A Survey on Fault Management in Wireless Sensor Networks

Size: px
Start display at page:

Download "A Survey on Fault Management in Wireless Sensor Networks"

Transcription

1 A Survey on Fault Management in Wireless Sensor Networks M.Yu, H.Mokhtar, and M.Merabti School of Computing & Mathematical Science Liverpool John Moores University Abstract Recent increasing growth of interest in Wireless Sensor Networks (WSNs) has provided us a new paradigm to design wireless environmental monitoring applications in the 21 st century. However, the nature of these applications and network operational environment has also put strong impact on sensor network systems to maintain high service quality. One challenge is to design efficient fault management solutions to recover network systems from various unexpected failures. In this paper, we address this challenge by surveying existing fault management approaches in WSNs. We divide fault management process into three phases, such as fault detection, diagnosis and recovery. We classify existing approaches according to these phases. We also summarize the existing management architectures, which are adopted to support fault management in WSNs. Finally, we outline future challenges for fault management in WSNs. I. INTRODUCTION echnologies of miniaturizing the size of low-cost Telectronic appliances have boosted the visions of deploying large-scale and dense sensor nodes to extract useful information from harsh environments. However, such small dimension design also puts strong restrictions on the hardware and software capability of a sensor node, in terms of its processing capability, memory storage, and energy supply. Among them, the limited power supply is one of the most important constraints. Sensor nodes usually carry limited, general irreplaceable battery power resource. They are expected to operate autonomously for periods of time ranging from days to years. For such reasons, faults are likely to occur frequently and unexpectedly in sensor networks compared to traditional networks. Therefore, there is a trade-off between prolonging the network lifetime via conserving the energy of individual nodes, and maintaining the high quality of network services by implementing complex fault management schemes in the network. Moreover, sensor networks are liable to suffer faults due to harsh environmental conditions, such as rain or fire etc. In such cases, faults might also include node misbehaviours, ranging from simple crash faults where a node becomes temporary inactive to faults where the node behaves arbitrarily or maliciously. For all of these reasons, fault management in WSNs needs to be tackled differently and treated with extra cares. The technical core of this paper is to investigate the current state of fault management in WSNs and its future prospects. To achieve this aim, we address this challenge by surveying existing approaches and providing a comprehensive overview of fault management in WSNs. Existing approaches of fault management in are various in forms of architectures [2-4], protocols [5, 6], detection algorithm [7-10] or detection decision fusion algorithm [11-16]. We classify these approaches into three phases, such as fault detection, fault diagnosis and recovery, as an appropriate fault management process. The rest of this paper is organized as follows: in Section II, we survey the existing fault detection approaches in WSNs; Section III discusses fault diagnosis approaches; In Section IV, it examines existing fault recovery approaches; Section V classifies existing management architectures used to support fault management in WSNs. Finally, we outline few potential future challenges of fault management in WSNs. II. FAULT DETECTION Fault detection is the first phase of fault management, where an unexpected failure should be properly identified by the network system. We classify the existing failure detection approaches in WSNs into two types: centralized and distributed approach. A. Centralized Approach Centralized approach is a common solution to identify and localize the cause of failures or suspicious nodes in WSNs. Usually, a geographically or logically centralized sensor node (in terms of base station [5, 17, 18], central controller or manager [4], sink [19]) takes responsibility for monitoring and tracing failed or misbehaviour nodes in the network. Most these approaches consider the central node has unlimited ISBN: PGNet

2 resources (e.g. energy) and is able to execute a wide range of fault management maintenance. They also believe the network lifetime can be extended if complex management work and message transmission can be shifted onto the central node. The central node normally adopts an active detection model to retrieve states of the network performance and individual sensor nodes by periodically injecting requests (or queries) into the network. It analyzes these information to identify and localize the failed or suspicious nodes. More specifically, Sympathy [19] uses a message-flooding approach to pool event data and current states (metrics) from sensor nodes. In order to minimize the number of communication messages nodes must send and conserve node energy, a Sympathy node can selectively transmit important events to the Sympathy sink node. While, Jessica Staddon et al.,[18] seek the solution of appending network topology information (i.e. node neighbour list) into node s routing update messages rather than in a separate approach. Thus, the base station can construct the entire network topology by integrating each piece of network topology information embedded in route update messages. These messages are normally forwarded by the execution of some well-known routing-discovery protocols. Once the base station knows the network topology, the failed nodes can be efficiently traced using a simple divide-and-conquer strategy. Note that this approach assumes each node has a unique identification number and the base station is able to directly transmit messages to any node in the network. Moreover, some common routing protocols (e.g. SPINs[5]) can also detect failed or misbehaving nodes through routing discovery and update. This typically requires the nodes to send additional messages, and it is consequently very expensive. In [17], the base station uses marked packets (containing geographical information of source and destination locations etc) to probe sensors. It relies on nodes response to identify and isolate the suspicious nodes on the routing paths when an excessive packet drops or compromised data has been detected. In addition, the central manager in WinMS [4] provides a centralized approach to prevent the potential failure by comparing the current or historical states of sensor nodes against the overall network information models (i.e. topology map, and energy map). As a summary, the centralized approach is efficient and accurate to identify the network faults in certain ways. However, resource-constrained sensor networks can not always afford to periodically collect all the sensor measurements and states in a centralized manner. A distinctive problem of this approach is that the central node easily becomes a single point of data traffic concentration in the network, as it is responsible for all the fault detection and fault management. This subsequently causes a high volume of message traffic and quick energy depletion in certain regions of the network, especially the nodes closer to the base station. They take extra burdens for forwarding the communication messages from other nodes. This approach will become extremely inefficient and expensive in consideration of a large-scale sensor network. In addition, multi-hops communication of this approach will also increase the response delay from the base station to faults occurred in the network. Therefore, we have to seek a localized and more computationally efficient fault detection model. B. Distributed Approach Distributed approach encourages the concept of local decision-making, which evenly distributes fault management into the network. The goal of it is to allow a node to make certain levels of decision before communicating with the central node. It believes the more decision a sensor can make, the less information needs to be delivered to the central node. In the other word, the control centre should not be informed unless there is really a fault occurred in the network. Examples of such development are: node fault self-detection and self-correction on its hardware physical malfunction (i.e. sensor, battery, RF transceiver) [20, 21], failure detection via neighbour coordination [7-10, 22], utilization of WATCHDOG to detect misbehaving neighbour [6], use of group (or cluster) technology to distribute fault detection into the network [2, 23]. Others address the use of decision fusion centre (i.e. several fusion nodes across the network) to make the final decisions on suspicious nodes in the network [11, 12, 14, 16]. 1).Node Self-detection: S Harte et al., [21] propose a selfdetection model to monitor the malfunction of the physical components of a sensor node via both hardware and software interface. The hardware interface consists of a flexible circuit using accelerometers that acts as a sensing layer around a node to detect the orientation and impact on the node. They adopt several software components (e.g. ADCC, TimerC) from TinyOS operating system to sample sensor node s reading. Self-detection of node failure in [20] is somehow straightforward as the node just observes the binary outputs of its sensors by comparing with the pre-defined fault models. 2).Neighbour Coordination: Failure detection via neighbor coordination is another example of fault management distribution. Nodes coordinate with their neighbors to detect and identify the network faults (i.e. suspicious node or abnormal sensor readings) before consulting with the central node. In most case, the central node is not aware of any failure unless something is believed to be wrong with high confidence via node coordination diagnosis. This design reduces network communication messages, and subsequently conserves node energy. While, existing developments of such design are various due to individual needs of each approach. For example, in a decentralized fault diagnosis system [22], a sensor node can execute a localized diagnosis algorithm in

3 steps to identify the causes of a fault. The diagnostic information is usually derived from the lower communication layers (e.g. the MAC and network layers). In addition, a node can also query diagnostic information from its neighbours (in one-hop communication range). This allows the decentralized diagnostic framework to scale easily to much larger and denser sensor networks if required. Alternatively, suspicious (or failed) nodes can be identified via comparing its sensor readings with neighbors median readings. With this motivation, Min et al., [9] developed a localized algorithm to identify suspicious node whose sensor readings have large difference against the neighbors. Although this algorithm works for large size of sensor networks, the probability of sensor faults needs to be small. If half of the sensor neighbors are faulty and the number of neighbors is even, the algorithm cannot detect the faults as efficient as expected. In addition, this approach also requires each sensor node to be aware of its physical location by equipped with expensive GPS or other GPS-less technology. While, in [10], Jinran et al., improved such kind of approach, which does not require node physical position. This algorithm can still successfully identify suspicious nodes even when half neighbors are faulty. It chooses the GD sensor in the network, and uses its best sensor results to diagnose other sensors status. This information can be further propagated through the entire network to diagnose all other sensors as good or faulty. Chihfan et al., [7, 8] address the accuracy of failure detection via a two-phase neighbour coordination scheme. A sensor node always consults with its neighbours first to verify the diagnosis results before sending out a failure alarm. In this approach, a sensor node uses the first phase to wait for the neighbours to update the information of the suspicious node, and uses the second phase to consult with neighbours in order to reach a more accurate decision. Since neighbours monitor each other, the monitoring effect is propagated across the network. Thus, the central node only needs to monitor a potential very small subset of sensors. This approach requires the network is pre-configured and each sensor should have a unique ID, and the central node knows the existence and ID of each sensor. Similar approach in [6], where a node can listenin on its neighbour using WATCHDOG. It can detect failed or misbehaving neighbours if data packets have not been transmitted properly by the neighbours it is currently routing to. However, this process may be slow, and is error-prone because the constrained sensor nodes cannot be expected to constantly police all their neighbours and consequently may end up routing into a new neighbour that has also failed. 3)Clustering Approach: Clustering [24] has become an emerging technology for building scalable and energybalanced applications for WSNs. Ann T.Tai et al., [2] derive an efficient failure detection solution using a cluster-based communication hierarchy to achieve scalability, completeness, and accuracy simultaneously. They split the entire network into different clusters and subsequently distribute fault management into each individual region as in Fig.1. Intracluster heartbeat diffusion is adopted to identify failed nodes in each cluster. Cluster head detects the suspicious nodes by exchanging heartbeat messages in an active manner with onehop neighbours (in a same radius transmission range). By analyzing the collected heartbeat information, the cluster head finally identifies failed nodes according to a pre-defined failure detection rule. Further, if a failure is detected, the local detected failure information can be propagated to all the clusters. It makes the local failure detection to be aware of the changes of network conditions or the overall objectives. Fig. 1 Intra-Cluster heartbeat diffusion and Inter-Cluster information propagation [2] While, Ruiz et al., [23] adopt an event-driven detection via a manager-agent model supported by a management architecture MANNA [3]. In this approach, agents are executed in the cluster-heads with more resources than common nodes. A manager is located externally to the WSN where it has a global vision of the network and can perform complex management tasks and analysis that would not be possible inside the network. Every node checks its energy level and sends a message to the manager or agent whenever there is a state change. The manager then uses these information to build topology map and network energy model for monitoring and detecting the potential failure of the network in future. To detect node failure, the manager commands the agents to execute the failure detection management service by sending GET operations for retrieving node states. Without hearing from the nodes, the manager will consult the energy map to check whether a node has any residual energy. If so, the manager detects a failure and sends a notification to the observer. The scheme has a drawback of providing a false de bugging diagnostic. For instance, common-odes may be disconnected from its cluster head and so they are not able to receive the GET operation from the manager, or GET and GET-RESPONSE packet may be lost due to noise. These conditions may mislead the manager into making incorrect fault detection. Furthermore, random distribution and limited transmission range capability of common-node and cluster-heads provides no guarantee that

4 every common-node can be connected to a cluster head. In addition, the transmission costs for network state polling has not been considered in this approach. 4) Distributed Detection: The basic idea of Distributed Detection is to have each node make a decision on faults (typically binary data of abnormal sensor reading). This approach is especially energy-efficient and ideal for datacentric sensor applications. However, there remain various research challenges in order to achieve a better balance between fault detection accuracy and the energy usage of the network. Usually, the efficiency of such failure detection schemes is counted in terms of node communication costs, precision, detection accuracy and the number of faulty sensor nodes tolerable in the network. One of the techniques suggested is fusion sensor coordination. In Clouqueur s work [15], fusion sensors (in terms of manager nodes) coordinate with each other to guarantee that they obtain the same global information about the network before making a decision, as faulty nodes may send them inconsistent information. In addition, Wang et al. [16] also consider a fault-tolerant solution to reduce the overall computation time and memory requirements at the fusion sensors. This approach adopts cluster technology for data aggregation and lessening of redundant data. In [15], Thomas et al., seek efficient algorithms for collaborative failure target detection that are efficient in terms of communication cost, precision, accuracy, and number of faulty sensors tolerable in the network. Fusion sensors (in terms of manager nodes) coordinate with each others in order to guarantee that all manager nodes obtain the same global information of the network, as faulty nodes may send inconsistent information to different manager nodes. While, Tsang-Yi et al., [16] look into the design of a fault-tolerant fusion rule for wireless sensor networks. Its classification approach improved fault-tolerant capability in the network, but also reduced the overall computation time and memory requirements at the fusion sensors. In consideration of largescale sensor networks, this approach also adopts the cluster technology to aggregate nodes into several groups, which reduce the amount of power consumed on the long distance data transmission towards the base station. Each node makes a local decision according to the off-line optimized local decision rule. Such local decision rule is based on the given fault-tolerant fusion rule in a particular cluster. The final decision is made at the cluster head by employing the faulttolerant fusion rule. III. FAULT DIAGNOSIS Fault diagnosis is a stage that the causes of detected fault can be properly identified and distinguished from the other irrelevant or spurious alarms. The accuracy and correctness of detected fault have already been partly reviewed and achieved in fault detection phase as in [2, 8, 12, 15]. However, there is still no comprehensive model or description of faults in sensor networks to support the network system for accurate fault diagnosis. Most existing approaches address the fault models only on the individual node level (including its hardware components malfunction). In particular, both [10, 20] assume the system software (including sensor application software) are already fault tolerant. They focus on hardware level faults of a sensor node, especially on sensor and actuator which are most prone to malfunctioning. Farinaz et al., [20] adopt two fault models. The first one is related to sensors that produce binary outputs. The second fault model is related to the sensors with continuous (analog) or multilevel digital outputs. In [15], Thomas et al., only consider faulty nodes are due to harsh environmental conditions. In their work, faulty nodes are assumed to send inconsistent and arbitary values to other nodes during information sharing phase. While, Min Ding et al., [9] model the event (or abnormal behaviour of a sensor node) by real numbers such as sensor readings instead of 0/1 decision model. As a result, this algorithm is generic enough as long as the thresholds and real number of events can be specified by fault tolerance requirements from various sensor applications. Note that, apart from fault tolerance models for hardware components (e.g. sensor, actuator) or abnormal behaviours (i.e. arbitrary sensor readings) of a node, there is still a need of the development of fault models for sensor networks, which are various due to their types, environment, and also at the network and distributed system level. IV. FAULT RECOVERY Ideally, the failure recovery phase is the stage at which the sensor network is restructured or reconfigured, in such a way that failures or faulty nodes do not impact further on network performance. Most existing approaches in WSNs isolate failed (or misbehaving) nodes directly from the network communication layer (e.g. the routing layer). For example, in the technique of Marti et al. [6], after the faulty neighbour is detected, a node chooses a new neighbour to route to. Staddon et al. [18] proposed two approaches of resuming the network routing paths from the silent nodes (i.e. failed nodes), which are detected in each network routing update epoch. Instead of taking passive recovery actions as mentioned before, the proactive action is also considered as a novel approach to prevent the potential faults in the network. As from the approach of WinMS [4], the central manager detects the network region with weak health (e.g. low battery power) by comparing the current network state (including individual nodes) with a historical network information model (e.g. an energy map or topology map). It takes proactive action by instructing nodes in that area to send data less frequently for node s energy conservation. Koushanfar et al. [20] suggested a heterogeneous back-up scheme for tolerating and healing the

5 hardware malfunctions of a sensor node. They believe a single type of hardware resource can back up different types of resources. The key idea is to adapt application algorithms and/or operating system to match the available hardware and the applications needs. Their current approach focuses on five primary types of resource: computing, storage, communication, sensing and actuating, which can replace each other via suitable changes in system and application software. Although this solution is not directly relevant to fault recovery in respect of the network system management, it still provides us with a useful vision of a future design to reconfigure or update the management functionality of a node when its management responsibility has changed due to fault occurred in the network. Currently, one of the obvious ways to update the management functionality of a node is the use of mobile code technology. V. FAULT MANAGEMENT ARCHITECTURE Efficient architecture is usually on-demand to support the execution of management activities. Generally, these architectures can be classified into centralized, distributed and hierarchical models. --Centralized model, is designed ideally for the centralized fault detection approaches. A central controller is usually responsible for fault maintenance of the overall network. In order to construct the global view of the network, central controller keeps updating nodes states by message exchange. The central controller aggregates these data into information models, in terms of metrics[19], topology model [18], topology and energy map [4], WSN models [23], and cluster topology model [2]. The central node identifies any faulty or suspicious nodes by comparing the current node states against those historical information models. It is seen to be accurate solution to identify fault. However, this centralized architecture will become less efficient and more energy-expensive in consideration of large-scale sensor networks. The message flooding of such approach may greatly consume node energy because of frequent in-network message exchanges. --Distributed model, splits the entire network into several sub-regions, and distributes fault management tasks evenly into individual regions. Each region employs a central manager. Manager is responsible for monitoring and detecting failure in its region. It is also able to directly communicate with other managers in a coordination fashion for fault detection. As a result, the central controller of the overall network only needs to monitor a very small number of sensors in the network. This design conserves node energy by lessening in-network communication messages, and also enhances the system response time towards events occurred in the network. Many existing approaches have adopted Clustering to group nodes into different regions. Clustering allows sensors to efficiently coordinate their local interactions in order to achieve global goals. In particular, localized clustering [16] can contribute to more scalable behaviours as number of nodes increase, improved robustness, and more efficient resource utilization for many distributed sensor coordination tasks. As mentioned in Section 3, cluster-based failure detection [2] supports the cluster head (CH) to efficiently identify suspicious nodes within a small region of the network by exchanging heartbeat messages. In addition, the gateway node, which is a one-hop neighbour of the CHs of two different clusters, provides the communication bridge for two CHs to propagate the fault report across the network. With the high probability, multiple gateway candidates will be available for robust cluster connectivity. In MANNA [25], Ruiz et al., also propose a simple network management protocol called MannNMP to support sub-network (cluster) managers to exchange management information. This protocol is designed to considers the specific characteristics of WSNs. Fig. 2. Hierarchical architecture of mobile agent-based policy management [1] --Hierarchical model, it is a hybrid between the centralized and distributed approach. It uses intermediate managers to distribute manager functions. However, these intermediate managers do not directly communicate with each other. Each manager is responsible to manage nodes in its sub-network and report to its high-level central manager. In a three-layered hierarchical sensor network structure [13], cluster is adopted to reduce the number of sensor nodes monitoring the events occurred in the network. They believe only a tiny fraction of the sensors in the network can accurately detect the target events; while most sensors measurements (which are far away from the target) are just pure noises. Sensors only send data of detected events to their corresponding cluster heads instead of transmitting to a far-away central fusion centre. The cluster head will make a decision about the fault events occurred within that sub-region. The decisions from cluster heads will be further transmitted to the fusion centre to inform it if there is a target or event in specific sub-regions. In order to accomplish fault management objectives in a reliable and energy-efficient way, Ying et al., [1] propose a hierarchical mobile agent-based policy management architecture (as in Fig.2) for sensor networks. In which, Policy Manager (PM) at the highest level, Local Policy Agent (LPA) which manages a sensor node, Cluster Policy Agent (CPA) as an intermediate

6 component between PM and LPA. The management commands are always propagated from the PM to CPAs to LPAs. VI. CONCLUSION Wireless sensor network has gradually emerged as a cutting-age technology to develop new wireless applications for pervasive computing in the 21 st centaury. One of challenges to success this vision is robust fault management. In this paper, we provided a comprehensive overview of fault management in WSNs, and surveyed existing approaches. We classified them in three phases, such as fault detection, diagnosis and recovery. As we have seen, the fundamental requirement of self-managed WSN solutions is that of providing an efficient management architecture. However, there is a trade-off between the complexity of architecture design for fault management in WSNs and the resourceconsumption of sensor networks. More specifically, reconfiguration of fault management functionality for a sensor node is one main challenge when node management responsibilities change. So far, mobile code technology has been proposed as an efficient scheme. It selectively chooses and updates the parts of code that are needed to support adaptation and reconfiguration of node functionality. In order to achieve this, sensor nodes in the network have to distribute and forward the on-demand mobile code to the destination nodes. These actions may consume limited resource of sensor nodes, such as battery energy. Thus, there is still a need to design an alternate solution to energy-efficiently support the functionality reconfiguration of sensor nodes. Moreover, selfmanageable WSNs are also required to have a certain wisdom, which clearly identifies various faults in the network. In order to distinguish between different faults in the network and subsequently take the appropriate actions, the development of theoretical and realistic fault models for WSNs becomes another key technique. REFERENCES [1] Z.Ying, X.Debao. Mobile Agent-based Policy Management for Wireless Sensor Networks. in WCNM [2] Ann T. Tai, Kam S. Tso, William H. Sanders. Cluster-Based Failure Detection Service for Large-Scale Ad Hoc Wireless Network Applications in Dependable Systems and Networks DSN ' [3] Linnyer Beatrys Ruiz, Jose Marcos S. Nogueira, Antonio A.F. Loureiro, MANNA: A Management Architecture for Wireless Sensor Networks. IEEE Communications Magazine, (2): p [4] Winnie Louis Lee, Amitava Datta, Rachel Cardell-Oliver, WinMS: Wireless Sensor Network-Management System, An Adaptive Policy- Based Management for Wireless Sensor Networks. 2006, UWA, australia. [5] A.Perrig, R.Szewczyk, V.Wen, D.Culler, J.D.Tygar. SPINS: Security protocols for sensor networks. in ACM MobiCom' Rome, Italy: ACM Press. [6] Sergio Marti, T.J.Giuli, Kevin Lai, Mary Baker. Mitigating Routing Misbehavior in Mobile Ad Hoc Networks. in 6th International Conference on Mobile Computing and Networking Boston, Massachusetts, USA: ACM. [7] Chihfan Hsin, Mingyan Liu. A Distributed Monitoring Mechanism for Wireless Sensor Networks. in 3rd workshopo on Wireless Security. 2002: ACM Press. [8] Chihfan Hsin, Mingyan Liu, Self-monitoring of Wireless Sensor Networks. Computer Communications, : p [9] Min Ding, Dechang Chen, Kai Xing, Xiuzhen Cheng. Localized Fault- Tolerant Event Boundary Detection in Sensor Networks. in INFOCOM [10] Jinran Chen, Shubha Kher, Arun Somani. Distributed Fault Detection of Wireless Sensor Networks. in DIWANS' Los Angeles, USA: ACM Pres. [11] XuanwenLuo, Ming Dong, Yinlun Huang, Optimal Fault-Tolerance Event Detection in Wireless Sensor Networks. [12] Xuanwen Luo, Ming Dong, Yinlun Huang, On Distributed Fault- Tolerant Detection in Wireless Sensor Networks. IEEE Transactions on Computers, [13] Ruixin Niu, Pramod K.Varshney, Distributed Detection and Fusion in a Large Wireless Sensor Network of Random Size. Eurasip Journal on Wireless Communications and Networking, : p [14] Pramod K.Varshney Ruixin Niu, Dale Klamer Michael Moore. Decision Fusion in a Wireless Sensor Network with a Large Number of Sensors. in IF Stockholm, Sweden. [15] Thomas Clouqueur, Kewalk, Saluja, Parameswaran Ramanathan, Fault Tolerance in Collaborative Sensor Networks for Target Detection. IEEE Transactions on Computers, (3): p [16] Tsang-Yi Wang, Yunghsiang S.Han, Pramod K.Varshney, Po-Ning Chen, Distributed Fault-Tolerant Classification in Wireless Sensor Networks. IEEE Journal on Selected Areas in Communications, (4): p [17] Sapon Tanachaiwiwat, Pinalkumar Dave, Rohan Bhindwale, Ahmed Helmy, Secure Locations: routing on trust and isolating compromised sensors in location-aware sensor networks. [18] 18. Jessica Staddon, Dirk Balfanz, Glenn Durfee. Efficient Tracing of Failed Nodes in Sensor Networks. in First ACM International Workshop on Wireless Sensor Networks and Applications Altanta, GA, USA: ACM. [19] NIthya Ramanathan, Kevin Chang, Rahul Kapur, Lewis Girod, Eddie Kohler, Deborah Estrin. Sympathy for the Sensor Network Debugger. in 3rd Embedded networked sensor systems San Diego, USA: ACM Press. [20] Farinaz koushanfar, Miodrag Potkonjak, Alberto Sangiovanni- Vincentelli. Fault Tolerance Techniques for Wireless Ad Hoc Sensor Networks [21] S Harte, A Rahman, K M Razeeb. Fault Tolerance In Sensor Networks using Self-Diagnosing Sensor Nodes. in IE : IEEE. [22] Anmol Sheth, Carl Hartung, Richard Han. A Decentralized Fault Diagnosis System for Wireless Sensor Networks. in 2nd Mobile Ad Hoc and Sensor Systems Washington, USA. [23] Linnyer Beatrys Ruiz, Isabela G.Siqueira, Leondardon B. e Oliveria, Hao Chi Wong, Jose Marcos S. Nogueira, Antonio A.F. Loureiro. Fault management in event-driven wireless sensor networks. in International Workshop on Modeling Analysis and Simulation of Wireless and Mobile Systems Venice, Italy: ACM Press. [24] Deborah Estrin, Ramesh Govindan, John Heidemann, Satish Kumar. Next Century Challenges: Scalable Coordination in Sensor Networks. in ACM/IEEE International Conference on Mobile Computing and networking [25] Linnyer Beatrys Ruiz, Isabela G.Siqueira, Leondardon B. e Oliveria, Hao Chi Wong, Jose Marcos S. Nogueira, Antonio A.F. Loureiro, On the Design of a Self-Managed Wireless Sensor Network. IEEE Communications Magazine, 2005: p

A Fault Management Architecture For Wireless Sensor Network

A Fault Management Architecture For Wireless Sensor Network A Fault Management Architecture For Wireless Sensor Network M.Asim, H.Mokhtar, and M.Merabti School of Computing and Mathematical Sciences Liverpool John Moores University M.Asim@2006.ljmu.ac.uk, H.M.Mokhtar@ljmu.ac.uk,

More information

in Wireless Sensor Networks

in Wireless Sensor Networks i Fault Discrimination in Wireless Sensor Networks Nishikanta Sahu Anurag Das Department of Computer Science and Engineering National Institute of Technology Rourkela Rourkela-769 008, Odisha, India Fault

More information

Analysis of Cluster-Based Energy-Dynamic Routing Protocols in WSN

Analysis of Cluster-Based Energy-Dynamic Routing Protocols in WSN Analysis of Cluster-Based Energy-Dynamic Routing Protocols in WSN Mr. V. Narsing Rao 1, Dr.K.Bhargavi 2 1,2 Asst. Professor in CSE Dept., Sphoorthy Engineering College, Hyderabad Abstract- Wireless Sensor

More information

WSN Routing Protocols

WSN Routing Protocols WSN Routing Protocols 1 Routing Challenges and Design Issues in WSNs 2 Overview The design of routing protocols in WSNs is influenced by many challenging factors. These factors must be overcome before

More information

Fault Tolerant, Energy Saving Method for Reliable Information Propagation in Sensor Network

Fault Tolerant, Energy Saving Method for Reliable Information Propagation in Sensor Network Fault Tolerant, Energy Saving Method for Reliable Information Propagation in Sensor Network P.S Patheja, Akhilesh Waoo & Parul Shrivastava Dept.of Computer Science and Engineering, B.I.S.T, Anand Nagar,

More information

FAULT MANAGEMENT IN WIRELESS SENSOR NETWORKS

FAULT MANAGEMENT IN WIRELESS SENSOR NETWORKS FAULT MANAGEMENT IN WIRELESS SENSOR NETWORKS Muhammad Zahid Khan M.Zahid-Khan@2008.ljmu.ac.uk School of Computing & Mathematical Sciences Liverpool John Moores University. Liverpool, L3 3AF, United Kingdom

More information

Lecture 8 Wireless Sensor Networks: Overview

Lecture 8 Wireless Sensor Networks: Overview Lecture 8 Wireless Sensor Networks: Overview Reading: Wireless Sensor Networks, in Ad Hoc Wireless Networks: Architectures and Protocols, Chapter 12, sections 12.1-12.2. I. Akyildiz, W. Su, Y. Sankarasubramaniam

More information

ALL ABOUT DATA AGGREGATION IN WIRELESS SENSOR NETWORKS

ALL ABOUT DATA AGGREGATION IN WIRELESS SENSOR NETWORKS e-issn 2455 1392 Volume 1 Issue 1, November 2015 pp. 1-7 http://www.ijcter.com ALL ABOUT DATA AGGREGATION IN WIRELESS SENSOR NETWORKS Komal Shah 1, Heena Sheth 2 1,2 M. S. University, Baroda Abstract--

More information

WSNMP: A Network Management Protocol for Wireless Sensor Networks*

WSNMP: A Network Management Protocol for Wireless Sensor Networks* WSNMP: A Network Management Protocol for Wireless Sensor Networks* Muhammad Mahbub Alam, Md. Mamun-Or-Rashid and Choong Seon Hong Department of Computer Engineering, Kyung Hee University 1 Seocheon, Giheung,

More information

A Review of Fault Detection Techniques for Wireless Sensor Networks Er. Saurabh, Dr. Rinkle Rani Aggarwal

A Review of Fault Detection Techniques for Wireless Sensor Networks Er. Saurabh, Dr. Rinkle Rani Aggarwal www.ijcsi.org 127 A Review of Fault Detection Techniques for Wireless Sensor Networks Er. Saurabh, Dr. Rinkle Rani Aggarwal Department of Computer Science & Engineering, Thapar University, Patiala. ABSTRACT

More information

A Fault Detection and Recovery Algorithm in Wireless Sensor Networks

A Fault Detection and Recovery Algorithm in Wireless Sensor Networks International Journal of Latest Trends in Computing (E-ISSN: 2045-5364) 1 A Fault Detection and Recovery Algorithm in Wireless Sensor Networks Abolfazl Akbari Department of computer Engineering Islamic

More information

CROSS LAYER PROTOCOL (APTEEN) USING WSN FOR REAL TIME APPLICATION

CROSS LAYER PROTOCOL (APTEEN) USING WSN FOR REAL TIME APPLICATION CROSS LAYER PROTOCOL (APTEEN) USING WSN FOR REAL TIME APPLICATION V. A. Dahifale 1, N. Y. Siddiqui 2 PG Student, College of Engineering Kopargaon, Maharashtra, India 1 Assistant Professor, College of Engineering

More information

Incorporating Fault Tolerance in LEACH Protocol for Wireless Sensor Networks

Incorporating Fault Tolerance in LEACH Protocol for Wireless Sensor Networks Incorporating Fault Tolerance in Protocol for Wireless Sensor Networks Rudranath Mitra 1, Anurupa Biswas 2 Department of Information Technology Heritage Institute of Technology Anandapur,Kolkata-700107.INDIA.

More information

Routing protocols in WSN

Routing protocols in WSN Routing protocols in WSN 1.1 WSN Routing Scheme Data collected by sensor nodes in a WSN is typically propagated toward a base station (gateway) that links the WSN with other networks where the data can

More information

ROUTING ALGORITHMS Part 1: Data centric and hierarchical protocols

ROUTING ALGORITHMS Part 1: Data centric and hierarchical protocols ROUTING ALGORITHMS Part 1: Data centric and hierarchical protocols 1 Why can t we use conventional routing algorithms here?? A sensor node does not have an identity (address) Content based and data centric

More information

A Survey On: Cluster Based Routing Protocols in Wireless Sensor Network

A Survey On: Cluster Based Routing Protocols in Wireless Sensor Network A Survey On: Cluster Based Routing Protocols in Wireless Sensor Network Sunil Kumar Patel 1, Dr. Ravi Kant Kapoor 2 P.G. Scholar, Department of Computer Engineering and Applications, NITTTR, Bhopal, MP,

More information

CSMA based Medium Access Control for Wireless Sensor Network

CSMA based Medium Access Control for Wireless Sensor Network CSMA based Medium Access Control for Wireless Sensor Network H. Hoang, Halmstad University Abstract Wireless sensor networks bring many challenges on implementation of Medium Access Control protocols because

More information

International Journal of Innovative Research in Advanced Engineering (IJIRAE) ISSN: Issue 2, Volume 2 (February 2015)

International Journal of Innovative Research in Advanced Engineering (IJIRAE) ISSN: Issue 2, Volume 2 (February 2015) FAULT TOLERANCE IN WIRELESS SENSOR NETWORKS C.Ahila Jerlin #1 Anand Institute of Higher Technology, Department of ME Embedded System Technologies, Kazhipattur, Chennai-603103 N.Rajkamal #2 Anand Institute

More information

A Novel Hierarchical Routing Protocol for Wireless Sensor Networks

A Novel Hierarchical Routing Protocol for Wireless Sensor Networks A Novel Hierarchical Routing Protocol for Wireless Sensor Networks TrongThuaHuynh 1 and Choong Seon Hong 2 Department of Computer Science, Kyung Hee University, 1 Seocheon, Giheung, Yongin, Gyeonggi 449-701

More information

Novel Cluster Based Routing Protocol in Wireless Sensor Networks

Novel Cluster Based Routing Protocol in Wireless Sensor Networks ISSN (Online): 1694-0784 ISSN (Print): 1694-0814 32 Novel Cluster Based Routing Protocol in Wireless Sensor Networks Bager Zarei 1, Mohammad Zeynali 2 and Vahid Majid Nezhad 3 1 Department of Computer

More information

Comparison of TDMA based Routing Protocols for Wireless Sensor Networks-A Survey

Comparison of TDMA based Routing Protocols for Wireless Sensor Networks-A Survey Comparison of TDMA based Routing Protocols for Wireless Sensor Networks-A Survey S. Rajesh, Dr. A.N. Jayanthi, J.Mala, K.Senthamarai Sri Ramakrishna Institute of Technology, Coimbatore ABSTRACT One of

More information

International Journal of Scientific & Engineering Research Volume 8, Issue 5, May ISSN

International Journal of Scientific & Engineering Research Volume 8, Issue 5, May ISSN International Journal of Scientific & Engineering Research Volume 8, Issue 5, May-2017 106 Self-organizing behavior of Wireless Ad Hoc Networks T. Raghu Trivedi, S. Giri Nath Abstract Self-organization

More information

Fig. 2: Architecture of sensor node

Fig. 2: Architecture of sensor node Volume 4, Issue 11, November 2014 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com To Reduce

More information

Wireless Sensor Networks: Clustering, Routing, Localization, Time Synchronization

Wireless Sensor Networks: Clustering, Routing, Localization, Time Synchronization Wireless Sensor Networks: Clustering, Routing, Localization, Time Synchronization Maurizio Bocca, M.Sc. Control Engineering Research Group Automation and Systems Technology Department maurizio.bocca@tkk.fi

More information

Time Synchronization in Wireless Sensor Networks: CCTS

Time Synchronization in Wireless Sensor Networks: CCTS Time Synchronization in Wireless Sensor Networks: CCTS 1 Nerin Thomas, 2 Smita C Thomas 1, 2 M.G University, Mount Zion College of Engineering, Pathanamthitta, India Abstract: A time synchronization algorithm

More information

Location Based Energy-Efficient Reliable Routing Protocol for Wireless Sensor Networks

Location Based Energy-Efficient Reliable Routing Protocol for Wireless Sensor Networks Location Based Energy-Efficient Reliable Routing Protocol for Wireless Sensor Networks RAFE ALASEM 1, AHMED REDA 2 AND MAHMUD MANSOUR 3 (1) Computer Science Department Imam Muhammad ibn Saud Islamic University

More information

Mobility Control for Complete Coverage in Wireless Sensor Networks

Mobility Control for Complete Coverage in Wireless Sensor Networks Mobility Control for Complete Coverage in Wireless Sensor Networks Zhen Jiang Computer Sci. Dept. West Chester University West Chester, PA 9383, USA zjiang@wcupa.edu Jie Wu Computer Sci. & Eng. Dept. Florida

More information

HIERARCHICAL ROUTING PROTOCOLS IN WIRELESS SENSOR NETWORK

HIERARCHICAL ROUTING PROTOCOLS IN WIRELESS SENSOR NETWORK International Journal of Information Technology and Knowledge Management January June 2009, Volume 2, No. 1, pp. 97-101 HIERARCHICAL ROUTING PROTOCOLS IN WIRELESS SENSOR NETWORK Dinesh Anand * & Sanjay

More information

Study on Wireless Sensor Networks Challenges and Routing Protocols

Study on Wireless Sensor Networks Challenges and Routing Protocols International Research Journal of Applied and Basic Sciences 2013 Available online at www.irjabs.com ISSN 2251-838X / Vol, 5 (7): 824-828 Science Explorer Publications Study on Wireless Sensor Networks

More information

A Distributed Cross-Layer Compromise Detection Mechanism for Wireless Sensor Networks

A Distributed Cross-Layer Compromise Detection Mechanism for Wireless Sensor Networks Journal of Network Intelligence c 2017 ISSN 2414-8105(Online) Taiwan Ubiquitous Information Volume 2, Number 1, February 2017 A Distributed Cross-Layer Compromise Detection Mechanism for Wireless Sensor

More information

FAULT DETECTION IN WIRELESS SENSOR NETWORKS

FAULT DETECTION IN WIRELESS SENSOR NETWORKS FAULT DETECTION IN WIRELESS SENSOR NETWORKS Manisha 1, Mr. Deepak Nandal 2 1 M.Tech (CSE), GJUS&T, Hisar, India 2 Assistant Professor, GJUS&T, Hisar, India ABSTRACT Wireless Sensor Networks are infrastructures

More information

RWPS: A Low Computation Routing Algorithm for Sensor Networks

RWPS: A Low Computation Routing Algorithm for Sensor Networks RWPS: A Low Computation Routing Algorithm for Sensor Networks Pierpaolo Bergamo, Daniela Maniezzo, Gianluca Mazzini Engineering Dept., University of Ferrara, Italy Mario Gerla Computer Science Dept., UCLA,

More information

An Industrial Employee Development Application Protocol Using Wireless Sensor Networks

An Industrial Employee Development Application Protocol Using Wireless Sensor Networks RESEARCH ARTICLE An Industrial Employee Development Application Protocol Using Wireless Sensor Networks 1 N.Roja Ramani, 2 A.Stenila 1,2 Asst.professor, Dept.of.Computer Application, Annai Vailankanni

More information

Rumor Routing Algorithm

Rumor Routing Algorithm Aleksi.Ahtiainen@hut.fi T-79.194 Seminar on Theoretical Computer Science Feb 9 2005 Contents Introduction The Algorithm Research Results Future Work Criticism Conclusions Introduction is described in paper:

More information

Energy-Efficient Communication Protocol for Wireless Micro-sensor Networks

Energy-Efficient Communication Protocol for Wireless Micro-sensor Networks Energy-Efficient Communication Protocol for Wireless Micro-sensor Networks Paper by: Wendi Rabiner Heinzelman, Anantha Chandrakasan, and Hari Balakrishnan Outline Brief Introduction on Wireless Sensor

More information

ENERGY-EFFICIENT TRUST SYSTEM THROUGH WATCHDOG OPTIMIZATION

ENERGY-EFFICIENT TRUST SYSTEM THROUGH WATCHDOG OPTIMIZATION International Journal of Power Control and Computation(IJPCSC) Vol 8. No.1 2016 Pp.44-50 gopalax Journals, Singapore available at : www.ijcns.com ISSN: 0976-268X ENERGY-EFFICIENT TRUST SYSTEM THROUGH WATCHDOG

More information

Catching BlackHole Attacks in Wireless Sensor Networks

Catching BlackHole Attacks in Wireless Sensor Networks Catching BlackHole Attacks in Wireless Sensor Networks Ashish M 1 and Mr. Jason Martis 2 1 M. Tech, Department Of ISE, NMAM Institute of Technology, Nitte 2 Asst. Prof, Department Of ISE, NMAM Institute

More information

An Effective Outlier Detection-Based Data Aggregation for Wireless Sensor Networks

An Effective Outlier Detection-Based Data Aggregation for Wireless Sensor Networks An Effective Outlier Detection-Based Data Aggregation for Wireless Sensor Networks Dr Ashwini K B 1 Dr Usha J 2 1 R V College of Engineering 1 Master of Computer Applications 1 Bangalore, India 1 ashwinikb@rvce.edu.in

More information

Analysis of Energy Efficient Routing Protocols in Wireless Sensor Networks

Analysis of Energy Efficient Routing Protocols in Wireless Sensor Networks Analysis of Energy Efficient Routing Protocols in Wireless Sensor Networks G. Beni (Assistant Professor) Department of Information Technology, C.S.I Institute of Technology, Thovalai, Tamil Nadu, India.

More information

Outline. CS5984 Mobile Computing. Dr. Ayman Abdel-Hamid, CS5984. Wireless Sensor Networks 1/2. Wireless Sensor Networks 2/2

Outline. CS5984 Mobile Computing. Dr. Ayman Abdel-Hamid, CS5984. Wireless Sensor Networks 1/2. Wireless Sensor Networks 2/2 CS5984 Mobile Computing Outline : a Survey Dr. Ayman Abdel-Hamid Computer Science Department Virginia Tech An Introduction to 1 2 1/2 Advances in micro-electro-mechanical systems technology, wireless communications,

More information

Neighbor Co-ordination based Fault Node Detection Algorithm for Distributed Wireless Sensor Networks

Neighbor Co-ordination based Fault Node Detection Algorithm for Distributed Wireless Sensor Networks Neighbor Co-ordination based Node Detection Algorithm for Distributed Wireless Sensor Networks Prashant Shukla*, Rama Ranjan Panda Department of Computer Science and Engineering RSR Rungta College of Engineering

More information

The Impact of Clustering on the Average Path Length in Wireless Sensor Networks

The Impact of Clustering on the Average Path Length in Wireless Sensor Networks The Impact of Clustering on the Average Path Length in Wireless Sensor Networks Azrina Abd Aziz Y. Ahmet Şekercioğlu Department of Electrical and Computer Systems Engineering, Monash University, Australia

More information

European Network on New Sensing Technologies for Air Pollution Control and Environmental Sustainability - EuNetAir COST Action TD1105

European Network on New Sensing Technologies for Air Pollution Control and Environmental Sustainability - EuNetAir COST Action TD1105 European Network on New Sensing Technologies for Air Pollution Control and Environmental Sustainability - EuNetAir COST Action TD1105 A Holistic Approach in the Development and Deployment of WSN-based

More information

CHAPTER 2 WIRELESS SENSOR NETWORKS AND NEED OF TOPOLOGY CONTROL

CHAPTER 2 WIRELESS SENSOR NETWORKS AND NEED OF TOPOLOGY CONTROL WIRELESS SENSOR NETWORKS AND NEED OF TOPOLOGY CONTROL 2.1 Topology Control in Wireless Sensor Networks Network topology control is about management of network topology to support network-wide requirement.

More information

A Mobile-Sink Based Distributed Energy-Efficient Clustering Algorithm for WSNs

A Mobile-Sink Based Distributed Energy-Efficient Clustering Algorithm for WSNs A Mobile-Sink Based Distributed Energy-Efficient Clustering Algorithm for WSNs Sarita Naruka 1, Dr. Amit Sharma 2 1 M.Tech. Scholar, 2 Professor, Computer Science & Engineering, Vedant College of Engineering

More information

AN EFFICIENT MAC PROTOCOL FOR SUPPORTING QOS IN WIRELESS SENSOR NETWORKS

AN EFFICIENT MAC PROTOCOL FOR SUPPORTING QOS IN WIRELESS SENSOR NETWORKS AN EFFICIENT MAC PROTOCOL FOR SUPPORTING QOS IN WIRELESS SENSOR NETWORKS YINGHUI QIU School of Electrical and Electronic Engineering, North China Electric Power University, Beijing, 102206, China ABSTRACT

More information

Clustering Based Routing Protocols for Wireless Sensor Networks: A Survey

Clustering Based Routing Protocols for Wireless Sensor Networks: A Survey International Journal of Scientific and Research Publications, Volume 4, Issue 11, November 2014 1 Clustering Based Routing Protocols for Wireless Sensor Networks: A Survey Vivek pandiya raj *, B.Gunasundari

More information

Mobile Agent Driven Time Synchronized Energy Efficient WSN

Mobile Agent Driven Time Synchronized Energy Efficient WSN Mobile Agent Driven Time Synchronized Energy Efficient WSN Sharanu 1, Padmapriya Patil 2 1 M.Tech, Department of Electronics and Communication Engineering, Poojya Doddappa Appa College of Engineering,

More information

Zonal Rumor Routing for. Wireless Sensor Networks

Zonal Rumor Routing for. Wireless Sensor Networks Tarun Banka Department of Electrical and Computer Engineering tarunb@engr.colostate.edu Zonal Rumor Routing for. Wireless Sensor Networks Gagan Tandon Department of Computer Science gagan@cs.colostate.edu

More information

The Energy-Robustness Tradeoff for Routing in Wireless Sensor Networks

The Energy-Robustness Tradeoff for Routing in Wireless Sensor Networks The Energy-Robustness Tradeoff for Routing in Wireless Sensor Networks Bhaskar Krishnamachari, Yasser Mourtada *, and Stephen Wicker * Department of Electrical Engineering, University of Southern California,

More information

Random Key Pre-distribution Schemes using Multi-Path in Wireless Sensor Networks

Random Key Pre-distribution Schemes using Multi-Path in Wireless Sensor Networks ISSN (e): 2250 3005 Vol, 05 Issue, 01 January 2015 International Journal of Computational Engineering Research (IJCER) Random Key Pre-distribution Schemes using Multi-Path in Wireless Sensor Networks Si-Gwan

More information

Event Driven Routing Protocols For Wireless Sensor Networks

Event Driven Routing Protocols For Wireless Sensor Networks Event Driven Routing Protocols For Wireless Sensor Networks Sherif Moussa 1, Ghada Abdel Halim 2, Salah Abdel-Mageid 2 1 Faculty of Engineering, Canadian University Dubai, Dubai, UAE. 2 Faculty of Engineering,

More information

Analysis of Cluster based Routing Algorithms in Wireless Sensor Networks using NS2 simulator

Analysis of Cluster based Routing Algorithms in Wireless Sensor Networks using NS2 simulator Analysis of Cluster based Routing Algorithms in Wireless Sensor Networks using NS2 simulator Ashika R. Naik Department of Electronics & Tele-communication, Goa College of Engineering (India) ABSTRACT Wireless

More information

Evaluation of Cartesian-based Routing Metrics for Wireless Sensor Networks

Evaluation of Cartesian-based Routing Metrics for Wireless Sensor Networks Evaluation of Cartesian-based Routing Metrics for Wireless Sensor Networks Ayad Salhieh Department of Electrical and Computer Engineering Wayne State University Detroit, MI 48202 ai4874@wayne.edu Loren

More information

Impact of Black Hole and Sink Hole Attacks on Routing Protocols for WSN

Impact of Black Hole and Sink Hole Attacks on Routing Protocols for WSN Impact of Black Hole and Sink Hole Attacks on Routing Protocols for WSN Padmalaya Nayak V. Bhavani B. Lavanya ABSTRACT With the drastic growth of Internet and VLSI design, applications of WSNs are increasing

More information

2. REVIEW OF RELATED RESEARCH WORK. 2.1 Methods of Data Aggregation

2. REVIEW OF RELATED RESEARCH WORK. 2.1 Methods of Data Aggregation ata Aggregation in Wireless Sensor Networks with Minimum elay and Minimum Use of Energy: A comparative Study Bushra Qayyum Mohammed Saeed Jason Roberts Ph Student ean of Research Senior Lecturer University

More information

Energy Aware Data-Centric Routing in Wireless Sensor Network

Energy Aware Data-Centric Routing in Wireless Sensor Network Energy Aware Data-Centric Routing in Wireless Sensor Network May Mon Khaing, and Tun Min Naing Abstract Wireless sensor networks are especially used in highly dynamic and hostile area. In Wireless sensor

More information

End-To-End Delay Optimization in Wireless Sensor Network (WSN)

End-To-End Delay Optimization in Wireless Sensor Network (WSN) Shweta K. Kanhere 1, Mahesh Goudar 2, Vijay M. Wadhai 3 1,2 Dept. of Electronics Engineering Maharashtra Academy of Engineering, Alandi (D), Pune, India 3 MITCOE Pune, India E-mail: shweta.kanhere@gmail.com,

More information

ROUTING ALGORITHMS Part 2: Data centric and hierarchical protocols

ROUTING ALGORITHMS Part 2: Data centric and hierarchical protocols ROUTING ALGORITHMS Part 2: Data centric and hierarchical protocols 1 Negative Reinforcement Time out Explicitly degrade the path by re-sending interest with lower data rate. Source Gradient New Data Path

More information

New Active Caching Method to Guarantee Desired Communication Reliability in Wireless Sensor Networks

New Active Caching Method to Guarantee Desired Communication Reliability in Wireless Sensor Networks J. Basic. Appl. Sci. Res., 2(5)4880-4885, 2012 2012, TextRoad Publication ISSN 2090-4304 Journal of Basic and Applied Scientific Research www.textroad.com New Active Caching Method to Guarantee Desired

More information

Energy Efficient Data Gathering For Throughput Maximization with Multicast Protocol In Wireless Sensor Networks

Energy Efficient Data Gathering For Throughput Maximization with Multicast Protocol In Wireless Sensor Networks Energy Efficient Data Gathering For Throughput Maximization with Multicast Protocol In Wireless Sensor Networks S. Gokilarani 1, P. B. Pankajavalli 2 1 Research Scholar, Kongu Arts and Science College,

More information

Index Terms: Base Station, Hop Count Indicator (HCI), Node Usage Indicator (NUI), Resource Biased Routing (RBR).

Index Terms: Base Station, Hop Count Indicator (HCI), Node Usage Indicator (NUI), Resource Biased Routing (RBR). Resource Biased Routing (RBR) Algorithm for Energy Optimization in Wireless Sensor Networks Lalit Kumar Saraswat, Dr. Sachin Kumar Abstract: Energy efficiency is the major concern in the design of Wireless

More information

CSSE Technical Report UWA-CSSE June 2006 WinMS: Wireless Sensor Network-Management System,

CSSE Technical Report UWA-CSSE June 2006 WinMS: Wireless Sensor Network-Management System, CSSE Technical Report UWA-CSSE-06-001 June 2006 WinMS: Wireless Sensor Network-Management System, An Adaptive Policy-Based Management for Wireless Sensor Networks Winnie Louis Lee, Amitava Datta, Rachel

More information

Adapting Distance Based Clustering Concept to a Heterogeneous Network

Adapting Distance Based Clustering Concept to a Heterogeneous Network International Journal of Computer Theory and Engineering, Vol. 7, No. 3, June 215 Adapting Distance Based Clustering Concept to a Heterogeneous Network N. Laloo, M. Z. A. A. Aungnoo, and M. S. Sunhaloo

More information

Data-Centric Query in Sensor Networks

Data-Centric Query in Sensor Networks Data-Centric Query in Sensor Networks Jie Gao Computer Science Department Stony Brook University 10/27/05 Jie Gao, CSE590-fall05 1 Papers Chalermek Intanagonwiwat, Ramesh Govindan and Deborah Estrin, Directed

More information

Mitigating Routing Misbehavior in Mobile Ad-Hoc Networks

Mitigating Routing Misbehavior in Mobile Ad-Hoc Networks Mitigating Routing Misbehavior in Mobile Ad-Hoc Networks Monty Barber 21 April 2003 CSC774 Network Security Overview Mitigating Routing Misbehavior in Mobile Ad Hoc Networks, Sergio Marti, T.J. Giuli,

More information

International Journal of Scientific & Engineering Research, Volume 6, Issue 3, March ISSN

International Journal of Scientific & Engineering Research, Volume 6, Issue 3, March ISSN International Journal of Scientific & Engineering Research, Volume 6, Issue 3, March-2015 1464 Performance Evaluation of AODV and DSDV Routing Protocols through Clustering in MANETS Prof. A Rama Rao, M

More information

A local area network that employs either a full mesh topology or partial mesh topology

A local area network that employs either a full mesh topology or partial mesh topology and Ad Hoc Networks Definition A local area network that employs either a full mesh topology or partial mesh topology Full mesh topology each node is connected directly to each of the others Partial mesh

More information

Low Energy Adaptive Clustering Hierarchy based routing Protocols Comparison for Wireless Sensor Networks

Low Energy Adaptive Clustering Hierarchy based routing Protocols Comparison for Wireless Sensor Networks IOSR Journal of Computer Engineering (IOSR-JCE) e-issn: 2278-0661,p-ISSN: 2278-8727, Volume 16, Issue 6, Ver. II (Nov Dec. 2014), PP 56-61 Low Energy Adaptive Clustering Hierarchy based routing Protocols

More information

Prianka.P 1, Thenral 2

Prianka.P 1, Thenral 2 An Efficient Routing Protocol design and Optimizing Sensor Coverage Area in Wireless Sensor Networks Prianka.P 1, Thenral 2 Department of Electronics Communication and Engineering, Ganadipathy Tulsi s

More information

Geographic Adaptive Fidelity and Geographic Energy Aware Routing in Ad Hoc Routing

Geographic Adaptive Fidelity and Geographic Energy Aware Routing in Ad Hoc Routing 309 Geographic Adaptive Fidelity and Geographic Energy Aware Routing in Ad Hoc Routing Sinchan Roychowdhury Instrumentation Control Engineering Calcutta Institute of Engineering & Management Kolkata, India

More information

SECURE AND EFFICIENT HYBRID APPROACH FOR DATA TRANSMISSION IN ZIGBEE NETWORK

SECURE AND EFFICIENT HYBRID APPROACH FOR DATA TRANSMISSION IN ZIGBEE NETWORK SECURE AND EFFICIENT HYBRID APPROACH FOR DATA TRANSMISSION IN ZIGBEE NETWORK P.M.Shareefa Jareena *1, T.Samraj Lawrence #2, and V.Perathu Selvi #3 * Student, Dept of CSE (SNW), Francis Xavier Engineering

More information

Chapter 5 Ad Hoc Wireless Network. Jang Ping Sheu

Chapter 5 Ad Hoc Wireless Network. Jang Ping Sheu Chapter 5 Ad Hoc Wireless Network Jang Ping Sheu Introduction Ad Hoc Network is a multi-hop relaying network ALOHAnet developed in 1970 Ethernet developed in 1980 In 1994, Bluetooth proposed by Ericsson

More information

Blackhole Attack Detection in Wireless Sensor Networks Using Support Vector Machine

Blackhole Attack Detection in Wireless Sensor Networks Using Support Vector Machine International Journal of Wireless Communications, Networking and Mobile Computing 2016; 3(5): 48-52 http://www.aascit.org/journal/wcnmc ISSN: 2381-1137 (Print); ISSN: 2381-1145 (Online) Blackhole Attack

More information

Packet Estimation with CBDS Approach to secure MANET

Packet Estimation with CBDS Approach to secure MANET Packet Estimation with CBDS Approach to secure MANET Mr. Virendra P. Patil 1 and Mr. Rajendra V. Patil 2 1 PG Student, SSVPS COE, Dhule, Maharashtra, India 2 Assistance Professor, SSVPS COE, Dhule, Maharashtra,

More information

A Comparative study of On-Demand Data Delivery with Tables Driven and On-Demand Protocols for Mobile Ad-Hoc Network

A Comparative study of On-Demand Data Delivery with Tables Driven and On-Demand Protocols for Mobile Ad-Hoc Network A Comparative study of On-Demand Data Delivery with Tables Driven and On-Demand Protocols for Mobile Ad-Hoc Network Humayun Bakht Research Fellow, London School of Commerce, United Kingdom humayunbakht@yahoo.co.uk

More information

ROAL: A Randomly Ordered Activation and Layering Protocol for Ensuring K-Coverage in Wireless Sensor Networks

ROAL: A Randomly Ordered Activation and Layering Protocol for Ensuring K-Coverage in Wireless Sensor Networks ROAL: A Randomly Ordered Activation and Layering Protocol for Ensuring K-Coverage in Wireless Sensor Networks Hogil Kim and Eun Jung Kim Department of Computer Science Texas A&M University College Station,

More information

High-Performance Multipath Routing Algorithm Using CPEGASIS Protocol in Wireless Sensor Cloud Environment

High-Performance Multipath Routing Algorithm Using CPEGASIS Protocol in Wireless Sensor Cloud Environment Circuits and Systems, 2016, 7, 3246-3252 Published Online August 2016 in SciRes. http://www.scirp.org/journal/cs http://dx.doi.org/10.4236/cs.2016.710276 High-Performance Multipath Routing Algorithm Using

More information

An Energy-Efficient Hierarchical Routing for Wireless Sensor Networks

An Energy-Efficient Hierarchical Routing for Wireless Sensor Networks Volume 2 Issue 9, 213, ISSN-2319-756 (Online) An Energy-Efficient Hierarchical Routing for Wireless Sensor Networks Nishi Sharma Rajasthan Technical University Kota, India Abstract: The popularity of Wireless

More information

Clustering Based Certificate Revocation Scheme for Malicious Nodes in MANET

Clustering Based Certificate Revocation Scheme for Malicious Nodes in MANET International Journal of Scientific and Research Publications, Volume 3, Issue 5, May 2013 1 Clustering Based Certificate Revocation Scheme for Malicious Nodes in MANET Ms.T.R.Panke * M.B.E.S.College of

More information

Enhancement in Divide and Conquer Scheme to increase efficiency of the Networks Anku 1, Hardeep singh 2

Enhancement in Divide and Conquer Scheme to increase efficiency of the Networks Anku 1, Hardeep singh 2 823 Enhancement in Divide and Conquer Scheme to increase efficiency of the Networks Anku 1, Hardeep singh 2 1 (Electronics & communication engineering, BFCET, Deon (Bathinda) Email: smartsidhu13brar@gmail.com)

More information

A Review on Efficient Opportunistic Forwarding Techniques used to Handle Communication Voids in Underwater Wireless Sensor Networks

A Review on Efficient Opportunistic Forwarding Techniques used to Handle Communication Voids in Underwater Wireless Sensor Networks Advances in Wireless and Mobile Communications. ISSN 0973-6972 Volume 10, Number 5 (2017), pp. 1059-1066 Research India Publications http://www.ripublication.com A Review on Efficient Opportunistic Forwarding

More information

Energy Efficient Zonal Stable Election Protocol for WSNs

Energy Efficient Zonal Stable Election Protocol for WSNs Energy Efficient Zonal Stable Election Protocol for WSNs G.Chandini, (M.Tech), Department of Electronics and Communication Engineering., Sri Sivani College Of Engineering, Srikakulam, A.P, India Rajavali

More information

Analyzing the Performance of Data Dissemination Algorithms to Application Requirements in Wireless Sensor Network

Analyzing the Performance of Data Dissemination Algorithms to Application Requirements in Wireless Sensor Network Analyzing the Performance of Data Dissemination Algorithms to Application Requirements in Wireless Sensor Network Sukant Kishoro Bisoyi, Mohit Ranjan Panda & Sangeeta Mishra C. V. Raman College of Engineering,

More information

Integrated Routing and Query Processing in Wireless Sensor Networks

Integrated Routing and Query Processing in Wireless Sensor Networks Integrated Routing and Query Processing in Wireless Sensor Networks T.Krishnakumar Lecturer, Nandha Engineering College, Erode krishnakumarbtech@gmail.com ABSTRACT Wireless Sensor Networks are considered

More information

An Iterative Greedy Approach Using Geographical Destination Routing In WSN

An Iterative Greedy Approach Using Geographical Destination Routing In WSN ISSN (Online) : 2319-8753 ISSN (Print) : 2347-6710 International Journal of Innovative Research in Science, Engineering and Technology Volume 3, Special Issue 3, March 2014 2014 International Conference

More information

Low-Energy-Consumption Ad Hoc Mesh Network Based on Intermittent Receiver-driven Transmission

Low-Energy-Consumption Ad Hoc Mesh Network Based on Intermittent Receiver-driven Transmission Low-Energy-Consumption Ad Hoc Mesh Network Based on Intermittent Receiver-driven Transmission Masashi Sugano 1, Ryo Fukushima 2, Masayuki Murata 2, Takayoshi Hayashi 3, Takaaki Hatauchi 3 1 School of Comprehensive

More information

Rab Nawaz Jadoon DCS. Assistant Professor. Department of Computer Science. COMSATS Institute of Information Technology. Mobile Communication

Rab Nawaz Jadoon DCS. Assistant Professor. Department of Computer Science. COMSATS Institute of Information Technology. Mobile Communication Rab Nawaz Jadoon DCS Assistant Professor COMSATS IIT, Abbottabad Pakistan COMSATS Institute of Information Technology Mobile Communication WSN Wireless sensor networks consist of large number of sensor

More information

An Adaptive Self-Organization Protocol for Wireless Sensor Networks

An Adaptive Self-Organization Protocol for Wireless Sensor Networks An Adaptive Self-Organization Protocol for Wireless Sensor Networks Kil-Woong Jang 1 and Byung-Soon Kim 2 1 Dept. of Mathematical and Information Science, Korea Maritime University 1 YeongDo-Gu Dongsam-Dong,

More information

A Proposed Paper on Joint Priority Based Approach for Scheduling and Congestion Control in Multipath Multi-hop WSN

A Proposed Paper on Joint Priority Based Approach for Scheduling and Congestion Control in Multipath Multi-hop WSN A Proposed Paper on Joint Priority Based Approach for Scheduling and Congestion Control in Multipath Multi-hop WSN Sweta A.Kahurke M.Tech(IV) Wireless communication & Computing G.H.Raisoni College Of Engineering

More information

Routing in Ad-Hoc Networks

Routing in Ad-Hoc Networks Routing in Ad-Hoc Networks Ramesh Patil Computer Science Department, University of Texas at Arlington Abstract In this paper, we deal with the basic concept of ad-hoc networks and the need for it. We present

More information

A Location-based Directional Route Discovery (LDRD) Protocol in Mobile Ad-hoc Networks

A Location-based Directional Route Discovery (LDRD) Protocol in Mobile Ad-hoc Networks A Location-based Directional Route Discovery (LDRD) Protocol in Mobile Ad-hoc Networks Stephen S. Yau, Wei Gao, and Dazhi Huang Dept. of Computer Science and Engineering Arizona State University Tempe,

More information

Secure Data Collection for Wireless Sensor Networks

Secure Data Collection for Wireless Sensor Networks Secure Data Collection for Wireless Sensor Networks Haengrae Cho 1 and Soo-Young Suck 2 1 Department of Computer Engineering, Yeungnam University, Republic of Korea 2 Department of R&D, Gyeongbuk Institute

More information

Ad Hoc Networks: Issues and Routing

Ad Hoc Networks: Issues and Routing Ad Hoc Networks: Issues and Routing Raj Jain Washington University in Saint Louis Saint Louis, MO 63130 Jain@cse.wustl.edu Audio/Video recordings of this lecture are available at: http://www.cse.wustl.edu/~jain/cse574-08/

More information

Z-SEP: Zonal-Stable Election Protocol for Wireless Sensor Networks

Z-SEP: Zonal-Stable Election Protocol for Wireless Sensor Networks Z-SEP: Zonal-Stable Election Protocol for Wireless Sensor Networks S. Faisal 1, N. Javaid 1, A. Javaid 2, M. A. Khan 1, S. H. Bouk 1, Z. A. Khan 3 1 COMSATS Institute of Information Technology, Islamabad,

More information

Detection of Malicious Node in Wireless Sensor Network under Byzantine Attack

Detection of Malicious Node in Wireless Sensor Network under Byzantine Attack Detection of Malicious Node in Wireless Sensor Network under Byzantine Attack Jayanti Pandey, Dr. Achala Deshmukh M.E Student, Department of Electronics & Telecommunication, Sihngad College of Engineering,

More information

A Study on Efficient Route Optimization using Border Gateway Protocol in Mobile Adhoc Networks

A Study on Efficient Route Optimization using Border Gateway Protocol in Mobile Adhoc Networks A Study on Efficient Route Optimization using Border Gateway Protocol in Mobile Adhoc Networks N.vijay kumar T.Santhi Sri Dr.J.Rajendra Prasad Y.Vijayalakshmi II MCA II SEMESTER Department of CA Department

More information

Design and Implementation of detecting the failure of sensor node based on RTT time and RTPs in WSNs

Design and Implementation of detecting the failure of sensor node based on RTT time and RTPs in WSNs Design and Implementation of detecting the failure of sensor node based on RTT time and RTPs in WSNs Girish K 1 and Mrs. Shruthi G 2 1 Department of CSE, PG Student Karnataka, India 2 Department of CSE,

More information

Routing Protocols in MANETs

Routing Protocols in MANETs Chapter 4 Routing Protocols in MANETs 4.1 Introduction The main aim of any Ad Hoc network routing protocol is to meet the challenges of the dynamically changing topology and establish a correct and an

More information

DE-LEACH: Distance and Energy Aware LEACH

DE-LEACH: Distance and Energy Aware LEACH DE-LEACH: Distance and Energy Aware LEACH Surender Kumar University of Petroleum and Energy Studies, India M.Prateek, N.J.Ahuja University of Petroleum and Energy Studies, India Bharat Bhushan Guru Nanak

More information