the Performance of Data Dissemination Algorithms to Application Requirements in Wireless Sensor Network Sukant Kishoro Bisoyi, Mohit Ranjan Panda & Sangeeta Mishra C. V. Raman College of Engineering,

More information

Model and Algorithms for the Density, Coverage and Connectivity Control Problem in Flat WSNs

Model and Algorithms for the Density, Coverage and Connectivity Control Problem in Flat WSNs Model and Algorithms for the Density, Coverage and Connectivity Control Problem in Flat WSNs Flávio V. C. Martins, cruzeiro@dcc.ufmg.br Frederico P. Quintão, fred@dcc.ufmg.br Fabíola G. Nakamura fgnaka@dcc.ufmg.br,fabiola@dcc.ufam.edu.br

More information

MODELING AND SIMULATION OF THRESHOLD ANALYSIS FOR PVFS IN WIRELESS SENSOR NETWORKS

MODELING AND SIMULATION OF THRESHOLD ANALYSIS FOR PVFS IN WIRELESS SENSOR NETWORKS Science MODELING AND SIMULATION OF THRESHOLD ANALYSIS FOR PVFS IN WIRELESS SENSOR NETWORKS Tae Ho Cho *1, Su Man Nam 2 *1 College of Software, Sungkyunkwan University, KOREA 2 College of Information and

More information

A Survey On: Cluster Based Routing Protocols in Wireless Sensor Network

A Survey On: Cluster Based Routing Protocols in Wireless Sensor Network A Survey On: Cluster Based Routing Protocols in Wireless Sensor Network Sunil Kumar Patel 1, Dr. Ravi Kant Kapoor 2 P.G. Scholar, Department of Computer Engineering and Applications, NITTTR, Bhopal, MP,

More information

Ameliorate Threshold Distributed Energy Efficient Clustering Algorithm for Heterogeneous Wireless Sensor Networks

Ameliorate Threshold Distributed Energy Efficient Clustering Algorithm for Heterogeneous Wireless Sensor Networks Vol. 5, No. 5, 214 Ameliorate Threshold Distributed Energy Efficient Clustering Algorithm for Heterogeneous Wireless Sensor Networks MOSTAFA BAGHOURI SAAD CHAKKOR ABDERRAHMANE HAJRAOUI Abstract Ameliorating

More information

Sybil Attack Detection and Prevention Using AODV in VANET

Sybil Attack Detection and Prevention Using AODV in VANET Sybil Attack Detection and Prevention Using in VANET Navneet 1, Rakesh Gill 2 1 M. Tech. Student, GITM, Bilaspur-Tauru Road, Gurgaon (Haryana) navneet_tehlan@yahoo.com 2 Asst. Prof., GITM, Bilaspur-Tauru

More information

Performance Comparison of Mobility Generator C4R and MOVE using Optimized Link State Routing (OLSR)

Performance Comparison of Mobility Generator C4R and MOVE using Optimized Link State Routing (OLSR) IOSR Journal of Engineering (IOSRJEN) ISSN (e): 2250-3021, ISSN (p): 2278-8719 Vol. 06, Issue 11 (November. 2016), V1 PP 25-29 www.iosrjen.org Performance Comparison of Mobility Generator and MOVE using

More information

AN EFFICIENT DESIGN OF VLSI ARCHITECTURE FOR FAULT DETECTION USING ORTHOGONAL LATIN SQUARES (OLS) CODES

AN EFFICIENT DESIGN OF VLSI ARCHITECTURE FOR FAULT DETECTION USING ORTHOGONAL LATIN SQUARES (OLS) CODES AN EFFICIENT DESIGN OF VLSI ARCHITECTURE FOR FAULT DETECTION USING ORTHOGONAL LATIN SQUARES (OLS) CODES S. SRINIVAS KUMAR *, R.BASAVARAJU ** * PG Scholar, Electronics and Communication Engineering, CRIT

More information

TO DESIGN ENERGY EFFICIENT PROTOCOL BY FINDING BEST NEIGHBOUR FOR ZIGBEE PROTOCOL

TO DESIGN ENERGY EFFICIENT PROTOCOL BY FINDING BEST NEIGHBOUR FOR ZIGBEE PROTOCOL TO DESIGN ENERGY EFFICIENT PROTOCOL BY FINDING BEST NEIGHBOUR FOR ZIGBEE PROTOCOL 1 Mr. Sujeet D. Gawande, Prof. Amit M. Sahu 2 1 M.E. Scholar, Department of Computer Science and Engineering, G.H.R.C.E.M.,

More information

CACHING IN WIRELESS SENSOR NETWORKS BASED ON GRIDS

CACHING IN WIRELESS SENSOR NETWORKS BASED ON GRIDS International Journal of Wireless Communications and Networking 3(1), 2011, pp. 7-13 CACHING IN WIRELESS SENSOR NETWORKS BASED ON GRIDS Sudhanshu Pant 1, Naveen Chauhan 2 and Brij Bihari Dubey 3 Department

More information

WSN NETWORK ARCHITECTURES AND PROTOCOL STACK

WSN NETWORK ARCHITECTURES AND PROTOCOL STACK WSN NETWORK ARCHITECTURES AND PROTOCOL STACK Sensing is a technique used to gather information about a physical object or process, including the occurrence of events (i.e., changes in state such as a drop

More information

An Efficient Data-Centric Routing Approach for Wireless Sensor Networks using Edrina

An Efficient Data-Centric Routing Approach for Wireless Sensor Networks using Edrina An Efficient Data-Centric Routing Approach for Wireless Sensor Networks using Edrina Rajasekaran 1, Rashmi 2 1 Asst. Professor, Department of Electronics and Communication, St. Joseph College of Engineering,

More information

Dynamic Minimal Spanning Tree Routing Protocol for Large Wireless Sensor Networks

Dynamic Minimal Spanning Tree Routing Protocol for Large Wireless Sensor Networks Dynamic Minimal Spanning Tree Routing Protocol for Large Wireless Sensor Networks Guangyan Huang 1, Xiaowei Li 1, and Jing He 1 Advanced Test Technology Lab., Institute of Computing Technology, Chinese

More information

Nodes Energy Conserving Algorithms to prevent Partitioning in Wireless Sensor Networks

Nodes Energy Conserving Algorithms to prevent Partitioning in Wireless Sensor Networks IJCSNS International Journal of Computer Science and Network Security, VOL.17 No.9, September 2017 139 Nodes Energy Conserving Algorithms to prevent Partitioning in Wireless Sensor Networks MINA MAHDAVI

More information

Study on Indoor and Outdoor environment for Mobile Ad Hoc Network: Random Way point Mobility Model and Manhattan Mobility Model

Study on Indoor and Outdoor environment for Mobile Ad Hoc Network: Random Way point Mobility Model and Manhattan Mobility Model Study on and Outdoor for Mobile Ad Hoc Network: Random Way point Mobility Model and Manhattan Mobility Model Ibrahim khider,prof.wangfurong.prof.yinweihua,sacko Ibrahim khider, Communication Software and

More information

SECURE AND ROBUST ENERGY-EFFICIENT AND RELIABLE ROUTING FOR MULTI HOP NETWORKS USING WIRELESS SENSOR NETWORKS

SECURE AND ROBUST ENERGY-EFFICIENT AND RELIABLE ROUTING FOR MULTI HOP NETWORKS USING WIRELESS SENSOR NETWORKS SECURE AND ROBUST ENERGY-EFFICIENT AND RELIABLE ROUTING FOR MULTI HOP NETWORKS USING WIRELESS SENSOR NETWORKS Sridevi H K 1, Praveen K B 2 1M.Tech student, Department of Telecommunication Engineering,

More information

Cooperative Watchdog in Wireless Ad-Hoc Networks Norihiro SOTA and Hiroaki HIGAKI *

Cooperative Watchdog in Wireless Ad-Hoc Networks Norihiro SOTA and Hiroaki HIGAKI * 2017 2nd International Conference on Computer, Network Security and Communication Engineering (CNSCE 2017) ISBN: 978-1-60595-439-4 Cooperative Watchdog in Wireless Ad-Hoc Networks Norihiro SOTA and Hiroaki

More information

Secure Enhanced Authenticated Routing Protocol for Mobile Ad Hoc Networks

Secure Enhanced Authenticated Routing Protocol for Mobile Ad Hoc Networks Journal of Computer Science 7 (12): 1813-1818, 2011 ISSN 1549-3636 2011 Science Publications Secure Enhanced Authenticated Routing Protocol for Mobile Ad Hoc Networks 1 M.Rajesh Babu and 2 S.Selvan 1 Department

More information

Application of Adaptive Probing for Fault Diagnosis in Computer Networks 1

Application of Adaptive Probing for Fault Diagnosis in Computer Networks 1 Application of Adaptive Probing for Fault Diagnosis in Computer Networks 1 Maitreya Natu Dept. of Computer and Information Sciences University of Delaware, Newark, DE, USA, 19716 Email: natu@cis.udel.edu

More information

Analysis of Black-Hole Attack in MANET using AODV Routing Protocol

Analysis of Black-Hole Attack in MANET using AODV Routing Protocol Analysis of Black-Hole Attack in MANET using Routing Protocol Ms Neha Choudhary Electronics and Communication Truba College of Engineering, Indore India Dr Sudhir Agrawal Electronics and Communication

More information

High-Performance Multipath Routing Algorithm Using CPEGASIS Protocol in Wireless Sensor Cloud Environment

High-Performance Multipath Routing Algorithm Using CPEGASIS Protocol in Wireless Sensor Cloud Environment Circuits and Systems, 2016, 7, 3246-3252 Published Online August 2016 in SciRes. http://www.scirp.org/journal/cs http://dx.doi.org/10.4236/cs.2016.710276 High-Performance Multipath Routing Algorithm Using

More information

Prediction of traffic flow based on the EMD and wavelet neural network Teng Feng 1,a,Xiaohong Wang 1,b,Yunlai He 1,c

Prediction of traffic flow based on the EMD and wavelet neural network Teng Feng 1,a,Xiaohong Wang 1,b,Yunlai He 1,c 2nd International Conference on Electrical, Computer Engineering and Electronics (ICECEE 215) Prediction of traffic flow based on the EMD and wavelet neural network Teng Feng 1,a,Xiaohong Wang 1,b,Yunlai

More information

Power Aware Metrics for Wireless Sensor Networks

Power Aware Metrics for Wireless Sensor Networks Power Aware Metrics for Wireless Sensor Networks Ayad Salhieh Department of ECE Wayne State University Detroit, MI 48202 ai4874@wayne.edu Loren Schwiebert Department of Computer Science Wayne State University

More information

Blackhole Attack Detection in Wireless Sensor Networks Using Support Vector Machine

Blackhole Attack Detection in Wireless Sensor Networks Using Support Vector Machine International Journal of Wireless Communications, Networking and Mobile Computing 2016; 3(5): 48-52 http://www.aascit.org/journal/wcnmc ISSN: 2381-1137 (Print); ISSN: 2381-1145 (Online) Blackhole Attack

More information

Delay Performance of Multi-hop Wireless Sensor Networks With Mobile Sinks

Delay Performance of Multi-hop Wireless Sensor Networks With Mobile Sinks Delay Performance of Multi-hop Wireless Sensor Networks With Mobile Sinks Aswathy M.V & Sreekantha Kumar V.P CSE Dept, Anna University, KCG College of Technology, Karappakkam,Chennai E-mail : aswathy.mv1@gmail.com,

More information

An Optimized Lifetime Model using Energy Holes Reduction near Sink's Locality of WSN s

An Optimized Lifetime Model using Energy Holes Reduction near Sink's Locality of WSN s 2009 International Conference on Machine Learning and Computing IPCSI vol.3 (2011) (2011) IACSI Press, Singapore An Optimized Lifetime Model using Energy Holes Reduction near Sink's Locality of WSN s Atiq

More information

Survivability Evaluation in Wireless Sensor Network

Survivability Evaluation in Wireless Sensor Network 2011 3rd International Conference on Advanced Management Science IPEDR vol.19 (2011) (2011) IACSIT Press, Singapore Survivability Evaluation in Wireless Sensor Network Vahid Mavaji 1, Bahareh Abbasi 2

More information

A Fault Tolerant Approach for WSN Chain Based Routing Protocols

A Fault Tolerant Approach for WSN Chain Based Routing Protocols International Journal of Computer Networks and Communications Security VOL. 3, NO. 2, FEBRUARY 2015, 27 32 Available online at: www.ijcncs.org E-ISSN 2308-9830 (Online) / ISSN 2410-0595 (Print) A Fault

More information

Using Temporal Correlation for Fault Localization in Dynamically Changing Networks 1

Using Temporal Correlation for Fault Localization in Dynamically Changing Networks 1 Using Temporal Correlation for Fault Localization in Dynamically Changing Networks 1 Maitreya Natu Dept. of Computer and Information Science University of Delaware Newark, DE, USA, 19716 Email: natu@cis.udel.edu

More information

Data Gathering for Wireless Sensor Network using PEGASIS Protocol

Data Gathering for Wireless Sensor Network using PEGASIS Protocol Data Gathering for Wireless Sensor Network using PEGASIS Protocol Kumari Kalpna a, Kanu Gopal b, Navtej katoch c a Deptt. of ECE, College of Engg.& Mgmt.,Kapurthala, b Deptt. of CSE, College of Engg.&

More information

International Journal of Scientific & Engineering Research Volume 8, Issue 5, May ISSN

International Journal of Scientific & Engineering Research Volume 8, Issue 5, May ISSN International Journal of Scientific & Engineering Research Volume 8, Issue 5, May-2017 106 Self-organizing behavior of Wireless Ad Hoc Networks T. Raghu Trivedi, S. Giri Nath Abstract Self-organization

More information