EDARD: efficient data access based on rumour dissemination in wireless sensor networks. Kheroua Leila*, Moussaoui Samira and Mansour Louiza

Size: px
Start display at page:

Download "EDARD: efficient data access based on rumour dissemination in wireless sensor networks. Kheroua Leila*, Moussaoui Samira and Mansour Louiza"

Transcription

1 Int. J. Trust Management in Computing and Communications, Vol. 1, No. 1, EDARD: efficient data access based on rumour dissemination in wireless sensor networks Kheroua Leila*, Moussaoui Samira and Mansour Louiza Faculty of Electronic and Computing Science, Laboratory of Information System, USTHB, BP 32 Al Alia, B. Ezzouar, Algeria *Corresponding author Abstract: In this paper, we present a rumour dissemination protocol named: efficient data access based on rumour dissemination (EDARD). EDARD ensures an information uniform distribution to enhance data accessibility in wireless sensor networks. In EDARD, rumours (event occurrences) and queries (requests of information) are disseminated through trajectories as straight as possible preventing backward paths. The straitening trajectory based on a selective next hop choice and the forking procedure introduced in EDARD protocol have the objective to find data and establish paths to the source event in short delays with fewer transmissions. Simulation and comparison results show that EDARD protocol achieves improvements in terms of query delivery rate, data access time and network traffic. Keywords: data dissemination; data access; rumour agents; forking agents; routing; wireless sensor networks. Reference to this paper should be made as follows: Leila, K., Samira, M. and Louiza, M. (2013) EDARD: efficient data access based on rumour dissemination in wireless sensor networks, Int. J. Trust Management in Computing and Communications, Vol. 1, No. 1, pp Biographical notes: Kheroua Leila is an Assistant Professor in the Computing Department, University of Science and Technology, USTHB. She received her BS and MS degrees from the Computing Department of the USTHB University, in 2002 and 2006 respectively. She is a PhD candidate attached to the Computing System Laboratory (LSI) from 2008 up to now. Her current research interests are focused on the use of rumour agents to improve data dissemination and routing in wireless sensor networks. Moussaoui Samira received her doctor degree in Computer Science from the University of Sciences and Technologies Houari Boumediene (USTHB), Algiers, Algeria in She is a Lecturer Researcher at the Department of Computer Science of USTHB, since Her research interests include mobile computing systems, mobile networks, and peer-to-peer systems. Copyright 2013 Inderscience Enterprises Ltd.

2 74 K. Leila et al. Louiza Mansour received her Bachelor and Master degrees from the Computing Department of the USTHB University, in 2008 and 2010 respectively. She is a PhD candidate attached to the Computing System Laboratory (LSI-USTHB) from 2010 up to now. Her current research interests are focused on data dissemination in wireless sensor networks and data harvesting in vehicular sensor networks. 1 Introduction A wireless sensor network (WSN) is a collection of sensor nodes (small sensing devices) and sink node (base station) connected through wireless channels. These small devices can be used for building distributed systems for data collection and processing (Wang et al., 2008). WSNs suffer from several restrictions, e.g., limited energy supply, limited computing power, and limited bandwidth. One of the main design goals of WSNs is to carry out data communication while trying to save network lifetime. Data access in WSNs is a challenging task. In fact, for routing purposes and for many other applications, maximum data has to be disseminated over the WSN. In rumour dissemination protocols, once an event occurred in the network, the sensor node that witnesses the event (for example, increased temperature in an area being monitored) creates a rumour. A rumour is a packet that is responsible for spreading event identifier in the network. Each rumour is associated with the time to live (TTL) that determines the number of hops the rumour can reach. A rumour maintains an event list in which the events names and distance to the event s node source are stored. We note that rumours also called agents are considered as active messages with a small code of list synchronisations as used in Braginsky and Estrin (2002) and Banka et al. (2005). When the sink node is looking for a certain event, it creates a query. A query is a packet which only contains a call for specific information. It travels through the network blindly and searches each visited node s event table for requested information. Each query is associated with a TTL that determines the number of hops the query can make. Unless it matches the requested event before the expiration of its TTL, a query is considered undelivered. The neighbouring information in the network is kept by node s neighbour list. Rumour dissemination protocols were developed for environments without any localisation systems. The main problem of these rumour random walk protocols is the information non-uniform distribution. Rumour information may be concentrated in a restricted network region which makes data access delays very important. To fix that problem, efficient data access based on rumour dissemination (EDARD) protocol introduces a straitening trajectory for both events and queries paths. EDARD maintains neighbouring information at two hops in lightweight packets, frequently reinitialised. For larger data dissemination, EDARD protocol implements a forking procedure that leads to more agents creation distributing information to different part of the network. We believe that for important and critique data in real time applications, EDARD protocol can build paths leading to source events in very short delays.

3 EDARD: efficient data access based on rumour dissemination 75 The rest of this paper is organised as follows: Section 2 discusses related researches on rumour dissemination protocols in WSNs. The proposed EDARD protocol is introduced in Section 3. Section 4 presents simulation and comparison results of the proposed EDARD protocol, while Section 5 concludes the paper. 2 Related work Rumour routing (RR) (Braginsky and Estrin, 2002) protocol attempts to solve the problem of network overhead by introducing a logical compromise between query and event flooding. When a node in the network witnesses an event, an agent is created and the event is inserted into an EventList. For its next hop, the agent chooses an unvisited node among neighbouring nodes. If all the neighbouring nodes were already visited, the agent will choose one of them randomly. The agent progresses till the expiration of its TTL creating a history list that contains the identity (IDs) of the previously visited nodes. When a query is sent by a sink node, it travels through the network blindly until it meets the concerned event. If not, the same query will be flooded. The drawback of RR is that it produces a highly non-uniform distribution of information due to the random choice of the next hop when forwarding agents and queries. The agent path may be a spiral route around a restricted region in the network. To deal with these later, zonal rumour routing (ZRR) was proposed. In cases where sensors are uniformly distributed, ZRR defines a zone optimal number formula to maximise the query delivery rate. In ZRR, the topology of the network is reconsidered, since it is partitioned into virtual zones where each node is exactly member of one zone. Agents and queries are forwarded as far as possible in the network moving from a zone to another. ZRR seems to be a good approach to disperse agents and queries further in the network. Even though they cross long distances, chances are that they may loop back toward their native zones considering their partial historic information and the data limit storage. Forking agents (Haenselmann and Effelsberg, 2005) proposes to distribute agents more equally in the network. For that purpose, it introduces master agents that are sent immediately after detecting an event in a cell or a region of the network. Master agents have the property to fork themselves while travelling through the network for a predefined number of times. The forking process leads to child agent s creation. The idea behind forking agents is to propagate the event information very far from the owner cell reducing by the same time the number of transmissions. Forking agents successes to ensure relatively a uniform events information distribution in the network. However, it impossible to predict child agents directions since the system loose all control when creating them. Along and across routing algorithm (AL&AC) (Chim, 2005) uses a tree structure hop organised on levels starting from a random root node. It consists of three major steps: building the hop tree, distribution of event attributes and propagation of queries. Events are routed along hop levels and queries are routed across hop levels. They may go on upper or lower directions or both to seek for an answer. In AL&AC the hop tree building process consumes precious battery power and paths between events and queries are usually not the shortest one.

4 76 K. Leila et al. Straight line routing (SLR) (Chou et al., 2005) focused first, on the problem of winding paths. It proposed to transmit agents and queries on straight line trajectories. For SLR, at each next hop selection, computation is needed and may fail in some worst cases. Directed rumour routing (DRR) (Shokrzadeh et al., 2009) was proposed first for environments with available positioning systems. DRR was improved by eliminating the localisation devices. In this case, cheaper and more available equipments like: angle of arrival (AoA) antennas, electronic compasses and signal strength detectors are used to obtain direction of the received signal, absolute directions and distances of different neighbours. The neighbour with the least absolute total deviation is then selected as the next hop. The drawback of DRR is the partial historic information of the visited nodes. Its preventing loops strategy is not clear, since its stores only the previous node that transmits the agent. Fast rumour agents (FRA) (Kheroua and Moussaoui, 2011) was designed to fix the spiral path routing problem using neighbouring information at each hop. Although, FRA reduces time of path establishment, it slightly decreases the query delivery rate since the rumour is disseminated along a thin path. 3 EDARD protocol 3.1 Model environment We consider a stationary WSN without any localisation systems and with reliable communication links. We suppose a network with uniform distribution of sensor nodes partitioned into virtual zones or clusters and every node is a part of one zone only. Once an event is detected in the network, a rumour agent is created. It will be propagated from one zone to another according to a straitening trajectory. A query is a request of information, it will be propagated exactly as an agent until it crossroad the desired agent path. Both the agent and the query have their respective TTLs that determines the number of hops they can make. 3.2 Solution overview EDARD main objective is to disseminate rumours uniformly, as far as possible in the network. The purpose is to increase the chances of crossroad between agents and queries paths to optimise time and query delivery rate using fewer transmissions. Rumours are data descriptions embedded in agent s packets. Their role is to inform about the existence of the data using efficiently the limited bandwidth and space of sensor nodes. Once the sink node decided that the data is too important, it will be propagated using the constructed path. EDARD protocol principal s procedures are: Agents and queries dissemination Agents and queries dissemination is based on path construction following a straitening trajectory. The path construction is based on a selective next hop scheme. Neighbouring

5 EDARD: efficient data access based on rumour dissemination 77 information is maintained using beacons. To store the historical path information, we use the history zone array (HistZA). The HistZA is an array of bits with a size equal to the total number of zones in the network; all its entries are initialised to zero. At each time the agent (respectively. the query) visits a zone, the corresponding entry on this array is updated to one. The HistZA offers to agents and queries, a global historic view of their respective visited zones and lightweight packets since it contains bits instead of zone identifiers as in Banka et al. (2005). For intra zones hops, we use temporary node list (TempNL). It contains the identifier of the first node that transmits the agent (respectively. the query) and its neighbouring nodes identifiers also. It is updated each time the agent (respectively. the query) moves from a node to another inside the same zone. It prevents agents and queries to have a spiral path inside a zone and it is reinitialised each time the agent (respectively. the query) moves to another zone. For extra zones hops, we use temporary zone list (TempZL). It contains the neighbouring zones identifiers of the last visited zone. It allows the agent (respectively. the query) to progress faster in the network, as far as possible from the last visited zone. It is updated each time the agent (respectively. the query) moves to a different zone. Figure 1 details the respective agent and query packets; NodeId is the identifier of the node that transmits the agent (respectively. the query); NextHop is the identifier of the node that receives the agent (respectively. the query) and Evt is the event the query looks for. Figure 1 (a) Agents and (b) query packet structure NodeId NextHop TTL EventList HistZA TempNL TempZL (a) NodeId NextHop TTL Event HistZA TempNL TempZL (b) At the agent creation, the event list is initialised and the agent creates the HistZA changing the value of the entry corresponding to its zone from 0 to 1. For its first next hop, the agent looks for an external neighbour (belonging to a different zone). If it is found, an agent packet is forwarded with the HistZA. If the external neighbour cannot be found, the agent is randomly forwarded with its TempNL to an internal neighbour (belonging to the same zone). For all next hops, the agent will try to find a neighbour that satisfies the two following conditions: 1 belong to an unvisited zone 2 belong to a zone different from ones in the TempZL to maintain the trajectory as straight as possible. We note that the priority is given to the first condition. In the worst case, the next hop may belong to a zone of the TempZL. If the two conditions are not satisfied, the agent will be sent to an internal neighbor. For all its internal hops, the agent transports its

6 78 K. Leila et al. TempZL and its TempNL. But, when it finds a way to another zone, it keeps only its TempZL and reinitialised the TempNL since the oldest one becomes not useful. The agent continues its way until the expiration of its TTL. Figure 2 explains an example of the agent next hop zone selection during the path construction. The agent from zone 1 is at zone 4. For its next zone hop, the candidate zones are zone 5, 6 and 7. The best next agent zone hop choice is a node from zone 7. But, even if it chooses node from zone 5 or 6, the agent path will slightly deviate from the straitening trajectory since the only candidate zones at zone 5 and 6 are zone 7 and another zones that are not so far from the straitening path (z1-z4-z7-.). Query dissemination is quite similar to the agent one, except that the query searches the desired event at each intermediate node. When a path is found, the query is directly routed to the event. The query routing terminates if a path to the event is found or if its TTL expires. We note that data access starts immediately ones the path is constructed. Figure 2 EDARD next hop zone selection Agent s forking procedure To improve query delivery rate success and take in consideration the scalability feature, we have implemented a forking process during the agent dissemination. For that purpose, we have defined time to fork (TTF) as a number of hops the agent will cross in order to start forking procedure. It is suitable that TTF value is half or more of the initial agent TTL. Thus, the rumour may progress deeper in the network. At a forking step, child agents are created and routed exactly as the initial ones. The number of child agents may be fixed or dynamically determined according to the number of neighbour zones.

7 EDARD: efficient data access based on rumour dissemination 79 Figure 3 EDARD pseudo algorithm 1. Node X detects event E. 2. Node X creates a Rumour Agent (RA). Node X and RA saves E in their respective Event List with (E.distance == 0) 3. RA saves the X zone number and maintains its Neighbor Zone List. 4. IF TTL =! TTF then, RA looks f or an external neighbor Y (selective next hop scheme) a. If found: i. RA is transferred and Event List synchronization is done. ii. Back to 4. b. If not: i. An internal node is chosen. ii. Back to If not: Forking process starts with child agent s creation according to the number of entries in the Candidate Zone List. 6. Each child agents is routed according to a selective next hop scheme until the expiration of its TTL. 4 Performances evaluations 4.1 Simulation parameters We have implemented scenarios for the creation of a 1024 nodes network distributed uniformly in a grid of 100 m 100 m. The maximum transmission range is fixed to 5 m for each node (sensing, sending and receiving), we fixed the number of zones to 127 and agents TTL to 100 according to Banka et al. (2005). Queries TTL are fixed to 250 to allow query dissemination up to the quarter of the network size (Haenselmann and Effelsberg, 2005). All tests were conducted using the network simulator, NS Table 1 details the simulation configuration parameters. Table 1 Simulation configuration parameters Parameters configuration Network size 100 m 100 m Number of nodes 1,024 Max transmission range 5 m Node distribution Uniform Number of zones 127 Agent s TTL (hop) 100 Child agent s TTL 50 Query TTL 125 TTF 50, 80 Number of query per event 10, 20, 30, 40, 50, 60,70 Number of events 2 Number of agents per event 1, 2

8 80 K. Leila et al. Following is the list of the used performance metrics: Traffic: the total traffic generated in the network is calculated according to the total number of agents and queries transmissions and receptions in the network. This metric can be used to inform about the total consumed energy in the network. Query delivery rate: the ratio of queries correctly routed to the source over all generated queries for a certain event. Data access time: is the time of path establishment. It is the difference between the time where the query reaches the source event and the time it was generated. 4.2 Simulation results To evaluate the best time of forking process, we have tested the following EDARD variants. TTF mentioned number of hops agent crosses before child agent s creation starts. EDARD1: two child agents at TTF = 50 EDARD2: two child agents at TTF = 80 EDARD3: two child agents at TTF = 50 and two another child agents at TTF = 80 EDARD4: one child agents at TTF = 50 and another one at TTF = 80. Figure 4 shows the query delivery rate for two events for which we vary the number of queries from 10 to 70. The results show that the EDARD variants have a satisfactory query delivery rate since it is between 97 and 100%. But, fewer than 40 queries per event, EDARD1 and EDARD4 rates are lower than EDARD3 and EDARD2. Concerning EDARD2, the delivery rate decreased after 30 queries per event which makes EDARD3 as the best variant probably because it generates more child agents with a double forking process. Figure 4 Query delivery rate

9 EDARD: efficient data access based on rumour dissemination 81 Figure 5 Traffic (number of transmissions) Figure 5 shows the total traffic generated by the EDARD variants. Results show that for the four variants, the traffic increased with the number of queries. But for EDARD 2, the traffic increased unexpectedly between 30 and 60 queries. This may be explained as follow: since the forking process in EDARD2 is postponed to 80%, the number of undelivered queries increased which increases queries transmissions in the network. Figure 6 shows the data time access of the EDARD variants. From Figures 3, 4 and 5, we note that EDARD3 has the best results in terms of query delivery rate, traffic and data access time. This is due to the number of rumour agents and the twice forking process associated. Figure 6 Data access time

10 82 K. Leila et al. Figure 7 Query delivery rate We have compared the best performance of EDARD protocol (EDARD3) with FRA (Kheroua and Moussaoui, 2011) and ZRR (Banka et al., 2005) algorithms. Figure 7 shows that unlike ZRR and FRA, the number of queries does not affect the performance of EDARD protocols. EDARD protocol improves the query delivery rate for about 7.75%.compared to the FRA and ZRR ones. This is certainly due to the use of child agents and the straitening routing strategy that allow a better rumour dissemination. Figure 8 Traffic (number of transmissions)

11 EDARD: efficient data access based on rumour dissemination 83 Figure 9 Data access time Figure 8 shows that the number of queries does not affect the performances of both EDARD and FRA protocols. However, the ZRR traffic increased after 60 queries per event probably because queries do not much the desired rumour agent paths and are finally lost in the network. The results proof the efficiency of EDARD protocol because even if it creates more agents, traffic results are satisfying since this process decreased query traffic. EDARD protocol improves the network generated traffic by saving 12,000 messages transmissions compared to the FRA one. Figure 9 shows that EDARD protocol improves data access time for about 35% compared to the ZRR protocol and for about 12% compared to the FRA one. This is principally due to the EDARD rumour dissemination strategy. 5 Conclusions For WSNs, collecting and gathering data in reasonable delays is a very challenging task especially in environments without positioning systems. To achieve this purpose, efficient data dissemination techniques have to be implemented. For critical data gathering, this paper proposes a data dissemination protocol named: EDARD. EDARD disseminate data in straight paths according to historic and neighbouring information embedded in lightweight packets frequently reinitialised. Also, EDARD propose an adaptive forking process to cover larger parts of the network. Performances analyses show that even if EDARD protocol creates more transmissions, query delivery rate and traffic results are satisfying. For real time applications with critical data, one interesting issue for EDARD protocol is to implement data replication. Each rumour agent will carry the data and copy it at each 50% and 80% of its TLL. Proceeding this way, we first enable the data to be available far from its native region and secondly we may overcome the problem of path deficiency.

12 84 K. Leila et al. References Banka, T., Tandon, G. and Jayasumana, A. (2005) Zonal rumor routing for wireless sensor networks, Proceedings of the International Conference on Information Technology: Coding and Computing, Vol. 2, pp Braginsky, D. and Estrin, D. (2002) Rumor routing algorithm for sensor networks, Proceedings of the 1st ACM International Workshop on Wireless Sensor Networks and Applications, pp Chim, T.W. (2005) Along & across algorithm for routing events and queries in wireless sensor networks, Proceedings of International Symposium on Intelligent Signal Processing and Communication Systems, Hong Kong. Chou, C.F., Su, J.J. and Chen, C.Y. (2005) Straight line routing for wireless sensor networks, Proceedings of the 10th IEEE Symposium on Computers and Communications, pp Haenselmann, T. and Effelsberg, W. (2005) Forking agents in sensor networks, 3rd (German) Workshop on Mobile Ad-Hoc Networks (WMAN), GI Jahrestagung, No. 2, pp Kheroua, L. and Moussaoui, S. (2011) Efficient agent based rumor propagation for wireless sensor networks, International Journal of Measurement Technologies and Instrumentation Engineering, April-June, Vol. 1, No. 2, pp.61 72, IGI Publishing. Shokrzadeh, H., Haghighat, A.T. and Nayebi, A. (2009) New routing framework base on rumor routing in wireless sensor networks, Journal of Computer Communications, Vol. 32, No. 1, pp Wang, M.M., Cao, J.N., Li, J. and Dasi, S.K. (2008) Middleware for wireless sensor networks: a survey, Journal of Computer Science and Technology, May, Vol. 23, No. 3, pp

Zonal Rumor Routing for. Wireless Sensor Networks

Zonal Rumor Routing for. Wireless Sensor Networks Tarun Banka Department of Electrical and Computer Engineering tarunb@engr.colostate.edu Zonal Rumor Routing for. Wireless Sensor Networks Gagan Tandon Department of Computer Science gagan@cs.colostate.edu

More information

Efficient Hybrid Multicast Routing Protocol for Ad-Hoc Wireless Networks

Efficient Hybrid Multicast Routing Protocol for Ad-Hoc Wireless Networks Efficient Hybrid Multicast Routing Protocol for Ad-Hoc Wireless Networks Jayanta Biswas and Mukti Barai and S. K. Nandy CAD Lab, Indian Institute of Science Bangalore, 56, India {jayanta@cadl, mbarai@cadl,

More information

Fig. 2: Architecture of sensor node

Fig. 2: Architecture of sensor node Volume 4, Issue 11, November 2014 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com To Reduce

More information

ROUTING ALGORITHMS Part 2: Data centric and hierarchical protocols

ROUTING ALGORITHMS Part 2: Data centric and hierarchical protocols ROUTING ALGORITHMS Part 2: Data centric and hierarchical protocols 1 Negative Reinforcement Time out Explicitly degrade the path by re-sending interest with lower data rate. Source Gradient New Data Path

More information

Comparison of TDMA based Routing Protocols for Wireless Sensor Networks-A Survey

Comparison of TDMA based Routing Protocols for Wireless Sensor Networks-A Survey Comparison of TDMA based Routing Protocols for Wireless Sensor Networks-A Survey S. Rajesh, Dr. A.N. Jayanthi, J.Mala, K.Senthamarai Sri Ramakrishna Institute of Technology, Coimbatore ABSTRACT One of

More information

Rumor Routing Algorithm

Rumor Routing Algorithm Aleksi.Ahtiainen@hut.fi T-79.194 Seminar on Theoretical Computer Science Feb 9 2005 Contents Introduction The Algorithm Research Results Future Work Criticism Conclusions Introduction is described in paper:

More information

A COMPARISON OF REACTIVE ROUTING PROTOCOLS DSR, AODV AND TORA IN MANET

A COMPARISON OF REACTIVE ROUTING PROTOCOLS DSR, AODV AND TORA IN MANET ISSN: 2278 1323 All Rights Reserved 2016 IJARCET 296 A COMPARISON OF REACTIVE ROUTING PROTOCOLS DSR, AODV AND TORA IN MANET Dr. R. Shanmugavadivu 1, B. Chitra 2 1 Assistant Professor, Department of Computer

More information

Analysis of Cluster-Based Energy-Dynamic Routing Protocols in WSN

Analysis of Cluster-Based Energy-Dynamic Routing Protocols in WSN Analysis of Cluster-Based Energy-Dynamic Routing Protocols in WSN Mr. V. Narsing Rao 1, Dr.K.Bhargavi 2 1,2 Asst. Professor in CSE Dept., Sphoorthy Engineering College, Hyderabad Abstract- Wireless Sensor

More information

WSN Routing Protocols

WSN Routing Protocols WSN Routing Protocols 1 Routing Challenges and Design Issues in WSNs 2 Overview The design of routing protocols in WSNs is influenced by many challenging factors. These factors must be overcome before

More information

The General Analysis of Proactive Protocols DSDV, FSR and WRP

The General Analysis of Proactive Protocols DSDV, FSR and WRP Volume 116 No. 10 2017, 375-380 ISSN: 1311-8080 (printed version); ISSN: 1314-3395 (on-line version) url: http://www.ijpam.eu ijpam.eu The General Analysis of Proactive Protocols DSDV, FSR and WRP 1 Dr.

More information

CACHING IN WIRELESS SENSOR NETWORKS BASED ON GRIDS

CACHING IN WIRELESS SENSOR NETWORKS BASED ON GRIDS International Journal of Wireless Communications and Networking 3(1), 2011, pp. 7-13 CACHING IN WIRELESS SENSOR NETWORKS BASED ON GRIDS Sudhanshu Pant 1, Naveen Chauhan 2 and Brij Bihari Dubey 3 Department

More information

Data-Centric Query in Sensor Networks

Data-Centric Query in Sensor Networks Data-Centric Query in Sensor Networks Jie Gao Computer Science Department Stony Brook University 10/27/05 Jie Gao, CSE590-fall05 1 Papers Chalermek Intanagonwiwat, Ramesh Govindan and Deborah Estrin, Directed

More information

Novel Cluster Based Routing Protocol in Wireless Sensor Networks

Novel Cluster Based Routing Protocol in Wireless Sensor Networks ISSN (Online): 1694-0784 ISSN (Print): 1694-0814 32 Novel Cluster Based Routing Protocol in Wireless Sensor Networks Bager Zarei 1, Mohammad Zeynali 2 and Vahid Majid Nezhad 3 1 Department of Computer

More information

AODV-PA: AODV with Path Accumulation

AODV-PA: AODV with Path Accumulation -PA: with Path Accumulation Sumit Gwalani Elizabeth M. Belding-Royer Department of Computer Science University of California, Santa Barbara fsumitg, ebeldingg@cs.ucsb.edu Charles E. Perkins Communications

More information

Overview of Sensor Network Routing Protocols. WeeSan Lee 11/1/04

Overview of Sensor Network Routing Protocols. WeeSan Lee 11/1/04 Overview of Sensor Network Routing Protocols WeeSan Lee weesan@cs.ucr.edu 11/1/04 Outline Background Data-centric Protocols Flooding & Gossiping SPIN Directed Diffusion Rumor Routing Hierarchical Protocols

More information

Performance Evaluation of Mesh - Based Multicast Routing Protocols in MANET s

Performance Evaluation of Mesh - Based Multicast Routing Protocols in MANET s Performance Evaluation of Mesh - Based Multicast Routing Protocols in MANET s M. Nagaratna Assistant Professor Dept. of CSE JNTUH, Hyderabad, India V. Kamakshi Prasad Prof & Additional Cont. of. Examinations

More information

Application Layer Multicasting for Mobile Ad-Hoc Networks with Network Layer Support

Application Layer Multicasting for Mobile Ad-Hoc Networks with Network Layer Support Application Layer Multicasting for Mobile Ad-Hoc Networks with Network Layer Support Jayanta Biswas and S. K. Nandy CAD Lab, Indian Institute of Science Bangalore, 0 0, India {jayanta@cadl, nandy@serc}.iisc.ernet.in

More information

Mobility of sink using hexagon architecture in highly data centric Wireless Sensor Networks

Mobility of sink using hexagon architecture in highly data centric Wireless Sensor Networks Mobility of sink using hexagon architecture in highly data centric Wireless Sensor Networks Nitika Vats Doohan, Sanjiv Tokekar, JitendraPatil Abstract Mobility of sensor nodes brings the new challenges

More information

ROUTING ALGORITHMS Part 1: Data centric and hierarchical protocols

ROUTING ALGORITHMS Part 1: Data centric and hierarchical protocols ROUTING ALGORITHMS Part 1: Data centric and hierarchical protocols 1 Why can t we use conventional routing algorithms here?? A sensor node does not have an identity (address) Content based and data centric

More information

TO DESIGN ENERGY EFFICIENT PROTOCOL BY FINDING BEST NEIGHBOUR FOR ZIGBEE PROTOCOL

TO DESIGN ENERGY EFFICIENT PROTOCOL BY FINDING BEST NEIGHBOUR FOR ZIGBEE PROTOCOL TO DESIGN ENERGY EFFICIENT PROTOCOL BY FINDING BEST NEIGHBOUR FOR ZIGBEE PROTOCOL 1 Mr. Sujeet D. Gawande, Prof. Amit M. Sahu 2 1 M.E. Scholar, Department of Computer Science and Engineering, G.H.R.C.E.M.,

More information

A Location-based Predictive Route Caching Scheme for Pure Reactive Zone-based Routing Protocol in Mobile Ad Hoc Networks Abstract Introduction

A Location-based Predictive Route Caching Scheme for Pure Reactive Zone-based Routing Protocol in Mobile Ad Hoc Networks Abstract Introduction A Location-based Predictive Route Caching Scheme for Pure Reactive Zone-based Routing Protocol in Mobile Ad Hoc Networks Weibo Chen 1, Kun Yang 1 and Xueqi Cheng 2 1. University of Essex, School of Computer

More information

Evaluation of Cartesian-based Routing Metrics for Wireless Sensor Networks

Evaluation of Cartesian-based Routing Metrics for Wireless Sensor Networks Evaluation of Cartesian-based Routing Metrics for Wireless Sensor Networks Ayad Salhieh Department of Electrical and Computer Engineering Wayne State University Detroit, MI 48202 ai4874@wayne.edu Loren

More information

SECURE AND EFFICIENT HYBRID APPROACH FOR DATA TRANSMISSION IN ZIGBEE NETWORK

SECURE AND EFFICIENT HYBRID APPROACH FOR DATA TRANSMISSION IN ZIGBEE NETWORK SECURE AND EFFICIENT HYBRID APPROACH FOR DATA TRANSMISSION IN ZIGBEE NETWORK P.M.Shareefa Jareena *1, T.Samraj Lawrence #2, and V.Perathu Selvi #3 * Student, Dept of CSE (SNW), Francis Xavier Engineering

More information

An Efficient Secured Scheme for Detecting Source of Packet Drop and Forgery Attack in WSN

An Efficient Secured Scheme for Detecting Source of Packet Drop and Forgery Attack in WSN Advances in Computational Sciences and Technology ISSN 0973-6107 Volume 10, Number 5 (2017) pp. 895-902 Research India Publications http://www.ripublication.com An Efficient Secured Scheme for Detecting

More information

WSN NETWORK ARCHITECTURES AND PROTOCOL STACK

WSN NETWORK ARCHITECTURES AND PROTOCOL STACK WSN NETWORK ARCHITECTURES AND PROTOCOL STACK Sensing is a technique used to gather information about a physical object or process, including the occurrence of events (i.e., changes in state such as a drop

More information

A Mobile-Sink Based Distributed Energy-Efficient Clustering Algorithm for WSNs

A Mobile-Sink Based Distributed Energy-Efficient Clustering Algorithm for WSNs A Mobile-Sink Based Distributed Energy-Efficient Clustering Algorithm for WSNs Sarita Naruka 1, Dr. Amit Sharma 2 1 M.Tech. Scholar, 2 Professor, Computer Science & Engineering, Vedant College of Engineering

More information

COMPARISON OF ENERGY EFFICIENT DATA TRANSMISSION APPROACHES FOR FLAT WIRELESS SENSOR NETWORKS

COMPARISON OF ENERGY EFFICIENT DATA TRANSMISSION APPROACHES FOR FLAT WIRELESS SENSOR NETWORKS COMPARISON OF ENERGY EFFICIENT DATA TRANSMISSION APPROACHES FOR FLAT WIRELESS SENSOR NETWORKS Saraswati Mishra 1 and Prabhjot Kaur 2 Department of Electrical, Electronics and Communication Engineering,

More information

Relaxation Control of Packet Arrival Rate in the Neighborhood of the Destination in Concentric Sensor Networks

Relaxation Control of Packet Arrival Rate in the Neighborhood of the Destination in Concentric Sensor Networks Relaxation Control of Packet Arrival Rate in the Neighborhood of the Destination in Concentric Sensor Networks 1 T.R.Gopalakrishnan Nair (SM-IEEE), 2 R. Selvarani, 3 Vaidehi M. 1 Director Research & Industry

More information

International Journal of Advancements in Research & Technology, Volume 2, Issue1, January ISSN

International Journal of Advancements in Research & Technology, Volume 2, Issue1, January ISSN International Journal of Advancements in Research & Technology, Volume 2, Issue1, January-2013 1 ENERGY SAVING IN WIRELESS SENSOR NETWORK USING OPTIMAL SELECTIVE FORWARDING PROTOCOL 1 Mrs. K. ARUN PRABHA

More information

Bandwidth Efficient Distant Vector Routing for Ad Hoc Networks

Bandwidth Efficient Distant Vector Routing for Ad Hoc Networks Bandwidth Efficient Distant Vector Routing for Ad Hoc Networks Ralph Jansen and Bernd Freisleben Department of Electrical Engineering & Computer Science University of Siegen Hölderlinstr. 3 D 57068 Siegen

More information

DYNAMIC SEARCH TECHNIQUE USED FOR IMPROVING PASSIVE SOURCE ROUTING PROTOCOL IN MANET

DYNAMIC SEARCH TECHNIQUE USED FOR IMPROVING PASSIVE SOURCE ROUTING PROTOCOL IN MANET DYNAMIC SEARCH TECHNIQUE USED FOR IMPROVING PASSIVE SOURCE ROUTING PROTOCOL IN MANET S. J. Sultanuddin 1 and Mohammed Ali Hussain 2 1 Department of Computer Science Engineering, Sathyabama University,

More information

Study on Wireless Sensor Networks Challenges and Routing Protocols

Study on Wireless Sensor Networks Challenges and Routing Protocols International Research Journal of Applied and Basic Sciences 2013 Available online at www.irjabs.com ISSN 2251-838X / Vol, 5 (7): 824-828 Science Explorer Publications Study on Wireless Sensor Networks

More information

PERFORMANCE ANALYSIS OF AODV ROUTING PROTOCOL IN MANETS

PERFORMANCE ANALYSIS OF AODV ROUTING PROTOCOL IN MANETS PERFORMANCE ANALYSIS OF AODV ROUTING PROTOCOL IN MANETS AMANDEEP University College of Engineering, Punjabi University Patiala, Punjab, India amandeep8848@gmail.com GURMEET KAUR University College of Engineering,

More information

EEEM: An Energy-Efficient Emulsion Mechanism for Wireless Sensor Networks

EEEM: An Energy-Efficient Emulsion Mechanism for Wireless Sensor Networks EEEM: An Energy-Efficient Emulsion Mechanism for Wireless Sensor Networks M.Sudha 1, J.Sundararajan 2, M.Maheswari 3 Assistant Professor, ECE, Paavai Engineering College, Namakkal, Tamilnadu, India 1 Principal,

More information

Effects of Sensor Nodes Mobility on Routing Energy Consumption Level and Performance of Wireless Sensor Networks

Effects of Sensor Nodes Mobility on Routing Energy Consumption Level and Performance of Wireless Sensor Networks Effects of Sensor Nodes Mobility on Routing Energy Consumption Level and Performance of Wireless Sensor Networks Mina Malekzadeh Golestan University Zohre Fereidooni Golestan University M.H. Shahrokh Abadi

More information

IJREAT International Journal of Research in Engineering & Advanced Technology, Volume 1, Issue 2, April-May, 2013 ISSN:

IJREAT International Journal of Research in Engineering & Advanced Technology, Volume 1, Issue 2, April-May, 2013 ISSN: Fast Data Collection with Reduced Interference and Increased Life Time in Wireless Sensor Networks Jayachandran.J 1 and Ramalakshmi.R 2 1 M.Tech Network Engineering, Kalasalingam University, Krishnan koil.

More information

An Efficient Data-Centric Routing Approach for Wireless Sensor Networks using Edrina

An Efficient Data-Centric Routing Approach for Wireless Sensor Networks using Edrina An Efficient Data-Centric Routing Approach for Wireless Sensor Networks using Edrina Rajasekaran 1, Rashmi 2 1 Asst. Professor, Department of Electronics and Communication, St. Joseph College of Engineering,

More information

A Low-Overhead Hybrid Routing Algorithm for ZigBee Networks. Zhi Ren, Lihua Tian, Jianling Cao, Jibi Li, Zilong Zhang

A Low-Overhead Hybrid Routing Algorithm for ZigBee Networks. Zhi Ren, Lihua Tian, Jianling Cao, Jibi Li, Zilong Zhang A Low-Overhead Hybrid Routing Algorithm for ZigBee Networks Zhi Ren, Lihua Tian, Jianling Cao, Jibi Li, Zilong Zhang Chongqing Key Lab of Mobile Communications Technology, Chongqing University of Posts

More information

Regression Based Cluster Formation for Enhancement of Lifetime of WSN

Regression Based Cluster Formation for Enhancement of Lifetime of WSN Regression Based Cluster Formation for Enhancement of Lifetime of WSN K. Lakshmi Joshitha Assistant Professor Sri Sai Ram Engineering College Chennai, India lakshmijoshitha@yahoo.com A. Gangasri PG Scholar

More information

Impact of Black Hole and Sink Hole Attacks on Routing Protocols for WSN

Impact of Black Hole and Sink Hole Attacks on Routing Protocols for WSN Impact of Black Hole and Sink Hole Attacks on Routing Protocols for WSN Padmalaya Nayak V. Bhavani B. Lavanya ABSTRACT With the drastic growth of Internet and VLSI design, applications of WSNs are increasing

More information

3. Evaluation of Selected Tree and Mesh based Routing Protocols

3. Evaluation of Selected Tree and Mesh based Routing Protocols 33 3. Evaluation of Selected Tree and Mesh based Routing Protocols 3.1 Introduction Construction of best possible multicast trees and maintaining the group connections in sequence is challenging even in

More information

Location Based Energy-Efficient Reliable Routing Protocol for Wireless Sensor Networks

Location Based Energy-Efficient Reliable Routing Protocol for Wireless Sensor Networks Location Based Energy-Efficient Reliable Routing Protocol for Wireless Sensor Networks RAFE ALASEM 1, AHMED REDA 2 AND MAHMUD MANSOUR 3 (1) Computer Science Department Imam Muhammad ibn Saud Islamic University

More information

Catching BlackHole Attacks in Wireless Sensor Networks

Catching BlackHole Attacks in Wireless Sensor Networks Catching BlackHole Attacks in Wireless Sensor Networks Ashish M 1 and Mr. Jason Martis 2 1 M. Tech, Department Of ISE, NMAM Institute of Technology, Nitte 2 Asst. Prof, Department Of ISE, NMAM Institute

More information

Mobile Agent Driven Time Synchronized Energy Efficient WSN

Mobile Agent Driven Time Synchronized Energy Efficient WSN Mobile Agent Driven Time Synchronized Energy Efficient WSN Sharanu 1, Padmapriya Patil 2 1 M.Tech, Department of Electronics and Communication Engineering, Poojya Doddappa Appa College of Engineering,

More information

References. Forwarding. Introduction...

References. Forwarding. Introduction... References Routing Protocols H. Karl and A. Willing. Protocols and Architectures for Wireless Sensor Networks. John Wiley & Sons, 005. (Chapter 11) K. Sohraby, D. Minoli, and T. Znati. Wireless Sensor

More information

Chapter 11 Chapter 6

Chapter 11 Chapter 6 Routing Protocols References H. Karl and A. Willing. Protocols and Architectures for Wireless Sensor Networks. John Wiley & Sons, 2005. (Chapter 11) K. Sohraby, D. Minoli, and T. Znati. Wireless Sensor

More information

Energy-efficient Data Dissemination in Wireless Sensor Networks

Energy-efficient Data Dissemination in Wireless Sensor Networks Energy-efficient Data Dissemination in Wireless Sensor Networks Ji-Han Jiang 1 Kuo-Hua Kao 2 Singing ee 2 1 Department of Computer Science and Information Engineering National Formosa University, Yun-in,

More information

A Comparative study of On-Demand Data Delivery with Tables Driven and On-Demand Protocols for Mobile Ad-Hoc Network

A Comparative study of On-Demand Data Delivery with Tables Driven and On-Demand Protocols for Mobile Ad-Hoc Network A Comparative study of On-Demand Data Delivery with Tables Driven and On-Demand Protocols for Mobile Ad-Hoc Network Humayun Bakht Research Fellow, London School of Commerce, United Kingdom humayunbakht@yahoo.co.uk

More information

Energy-Aware Routing in Wireless Ad-hoc Networks

Energy-Aware Routing in Wireless Ad-hoc Networks Energy-Aware Routing in Wireless Ad-hoc Networks Panagiotis C. Kokkinos Christos A. Papageorgiou Emmanouel A. Varvarigos Abstract In this work we study energy efficient routing strategies for wireless

More information

COMPARATIVE PERFORMANCE ANALYSIS OF TEEN SEP LEACH ERP EAMMH AND PEGASIS ROUTING PROTOCOLS

COMPARATIVE PERFORMANCE ANALYSIS OF TEEN SEP LEACH ERP EAMMH AND PEGASIS ROUTING PROTOCOLS COMPARATIVE PERFORMANCE ANALYSIS OF TEEN SEP LEACH ERP EAMMH AND PEGASIS ROUTING PROTOCOLS Neha Jain 1, Manasvi Mannan 2 1 Research Scholar, Electronics and Communication Engineering, Punjab College Of

More information

6367(Print), ISSN (Online) Volume 4, Issue 2, March April (2013), IAEME & TECHNOLOGY (IJCET)

6367(Print), ISSN (Online) Volume 4, Issue 2, March April (2013), IAEME & TECHNOLOGY (IJCET) INTERNATIONAL International Journal of Computer JOURNAL Engineering OF COMPUTER and Technology ENGINEERING (IJCET), ISSN 0976- & TECHNOLOGY (IJCET) ISSN 0976 6367(Print) ISSN 0976 6375(Online) Volume 4,

More information

DISTRIBUTED HASH TABLE PROTOCOL DETECTION IN WIRELESS SENSOR NETWORKS

DISTRIBUTED HASH TABLE PROTOCOL DETECTION IN WIRELESS SENSOR NETWORKS DISTRIBUTED HASH TABLE PROTOCOL DETECTION IN WIRELESS SENSOR NETWORKS Mr. M. Raghu (Asst.professor) Dr.Pauls Engineering College Ms. M. Ananthi (PG Scholar) Dr. Pauls Engineering College Abstract- Wireless

More information

Routing protocols in WSN

Routing protocols in WSN Routing protocols in WSN 1.1 WSN Routing Scheme Data collected by sensor nodes in a WSN is typically propagated toward a base station (gateway) that links the WSN with other networks where the data can

More information

IJMIE Volume 2, Issue 6 ISSN:

IJMIE Volume 2, Issue 6 ISSN: Network Simulation Based Parametric Analysis of AODV Protocol for Wireless Mobile Ad-hoc Network Mr. Amol V. Zade* Prof. Vijaya K. Shandilya** Abstract: A major aspect of ad-hoc networks is that the nodes

More information

Analysis of Cluster based Routing Algorithms in Wireless Sensor Networks using NS2 simulator

Analysis of Cluster based Routing Algorithms in Wireless Sensor Networks using NS2 simulator Analysis of Cluster based Routing Algorithms in Wireless Sensor Networks using NS2 simulator Ashika R. Naik Department of Electronics & Tele-communication, Goa College of Engineering (India) ABSTRACT Wireless

More information

ALL ABOUT DATA AGGREGATION IN WIRELESS SENSOR NETWORKS

ALL ABOUT DATA AGGREGATION IN WIRELESS SENSOR NETWORKS e-issn 2455 1392 Volume 1 Issue 1, November 2015 pp. 1-7 http://www.ijcter.com ALL ABOUT DATA AGGREGATION IN WIRELESS SENSOR NETWORKS Komal Shah 1, Heena Sheth 2 1,2 M. S. University, Baroda Abstract--

More information

Estimation of Network Partition Problem in Mobile Ad hoc Network

Estimation of Network Partition Problem in Mobile Ad hoc Network Estimation of Network Partition Problem in Mobile Ad hoc Network Varaprasad Golla B.M.S.College of Engineering Bangalore, India varaprasad555555@yahoo.co.in ABSTRACT: A node cannot communicate with others

More information

Performance Analysis and Enhancement of Routing Protocol in Manet

Performance Analysis and Enhancement of Routing Protocol in Manet Vol.2, Issue.2, Mar-Apr 2012 pp-323-328 ISSN: 2249-6645 Performance Analysis and Enhancement of Routing Protocol in Manet Jaya Jacob*, V.Seethalakshmi** *II MECS, Sri Shakthi Institute of Engineering and

More information

Energy Efficiency and Latency Improving In Wireless Sensor Networks

Energy Efficiency and Latency Improving In Wireless Sensor Networks Energy Efficiency and Latency Improving In Wireless Sensor Networks Vivekchandran K. C 1, Nikesh Narayan.P 2 1 PG Scholar, Department of Computer Science & Engineering, Malabar Institute of Technology,

More information

Information Brokerage

Information Brokerage Information Brokerage Sensing Networking Leonidas Guibas Stanford University Computation CS321 Information Brokerage Services in Dynamic Environments Information Brokerage Information providers (sources,

More information

An Cross Layer Collaborating Cache Scheme to Improve Performance of HTTP Clients in MANETs

An Cross Layer Collaborating Cache Scheme to Improve Performance of HTTP Clients in MANETs An Cross Layer Collaborating Cache Scheme to Improve Performance of HTTP Clients in MANETs Jin Liu 1, Hongmin Ren 1, Jun Wang 2, Jin Wang 2 1 College of Information Engineering, Shanghai Maritime University,

More information

PREDICTING NUMBER OF HOPS IN THE COOPERATION ZONE BASED ON ZONE BASED SCHEME

PREDICTING NUMBER OF HOPS IN THE COOPERATION ZONE BASED ON ZONE BASED SCHEME 44 PREDICTING NUMBER OF HOPS IN THE COOPERATION ZONE BASED ON ZONE BASED SCHEME Ibrahim Saidu a, *,Idawaty Ahmad a,b, Nor Asila Waty Abdul Hamid a,b and Mohammed waziri Yusuf b a Faculty of Computer Science

More information

Level-By-Level Offset Based Wake up Pattern with Hybrid Data Gathering Protocol in a WSN

Level-By-Level Offset Based Wake up Pattern with Hybrid Data Gathering Protocol in a WSN Vol. 2, Special Issue 1, December 20 Level-By-Level Offset Based Wake up Pattern with Hybrid Data Gathering Protocol in a WSN Shilpa Alias 1, Simy M Baby 2 M. Tech Student, Dept. Applied Electronics, Ilahia

More information

International Journal of Scientific & Engineering Research, Volume 6, Issue 3, March ISSN

International Journal of Scientific & Engineering Research, Volume 6, Issue 3, March ISSN International Journal of Scientific & Engineering Research, Volume 6, Issue 3, March-2015 1464 Performance Evaluation of AODV and DSDV Routing Protocols through Clustering in MANETS Prof. A Rama Rao, M

More information

Dynamic Search Technique Used for Improving Passive Source Routing Protocol in Manet

Dynamic Search Technique Used for Improving Passive Source Routing Protocol in Manet African Journal of Basic & Applied Sciences 9 (1): 27-32, 2017 ISSN 2079-2034 IDOSI Publications, 2017 DOI: 10.5829/idosi.ajbas.2017.27.32 Dynamic Search Technique Used for Improving Passive Source Routing

More information

Keywords Mobile Ad hoc Networks, Multi-hop Routing, Infrastructure less, Multicast Routing, Routing.

Keywords Mobile Ad hoc Networks, Multi-hop Routing, Infrastructure less, Multicast Routing, Routing. Volume 4, Issue 7, July 2014 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com A Study on Various

More information

QoS Routing By Ad-Hoc on Demand Vector Routing Protocol for MANET

QoS Routing By Ad-Hoc on Demand Vector Routing Protocol for MANET 2011 International Conference on Information and Network Technology IPCSIT vol.4 (2011) (2011) IACSIT Press, Singapore QoS Routing By Ad-Hoc on Demand Vector Routing Protocol for MANET Ashwini V. Biradar

More information

DATA FORWARDING IN OPPORTUNISTIC NETWORK USING MOBILE TRACES

DATA FORWARDING IN OPPORTUNISTIC NETWORK USING MOBILE TRACES DATA FORWARDING IN OPPORTUNISTIC NETWORK USING MOBILE TRACES B.Poonguzharselvi 1 and V.Vetriselvi 2 1,2 Department of Computer Science and Engineering, College of Engineering Guindy, Anna University Chennai,

More information

Performance Evaluation of Various Routing Protocols in MANET

Performance Evaluation of Various Routing Protocols in MANET 208 Performance Evaluation of Various Routing Protocols in MANET Jaya Jacob 1,V.Seethalakshmi 2 1 II MECS,Sri Shakthi Institute of Science and Technology, Coimbatore, India 2 Associate Professor-ECE, Sri

More information

CROSS LAYER PROTOCOL (APTEEN) USING WSN FOR REAL TIME APPLICATION

CROSS LAYER PROTOCOL (APTEEN) USING WSN FOR REAL TIME APPLICATION CROSS LAYER PROTOCOL (APTEEN) USING WSN FOR REAL TIME APPLICATION V. A. Dahifale 1, N. Y. Siddiqui 2 PG Student, College of Engineering Kopargaon, Maharashtra, India 1 Assistant Professor, College of Engineering

More information

Defending Against Resource Depletion Attacks in Wireless Sensor Networks

Defending Against Resource Depletion Attacks in Wireless Sensor Networks Defending Against Resource Depletion Attacks in Wireless Sensor Networks Cauvery Raju M. Tech, CSE IInd Year, JNNCE, Shimoga Abstract: One of the major challenges wireless sensor networks face today is

More information

Distributed Indexing and Data Dissemination in Large Scale Wireless Sensor Networks

Distributed Indexing and Data Dissemination in Large Scale Wireless Sensor Networks Distributed Indexing and Data Dissemination in Large Scale Wireless Sensor Networks Yiwei Wu Department of Computer Science Georgia State University Email: wyw@cs.gsu.edu Yingshu Li Department of Computer

More information

Blackhole Attack Detection in Wireless Sensor Networks Using Support Vector Machine

Blackhole Attack Detection in Wireless Sensor Networks Using Support Vector Machine International Journal of Wireless Communications, Networking and Mobile Computing 2016; 3(5): 48-52 http://www.aascit.org/journal/wcnmc ISSN: 2381-1137 (Print); ISSN: 2381-1145 (Online) Blackhole Attack

More information

Research Article MFT-MAC: A Duty-Cycle MAC Protocol Using Multiframe Transmission for Wireless Sensor Networks

Research Article MFT-MAC: A Duty-Cycle MAC Protocol Using Multiframe Transmission for Wireless Sensor Networks Distributed Sensor Networks Volume 2013, Article ID 858765, 6 pages http://dx.doi.org/10.1155/2013/858765 Research Article MFT-MAC: A Duty-Cycle MAC Protocol Using Multiframe Transmission for Wireless

More information

Aanchal Walia #1, Pushparaj Pal *2

Aanchal Walia #1, Pushparaj Pal *2 An Implemented approach of VANET using Location Information based Technique for safe city and vehicle Aanchal Walia #1, Pushparaj Pal *2 #1. M.Tech Scholor,ECE,Krukshetra University, *2. A.P.ECE Department,

More information

A Survey on Clustered-Aggregation Routing Techniques in Wireless Sensor Networks

A Survey on Clustered-Aggregation Routing Techniques in Wireless Sensor Networks A Survey on Clustered-Aggregation Routing Techniques in Wireless Sensor Networks Sushma K M, Manjula Devi T H [PG Student], [Associate Professor] Telecommunication Department Dayananda Sagar College of

More information

Time Synchronization in Wireless Sensor Networks: CCTS

Time Synchronization in Wireless Sensor Networks: CCTS Time Synchronization in Wireless Sensor Networks: CCTS 1 Nerin Thomas, 2 Smita C Thomas 1, 2 M.G University, Mount Zion College of Engineering, Pathanamthitta, India Abstract: A time synchronization algorithm

More information

Packet Routing using Optimal Flooding Protocol in Cluster based MANET

Packet Routing using Optimal Flooding Protocol in Cluster based MANET IJSTE - International Journal of Science Technology & Engineering Volume 2 Issue 09 March 2016 ISSN (online): 2349-784X Packet Routing using Optimal Flooding Protocol in Cluster based MANET S.Bavani V.Aiswariya

More information

Performance Analysis of AODV using HTTP traffic under Black Hole Attack in MANET

Performance Analysis of AODV using HTTP traffic under Black Hole Attack in MANET Performance Analysis of AODV using HTTP traffic under Black Hole Attack in MANET Ekta Barkhodia 1, Parulpreet Singh 2, Gurleen Kaur Walia 3 Lovely Professional University, Phagwara, India ektab0@gmail.com,

More information

Performance Evaluation of AODV and DSDV Routing Protocol in wireless sensor network Environment

Performance Evaluation of AODV and DSDV Routing Protocol in wireless sensor network Environment 2012 International Conference on Computer Networks and Communication Systems (CNCS 2012) IPCSIT vol.35(2012) (2012) IACSIT Press, Singapore Performance Evaluation of AODV and DSDV Routing Protocol in wireless

More information

ENERGY SAVING IN WIRELESS SENSOR NETWORK WITH SPIN PROTOCOL

ENERGY SAVING IN WIRELESS SENSOR NETWORK WITH SPIN PROTOCOL ENERGY SAVING IN WIRELESS SENSOR NETWORK WITH SPIN PROTOCOL Kunal M Pattani 1, Palak J Chauhan 2 1 Professor,C.U.Shah College of Engineering and Technology Wadhwan City Gujarat, India. 2 M.E Student, Dept.

More information

Survey on Reliability Control Using CLR Method with Tour Planning Mechanism in WSN

Survey on Reliability Control Using CLR Method with Tour Planning Mechanism in WSN Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 4, Issue. 5, May 2015, pg.854

More information

Intra and Inter Cluster Synchronization Scheme for Cluster Based Sensor Network

Intra and Inter Cluster Synchronization Scheme for Cluster Based Sensor Network Intra and Inter Cluster Synchronization Scheme for Cluster Based Sensor Network V. Shunmuga Sundari 1, N. Mymoon Zuviria 2 1 Student, 2 Asisstant Professor, Computer Science and Engineering, National College

More information

Minimum Overlapping Layers and Its Variant for Prolonging Network Lifetime in PMRC-based Wireless Sensor Networks

Minimum Overlapping Layers and Its Variant for Prolonging Network Lifetime in PMRC-based Wireless Sensor Networks Minimum Overlapping Layers and Its Variant for Prolonging Network Lifetime in PMRC-based Wireless Sensor Networks Qiaoqin Li 12, Mei Yang 1, Hongyan Wang 1, Yingtao Jiang 1, Jiazhi Zeng 2 1 Department

More information

Efficient Routing Algorithm for MANET using Grid FSR

Efficient Routing Algorithm for MANET using Grid FSR 2011 International Conference on Advancements in Information Technology With workshop of ICBMG 2011 IPCSIT vol.20 (2011) (2011) IACSIT Press, Singapore Efficient Routing Algorithm for MANET using Grid

More information

Broadcast algorithms for Active Safety Applications over Vehicular Ad-hoc Networks

Broadcast algorithms for Active Safety Applications over Vehicular Ad-hoc Networks Broadcast algorithms for Active Safety Applications over Vehicular Ad-hoc Networks M.N. Mariyasagayam, M. Lenardi HITACHI Europe, "Le Thélème", 1503 Route des Dolines, 06560 Sophia Antipolis, France Phone:

More information

Performance Evaluations of Data-Centric Information Retrieval Schemes for DTNs

Performance Evaluations of Data-Centric Information Retrieval Schemes for DTNs Computer Networks Vol x, Issue y 1 Performance Evaluations of Data-Centric Information Retrieval Schemes for DTNs P. Yang, Member, IEEE M. Chuah 1, Senior Member, IEEE Abstract Mobile nodes in some challenging

More information

Enhanced Timing-Sync Protocol for Sensor Networks

Enhanced Timing-Sync Protocol for Sensor Networks Enhanced Timing-Sync Protocol for Sensor Networks Shi Kyu Bae Abstract The prominent time synchronization protocol for wireless sensor networks (WSN), Timing-sync Protocol for Sensor Networks (TPSN), was

More information

ROAL: A Randomly Ordered Activation and Layering Protocol for Ensuring K-Coverage in Wireless Sensor Networks

ROAL: A Randomly Ordered Activation and Layering Protocol for Ensuring K-Coverage in Wireless Sensor Networks ROAL: A Randomly Ordered Activation and Layering Protocol for Ensuring K-Coverage in Wireless Sensor Networks Hogil Kim and Eun Jung Kim Department of Computer Science Texas A&M University College Station,

More information

Prianka.P 1, Thenral 2

Prianka.P 1, Thenral 2 An Efficient Routing Protocol design and Optimizing Sensor Coverage Area in Wireless Sensor Networks Prianka.P 1, Thenral 2 Department of Electronics Communication and Engineering, Ganadipathy Tulsi s

More information

Multi-metrics based Congestion Control protocol in Wireless Sensor Network

Multi-metrics based Congestion Control protocol in Wireless Sensor Network e-issn 2455 1392 Volume 2 Issue 5, May 2016 pp. 536 543 Scientific Journal Impact Factor : 3.468 http://www.ijcter.com Multi-metrics based Congestion Control protocol in Wireless Sensor Network Sushma

More information

PERFORMANCE STUDY OF AODV ROUTING PROTOCOL IN MOBILE AD-HOC SENSOR NETWORKS

PERFORMANCE STUDY OF AODV ROUTING PROTOCOL IN MOBILE AD-HOC SENSOR NETWORKS PERFORMANCE STUDY OF AODV ROUTING PROTOCOL IN MOBILE AD-HOC SENSOR NETWORKS 1 MOHAMAD NAZIM JAMBLI, 2 HALIKUL LENANDO, 3 JOHARI ABDULLAH, 4 SINARWATI MOHAMAD SUHAILI 1,2,3 Faculty of Computer Science &

More information

Nodes Energy Conserving Algorithms to prevent Partitioning in Wireless Sensor Networks

Nodes Energy Conserving Algorithms to prevent Partitioning in Wireless Sensor Networks IJCSNS International Journal of Computer Science and Network Security, VOL.17 No.9, September 2017 139 Nodes Energy Conserving Algorithms to prevent Partitioning in Wireless Sensor Networks MINA MAHDAVI

More information

Evaluation of Communication Overheads in Wireless Sensor Networks

Evaluation of Communication Overheads in Wireless Sensor Networks Evaluation of Communication Overheads in Wireless Sensor Networks Shiv Prasad Kori 1, Dr. R. K. Baghel 2 1 Deptt. of ECE, JIJA Mata Govt. Women Polytechnic College, Burhanpur (MP)- INDIA 2 Electronics

More information

A NOVEL CLUSTER BASED WORMHOLE AVOIDANCE ALGORITHM FOR MOBILE AD- HOC NETWORKS

A NOVEL CLUSTER BASED WORMHOLE AVOIDANCE ALGORITHM FOR MOBILE AD- HOC NETWORKS A NOVEL CLUSTER BASED WORMHOLE AVOIDANCE ALGORITHM FOR MOBILE AD- HOC NETWORKS Subhashis Banerjee 1 and Koushik Majumder 2 1 Department of Computer Science & Engineering, West Bengal University of Technology,

More information

Hybrid gateway advertisement scheme for connecting mobile ad hoc networks to the Internet

Hybrid gateway advertisement scheme for connecting mobile ad hoc networks to the Internet * gateway advertisement scheme for connecting mobile ad hoc networks to the Internet Jeongkeun Lee (), Dongkyun Kim (2), J.J.Garcia-Luna-Aceves (3), Yanghee Choi (), Jihyuk Choi (4), Sangwoo Nam (4) ()

More information

A Location-based Directional Route Discovery (LDRD) Protocol in Mobile Ad-hoc Networks

A Location-based Directional Route Discovery (LDRD) Protocol in Mobile Ad-hoc Networks A Location-based Directional Route Discovery (LDRD) Protocol in Mobile Ad-hoc Networks Stephen S. Yau, Wei Gao, and Dazhi Huang Dept. of Computer Science and Engineering Arizona State University Tempe,

More information

Impact of IEEE MAC Packet Size on Performance of Wireless Sensor Networks

Impact of IEEE MAC Packet Size on Performance of Wireless Sensor Networks IOSR Journal of Electronics and Communication Engineering (IOSR-JECE) e-issn: 2278-2834,p- ISSN: 2278-8735.Volume 10, Issue 3, Ver. IV (May - Jun.2015), PP 06-11 www.iosrjournals.org Impact of IEEE 802.11

More information

Real-time and Reliable Video Transport Protocol (RRVTP) for Visual Wireless Sensor Networks (VSNs)

Real-time and Reliable Video Transport Protocol (RRVTP) for Visual Wireless Sensor Networks (VSNs) Real-time and Reliable Video Transport Protocol (RRVTP) for Visual Wireless Sensor Networks (VSNs) Dr. Mohammed Ahmed Abdala, Mustafa Hussein Jabbar College of Information Engineering, Al-Nahrain University,

More information

Reliable Time Synchronization Protocol for Wireless Sensor Networks

Reliable Time Synchronization Protocol for Wireless Sensor Networks Reliable Time Synchronization Protocol for Wireless Sensor Networks Soyoung Hwang and Yunju Baek Department of Computer Science and Engineering Pusan National University, Busan 69-735, South Korea {youngox,yunju}@pnu.edu

More information