A Secure Time Synchronization Protocol for Mobile Underwater Wireless Sensor Network

Size: px
Start display at page:

Download "A Secure Time Synchronization Protocol for Mobile Underwater Wireless Sensor Network"

Transcription

1 A Secure Time Synchronization Protocol for Mobile Underwater Wireless Sensor Network Reshma J Kunnuthara PG Student Dept ECE MBITS,Nellimattom India reshmajkunnuthara@gmail.com Abstract This paper presents a Cluster formation that ensures the security of synchronization under harsh underwater environments. Secure time synchronization is one of the key concerns for Underwater Wireless Sensor Networks (UWSNs). An energy-efficient communication algorithm LEACH, has been introduced which employs a hierarchical clustering done based on information received by the BS. In a clustered based hierarchical network, cluster heads are selected and it can be used to process and send the information while the sensor nodes are used to sense the data. The time synchronization process of Cluster formation include authentication,and intercluster synchronization phase. During the authentication phase, cluster heads are authenticated to beacons and ordinary nodes are authenticated to cluster heads. Intercluster synchronization phases, can be executed concurrently for reducing the number of messages generated in synchronization. This can also reduce synchronization errors as well as the number of synchronization messages than traditional protocols even when the network is attacked by malicious nodes. This algorithm will prolong the network life time by lowering the energy consumption. Index Terms LEACH, Cluster formation, Intercluster synchronization I. INTRODUCTION The largely unexplored vastness of the ocean, covering about two-thirds of the surface of Earth, has fascinated humans for as long as we have records. Its currents, chemical composition, and ecosystems are all highly variable as a function of space and time. Recently, there has been a growing interest in monitoring the marine environment for scientific exploration, commercial exploitation and coastline protection. The ideal vehicle for this type of extensive monitoring is a networked underwater wireless sensor distributed system, referred to as Underwater Wireless Sensor Network (UWSN).However, due to the high attenuation of radio waves in water, acoustic Communication is emerging as the most suitable media. Several characteristics specific to underwater acoustic communications and net working introduce additional design complexity into almost every layer of the network protocol stack. For example, low communication bandwidth, long propagation delays, higher error probability, and sensor node mobility are concerns that must be confronted. To make these application viable, there is a need to enable under water communication among underwater sensor nodes and vehicle must posses self configuration, location and movement information to relay monitored data to relay monitored to an on shore station. A synchronization algorithm for UWSNs must consider additional factors such as long propagation delays from the use of acoustic communication and sensor node mobility.these unique challenges make the accuracy of synchronization procedures for UWSNs even more critical. This Cluster based Time synchronization solutions specifically designed for UWSNs are needed to satisfy these new requirements. UWSNs are often deployed in an inaccessible and hostile environment, those unattended sensor nodes are likely to incur many critical security attacks. Time synchronization attacks have great effects on the set of sensor network applications and services since they heavily rely on accurate time synchronization to perform their neighbor s clocks are at a different time than they actually are. Time synchronization attacks have great effects on a set of sensor network applications and services since they heavily rely on accurate time synchronization to perform their respective functions. Secure time synchronization is one of the key concerns for Underwater Wireless Sensor Networks (UWSNs). This paper presents a Secure Synchronization protocol that ensures the security of synchronization under harsh underwater environments against various attacks. This algorithm distinguishes the propagation delay of downlink from that of uplink caused by node movement in order to improve time synchronization accuracy. This will also help in reducing the number of messages generated in synchronization. This algorithm will

2 help in improving the rate of successful message delivary. This will also help in improving the network life time. The paper is organized as follows. In Section II provides brief background of the existing algorithm and its drawbacks. In Section III shows the proposed algorithm shows simulation results, and in Section IV shows simulation results and in Section V concludes the paper. III. PROPOSED METHOD A. NETWORK TOPOLOGY UWSN is composed of a large number of nodes uniformly scattered in monitoring fields.a underwater sensor network architecture as shown in Fig.1 II. EXISTING ALGORITHMS In the literature, there are various time synchronization protocols for distributed systems like terrestrial radio sensor networks. Mobi-sync: efficient time synchronization for mobile underwater sensor networks [2] a novel time synchronization scheme for mobile underwater sensor networks. Mobi-Sync distinguishes itself from various approaches for terrestrial WSN by considering spatial correlation among the mobility patterns of neighbouring UWSNs nodes. This enables Mobi-Sync to accurately estimate the long dynamic propagation delays. Simulation results show that Mobi-Sync outperforms existing schemes in both accuracy and low propagation delay. Flooding Time Synchronization Protocol (FTSP) [3] is designed for sniper localization. Therefore, it is required to achieve considerably high precision. As FTSP applies a flooding technique, it is robust in regards to network topology changes. The FTSP is not applicable to underwater sensor network mainly because it also assumes instant reception. Additionally, it requires hardware calibration, which is not a completely software solution. Secure Time Synchronization for Wireless Sensor Network [4] this algorithm, shows the need of secure time synchronization, problem related with synchronization, how secure time synchronization can be achieved on sink node with reduced energy consumption, quickness in effective manner. This scheme removes different threats on synchronization and makes system more robust. This provided centralized control in distributed wireless sensor network which reduces complexity of real time application of wireless sensor network. Time Synchronization for Highlatency Networks [TSHL] [5] scheme designed for highlatency networks, and addresses long propagation delays and energy consumption issues. In TSHL, both one- way and two-ways MAC-layer message exchange are employed, where one-way is to estimate the clock skew and two-ways is to calculate the clock offset. Fig.5.1. Underwater sensor network architecture Given a UWSN, the whole network is composed of three types of nodes: beacons, cluster heads, and ordinary nodes. Beacons have unlimited energy resources and perfect timing information. In a clustered based hierarchical wireless sensor network CHs can be used to process and send the information while the sensor nodes are used to sense the The advantage of using the clustering for time synchronization is that CH can prolong the battery life of the individual sensors and also the network lifetime.ch can reduce the rate of energy consumption by scheduling activities in the cluster. Clustering reduce the communication overhead for synchronization. In this regard, they provide the time reference for the sensors positioned underwater. Beacons communicate with cluster heads and ordinary nodes through acoustic links. Each cluster has and only has one cluster head. All ordinary nodes connect to their cluster head via single hop. Fig.1 shows the topology of a UWSN with 8 sensor nodes and one beacon. The beacon is placed on the water surface and is equipped with GPS to obtain UTC time. Each sensor node is assigned a unique identifier (ID). B. Cluster based synchronization protocol Clustering is an effective technique that can greatly contribute to lifetime, and energy efficiency in wireless sensor networks (WSNs). A sensor network can be made scalable by assembling the sensor nodes into groups i.e. clusters. Every cluster has a leader, often referred to as the cluster head (CH). An energy-efficient communication protocol LEACH, has been introduced which employs a hierarchical clustering done based on information received by the BS. The CH collects and aggregates information from

3 sensors in its own cluster and passes on information to the BS. In each round of the cluster formation, network needs to follow the following steps select cluster head transfer the aggregated data. Data is collected at the wireless sensor node, compressed, and transmitted to the BS. Since sensor nodes are energy constrained, it is inefficient for all the sensors to transmit the data directly to the BS. Data generated from neighboring sensors is often redundant and highly correlated. To overcome the issue data aggregation is performed. C. LEACH Algorithm Low Energy Adaptive Clustering Hierarchy (LEACH) is the first hierarchical, self-organizing, adaptive cluster-based routing protocol for wireless sensor networks which partitions the nodes into clusters. The cluster structure update constantly in operation and one updating process is called a round. LEACH is short for low energy adaptive clustering hierarchy. Using cluster-based structure, the protocol localizes data communication within each cluster to reduce the long distance wireless communication and reduce the amount of data transmission; above all, cluster head node is randomly selected in a cyclic manner. The energy load of the whole network is evenly distributed to each sensor node, balancing energy consumption and extending the network lifetime. The topology of LEACH protocol is shown in Fig.2 Fig.2 LEACH protocol LEACH implementation is a cyclical process where each cycle is divided into 1.Set up phase: Initially, when clusters are being created, each node decides whether or not to become a cluster-head for the current round. Choose a node among the eligible nodes to become cluster head but we also make sure that the nodes are separated with a minimum separation distance (if possible) from the other cluster head nodes. In the cluster head selection part, cluster heads are randomly chosen from a list of eligible nodes. To decide which nodes that is eligible, the average energy of the remaining nodes in the network is calculated. In order to spread the load evenly, only nodes with energy above the average energy are eligible. As long as it is possible, or as long as the desired number of cluster heads is not attained, we choose a node among the eligible nodes that is further away than the minimum separation distance from all other chosen cluster heads. If that is not possible, we chose another node among the eligible nodes to become cluster head. When all cluster heads have been chosen and separated, generally with at least the minimum separation distance, clusters are created the same way as in. Each node that has elected itself a cluster-head for the current round broadcasts an advertisement message to the rest of the nodes. For this cluster-head-advertisement phase, the cluster-heads use a CSMA MAC protocol, and all cluster-heads transmit their advertisement using the same transmit energy. The non-cluster-head nodes must keep their receivers on during this phase of set-up to hear the advertisements of all the cluster-head nodes. After this phase is complete, each non-cluster-head node decides the cluster to which it will belong for this round. This decision is based on the received signal strength of the advertisement. This advertisement message ADV containing the CH identifier and the value of the threshold using the protocol CSMA/CA to avoid the collision between the cluster head. As a reply to the ADV message, each node sent a joint message to CH to be its member. The distance between the node and CH is based on the signal strength of received ADV message. Stronger is the signal nearer is the sender node. 2. STEADY STATE PHASE: The process of transferring aggregated data or sensed data from all the sensor nodes to the sink or base station is done under steady state phase. During this phase, nodes in each cluster sends data based on the allocated transmission time to their local cluster heads. To reduce the energy dissipation, the receiver of all non-cluster head nodes would be turned off until the nodes defined allocated time. The duration of the steady state phase is longer than the duration of the set-up phase in order to minimize overhead.to complete the set-up phase, each node send a join-request message after they receive a broadcast from the elected cluster-heads using a nonpersistent CSMA MAC protocol. The cluster-head creates a TDMA as shown in the LEACH flow chart and finally the nodes forming each cluster wait for their schedule before transmission. The steady phase starts immediately after the set-up phase. The cluster-heads gather all data from their

4 respective cluster members and send the respected data to the base station. Fig. 3 shows a flow chart of leach algorithm. Fig. 3 flow chart of leach algorithm The process of cluster formation for a UWSN is described as in the following step-by-step instructions. Step1 Those nodes having energy more than average energy is selected as cluster head. Fig. 4 Execution of Step1of cluster formation Step2.Each cluster head will try to add its neigh boring nodes as ordinary nodes that belong to its cluster in order of their degrees from high to low.if a sensor node happens to be the neigh boring node of multiple cluster heads, it will be assigned to the cluster head with the smallest ID as an ordinary of that cluster. Fig. 5 A scenario after execution of Step2 Step 3. Repeat Step 1 and Step 2 until all sensor nodes have identities of either cluster heads or ordinary nodes. Step 5. Each sensor node performs cluster consistency checking. If it identifies malicious nodes, it removes them from the network and restarts the cluster formation process from Step 1 The cluster for node n u is denoted as C u ; then for each node, n v C v ; node n u C u & n u c v ; if c v = C u, then cluster consistency is satisfied else if there exists a node n w C u such that c w c u is called cluster inconsistency. Here after, all sensor nodes are assigned identities of either cluster heads or ordinary nodes. After cluster consistency checking, the process of cluster formation is completed. An attacker may participate in the process of cluster formation using malicious nodes. These malicious nodes can launch different attacks in order to introduce cluster inconsistency. However, as each sensor node has a unique ID, all unicast messages with other nodes and broadcast messages can be authenticated with public key based digital signatures exchanged between nodes can be authenticated with unique pair-wise keys shared. By such means, the process of cluster formation can be executed securely. D. TIME SYNCHRONIZATION PROTOCOL The time synchronization of CLUSS can be divided into three phases: authentication phase, and intracluster synchronization phase. During the authentication phase, all sensor nodes need to be authenticated to each other. Cluster heads are authenticated to beacons and ordinary nodes are authenticated to cluster heads. During the intercluster synchronization phase, leach protocol uses TDMA algorithm to be utilized over a multi-hop wireless network. Wireless

5 time synchronization is used for many different purposes including location, proximity, energy efficiency, and mobility to name a few. Thus the cluster heads synchronize themselves with beacons. During the intracluster synchronization phase also, ordinary nodes synchronize themselves with cluster heads by using leach algorithm. The basic idea of our synchronization protocol is simple but effective in realizing time synchronization even when the network is attacked by malicious nodes. To the best of our knowledge, this is the first work that describes secure synchronization protocol for underwater wireless sensor networks. Authentication between node After the process of cluster formation, all sensor nodes know ID and nonce information of their neighboring nodes. Attacks to WSNs may come from outsiders or insiders. In cryptographically protected networks, outsiders do not have credentials (e.g., keys or certificates) to show that they are members of the network, whereas insiders do. Insiders may not always be trustworthy, as they may have been compromised, or have stolen their credentials from some legitimate node in the network. The solution we propose here is meant to protect the network from attacks by outsiders only.however, a CH in this architecture needs to use a strong transmission with long-distance radio to communicate directly with the BS. Neighboring sensor nodes in the network can establish secure links and broadcast authentication. Malicious or compromised nodes can be detected and eliminated from the network. The proposed network is designed for incrementally deployed networks, and employs a key chain to validate sensor node certificates at each increment. Identifing malicious node Each sensor is assigned with a unique ID and a secret key before deployment. Both the ID and the key are known to the sink node. Sensor nodes are left unattended after deployment. They monitor events of interests and send the data reports to the sink. When an event happens in the network, it will be detected by multiple sensing nodes. We use a cluster-based multihop routing scheme since recent research showed that clustering techniques are energy efficient. After the process of cluster formation, all sensor nodes know ID and nonce information of their neighboring nodes. The compromised nodes may attempt to provide falsified clock values, which in turn make the clock adjustment deviate from its desired value. Firstly, cluster heads will be authenticated to beacons. Suppose that C is a cluster head with1-hop distance to a beacon B. For the purpose of authentication with the beacon B, the cluster head C generates its secret key SK c and signs its nonce N c with SK C, which then becomes SK c (N c). Moreover, the cluster head also generates a hash value HCB o =H ID C, ID B,N C and signs H C B 0 with SKC, which then becomes SIG SK c (H ID c, ID B,N C ). Both SK c(n C) and SIG SK c(h ID c, ID B,N C ) are sent to the beacon B. On the other hand, the beacon B attempts to decrypt SK c(n C) using C s public key PK C and get the original N C. Furthermore, the beaconb also attempts to de crypt SIG SK c(n C) H ID C, ID B,N C using C s public key PK C and get the original.hcb 0. After that, the beacon B generates a hash value HCB 1 =H ID C, ID B,N C and compares HCB 1 with HCB 0. If HCB 1 matches HCB 0, then the beacon B generates another hash value HBC 0 =H ID B, ID C,N B,N C and signs HBC 0 with its secret key SK B, which then becomes SIG SK B H ID B, ID C,N B,N C ). In addition, the beacon B also signs its nonce N B with SKB, which then becomes SK B(N B). In turn, the beacon B sends SK B(N B) and SIG SK B(H ID B, ID C,N B,N C ) to the cluster head C. After receiving SK B(N B) and SIG SK B(H ID B, ID C,N B,N C ), the cluster head C decrypts them using B s public key PK B and get the original HBC 0 and N B. Moreover, the cluster head C generates a hash value HBC 1=H ID B, ID C,N B,N C and compares HBC 1 with HBC 0. If HBC 1 matches HBC 0, then the authentication is successful; otherwise, the authentication is failed. Likewise, ordinary nodes can be authenticated to cluster heads. After the execution of authentication phase, all neighboring nodes are authenticated with each other and they can communicate with each other securely. Authentication using SHA 256 hash function An n-bit hash is a map from arbitrary length messages to n-bit hash values. An n bit cryptographic hash is an n-bit hash which is one-way1 and collision-resistant. Such functions are important cryptographic primitives used for such things as digital signatures and password protection. Current popular hashes produce hash values of length n = 128(MD4 and MD5) and n = 160 (SHA-1), and therefore can provide no more than 64 or 80 bits of security, respectively, against collision attacks. Since the goal of the new Advanced Encryption Standard (AES) is to, at its three cryp to variable sizes, 128, 192, and 256 bits of security, There is a need for companion hash algorithms which provide similar levels of enhanced security. SHA-256, described, is a 256-bit hash and is meant to provide 128 bits

6 of security against collision attacks.sha-512, is a 512-bit hash, and is meant to provide 256 bits of security against collision attacks. To obtain a 384 bit hash value (192-bits of security) will require truncating the SHA-512 SHA-256 operates in the manner of MD4, MD5, and SHA The message to be hashed is 1) padded with its length in such a way that the result is a multiple of 512 bits long, and then 2) parsed into 512-bit message blocks M(1);M(2);:::;M(N). 3) The message blocks are processed one at a time: Beginning with a Beginning with a initial hash value H(0), sequentially compute H(i) = H(i1) + CM(i)(H(i1)); where C is the SHA-256 compression function and + means word-wise mod 232 addition. H(N) is the hash of M. The SHA-256 compression function operates on a 512- bit message block and a 256- bit intermediate hash value. It is essentially a 256-bit block cipher algorithm which encrypts the intermediate hash value using the message block as key. Hence there are two main components to describe are the SHA-256 compression function, and the SHA-256 message schedule. We will use the following notation: xed initial hash value H(0), sequentially compute H(i) = H(i1) + CM(i)(H(i1)); where C is the SHA-256 compression function and + means word-wise mod 232 addition. Intracluster synchronization phase During the intracluster synchronization phase, ordinary nodes synchronize themselves with cluster heads. During this phase, nodes in each cluster sends data based on the allocated transmission time to their local cluster heads. To reduce the energy dissipation, the receiver of all noncluster head nodes would be turned off until the nodes defined allocated time. After receiving all the data from the nodes, the cluster head aggregates all the data sent from the member nodes into a single signal and transfers it to the base station. The duration of the steady state phase is longer than the duration of the set-up phase in order to minimize overhead. The cluster-heads creates a TDMA schedule by using the LEACH algorithm with respect to global time reference, Beacon. TDMA schedule prevents collision among the data messages and prevents the energy conservation in non cluster-head nodes. The cluster-head node transmit TDMA schedule to all the non cluster-head nodes.the nodes forming each cluster wait for their schedule before transmission. This TDMA schedule will tell each node when it can transmit. Thus the non cluster-head nodes is synchronized with respect to the cluster head. Thus the whole network is get synchronized. E. Merits of Cluster based Synchronization When an existing sensor node leaves the network due to battery outage, if this sensor node is not the cluster head of any cluster, then there is nothing to do. When a new sensor node joins the network, the system will execute the process of cluster formation and assign new cluster heads for the newly formed clusters if needed. Moreover, the network battery life is sufficiently long to avoid recharging or replacing node batteries frequently in harsh underwater environments. Hence, the topology of the network does not change frequently after initial deployment and the cost for cluster maintenance only has a trifling impact on the proposed method in a UWSN. This distinguishes the propagation delay of down- link from that of uplink caused by node movement in order to improve time synchronization accuracy. Moreover, part of these two phases can be executed concurrently for reducing the number of messages generated in synchronization. CLUSS can reduce synchronization errors as well as the number of synchronization messages than traditional protocols even when the network is attacked by malicious node. IV. SIMULATION RESULTS Fig. 4 Simulation result shows CLUSS is a Clusterbased Secure Synchronization protocol. Given a UWSN, the whole network is composed of three types of nodes: beacons, cluster heads, and ordinary nodes. Low Energy Adaptive Clustering Hierarchy (LEACH) proposed is the first hierarchical, self-organizing, adaptive cluster-based routing protocol for wireless sensor networks which partitions the nodes into clusters is used here. LEACH is a hierarchical protocol in which most nodes transmits the data to cluster heads, and the cluster heads aggregate and compress the data and forward it to the base station. Node first senses its target and then sends the relevant information to its cluster-head. Then the cluster head aggregates and compresses the information received from all the nodes and sends it to the base station. By using this algorithm will prolong the network lifetime by lowering the energy consumption. This will also help in improving the packet delay ratio. CLUSS can also reduce synchronization errors as well as the number of synchronization messages than traditional

7 protocols even when the network is attacked by malicious nodes destination nodes to the number of packets sent from the source nodes. The performance is better when packet deliver ratio is high ratio is high. a) mobi-sync:time synchronization b) secure time sync algorithm algorithm Fig. 5 PDR versus Time since sync Fig. 4 Simulation result After the cluster heads are selected, the cluster heads advertise to all sensor nodes in them network that they are the new cluster heads. Then, the other nodes organize themselves into local clusters by choosing the most appropriate cluster head (normally the closest cluster head). During the steady-state phase the cluster heads receive sensed data from cluster members, and transfer the aggregated data to the BS. To complete the set-up phase, each node send a join-request message after they receive a broadcast from the elected cluster-heads using a nonpersistent CSMA MAC protocol. The cluster-head creates a TDMA and finally the nodes forming each cluster wait for their schedule before transmission. The steady phase starts immediately after the set-up phase.the non-cluster-head nodes must keep their receivers on during this phase of setup to hear the advertisements of all the cluster-head nodes. After this phase is complete, each non-cluster-head node decides the cluster to which it will belong for this round. This decision is based on the received signal strength of the advertisement. Performance Evaluation Fig.5 shows a graph of the Packet delivery ratio(pdr) obtained in the proposed secure synchronization algorithm and the existing mobi-sync:time synchronization algorithm. The graph plot the Packet delivery ratio versus time. PDR is the ratio of number of packets received at the Here in the fig.5 (a) times passes packet delivery ratio start increases at 2µs and PDR value is 45 at 6µs. As the packet delivery ratio is high so here is a better performance. In fig. 5 (b) times passes packet delivery ratio start increases at the beginig itself and the value of PDR ratio is 70 at 3.5µs itself. Thus from the graph it is clear that PDR is better in the proposed method than the existing method. so this approach has a better performance.. Fig.6 shows a graph of the network life time obtained in the proposed secure synchronization algorithm with the existing mobi-sync:time synchronization algorithm. The graph plot the network life time versus number of nodes. Network lifetime can alternatively be defined as the time until the first node dies. Network lifetime is the time span from the deployment to the instant when the network is considered non functional. Lifetime is expressed in terms of seconds in this paper and for a single node it can be evaluated by the following equation: L=einitial/etotal where e initial is initial energy of a sensor node, e total is total energy spent in the process of data transmission. Thus from the graph it is clear that network life time is better in the proposed method than the existing method. so this approach will prolong the network life time

8 REFERENCES [1] I.F. Akyildiz, D. Pompili, and T. Melodia, Underwater Acoustic Sensor Networks: Research Challenges, Ad Hoc Networks, vol. 3, no. 3, pp , Mar G. P. R [2] J. Liu, Z. Zhou, Z. Peng, and J.-H. Cui, Mobi-sync: efficient time synchronization for mobile underwater sensor networks, in Proceedings of the 4th ACM international Workshop on Underwater Networks, pp. 1 5, a)mobi-sync:time synchronization b) Secure time sync algorithm algorithm Fig.6. Network life time versus number of nodes Here in the fig 6.(a) shows that as the number of node in the network is 30 the network life time is decreased to In fig.6(b) shows that as the number of node in the network is 30 the network life time is only decreased upto Thus from the graph it is clear that network life time is better in the proposed method than the existing method. so this approach will prolong the network life time. V. CONCLUSION This paper proposed a paper proposed a Clusterbased Synchronization protocol that ensures the security of synchronization under harsh underwater environments against various attacks CLUSS distinguishes the propagation delay of down- link from that of uplink caused by node movement in order to improve time synchronization accuracy. Moreover, part of these two phases can be executed concurrently for reducing the number of messages generated in synchronization. The Cluster-based Synchronization protocol can reduce synchronization errors as well as the number of synchronization messages than traditional protocols even when the network is attacked by malicious nodes. In future work, we will investigate the influence of MAC layer activities to the performance of time synchronization protocols, such as packet loss and retransmission. Moreover, we will analysis the adaptability of our protocol and evaluate its performance through real ocean experiments. [3] M. Mar oti, B. Kusy, G. Simon, and A. L edeczi, The flooding time synchronization protocol, in Proceedings of the 2nd International Conference on Embedded Networked Sensor Systems (SenSys 04), pp , November [4] A. S. Uluagac, R. A. Beyah, and J. A. Copeland, Secure sourcebased loose synchronization (SOBAS) for wireless sensor networks, IEEE Transactions on Parallel and Distributed Systems, vol. 24, no. 4, pp , [5] A. A. Syed and J. Heidemann, Time synchronization for high latency acoustic networks, in Proceedings of the 25th IEEE International Conference on Computer Communications (INFOCOM 06), pp. 1 6, April [6] N. Chirdchoo, W.-S. Soh, and K.C. Chua, Mu-Sync: A Time Synchronization Protocol for Underwater Mobile Networks, Proc. Third ACM Int l Workshop Underwater Networks (WuWNet 08), Sept [7] R. B. Manjula and S. M. Sunilkumar, Issues in underwater acoustic sensor networks, International Journal of Computer and Electrical Engineering, vol. 3, no. 1, pp

Time Synchronization in Wireless Sensor Networks: CCTS

Time Synchronization in Wireless Sensor Networks: CCTS Time Synchronization in Wireless Sensor Networks: CCTS 1 Nerin Thomas, 2 Smita C Thomas 1, 2 M.G University, Mount Zion College of Engineering, Pathanamthitta, India Abstract: A time synchronization algorithm

More information

WSN Routing Protocols

WSN Routing Protocols WSN Routing Protocols 1 Routing Challenges and Design Issues in WSNs 2 Overview The design of routing protocols in WSNs is influenced by many challenging factors. These factors must be overcome before

More information

A Survey on Underwater Sensor Network Architecture and Protocols

A Survey on Underwater Sensor Network Architecture and Protocols A Survey on Underwater Sensor Network Architecture and Protocols Rakesh V S 4 th SEM M.Tech, Department of Computer Science MVJ College of Engineering Bangalore, India raki.rakesh102@gmail.com Srimathi

More information

SCH-BASED LEACH ALGORITHM TO ENHANCE THE NETWORK LIFE TIME IN WIRELESS SENSOR NETWORK (WSN)

SCH-BASED LEACH ALGORITHM TO ENHANCE THE NETWORK LIFE TIME IN WIRELESS SENSOR NETWORK (WSN) SCH-BASED LEACH ALGORITHM TO ENHANCE THE NETWORK LIFE TIME IN WIRELESS SENSOR NETWORK (WSN) Md. Nadeem Enam 1, Arun Kumar Bag 2 1 M.tech Student, 2 Assistant.Prof, Department of ECE, Bengal Institute of

More information

Summary of Energy-Efficient Communication Protocol for Wireless Microsensor Networks

Summary of Energy-Efficient Communication Protocol for Wireless Microsensor Networks Summary of Energy-Efficient Communication Protocol for Wireless Microsensor Networks Juhana Yrjölä, Tik 58673B, jayrjola@cc.hut.fi 13th March 2005 Abstract Conventional routing protocols may not be optimal

More information

Review on an Underwater Acoustic Networks

Review on an Underwater Acoustic Networks Review on an Underwater Acoustic Networks Amanpreet Singh Mann Lovely Professional University Phagwara, Punjab Reena Aggarwal Lovely Professional University Phagwara, Punjab Abstract: For the enhancement

More information

An Energy-Efficient Hierarchical Routing for Wireless Sensor Networks

An Energy-Efficient Hierarchical Routing for Wireless Sensor Networks Volume 2 Issue 9, 213, ISSN-2319-756 (Online) An Energy-Efficient Hierarchical Routing for Wireless Sensor Networks Nishi Sharma Rajasthan Technical University Kota, India Abstract: The popularity of Wireless

More information

Fig. 2: Architecture of sensor node

Fig. 2: Architecture of sensor node Volume 4, Issue 11, November 2014 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com To Reduce

More information

Analysis of Cluster-Based Energy-Dynamic Routing Protocols in WSN

Analysis of Cluster-Based Energy-Dynamic Routing Protocols in WSN Analysis of Cluster-Based Energy-Dynamic Routing Protocols in WSN Mr. V. Narsing Rao 1, Dr.K.Bhargavi 2 1,2 Asst. Professor in CSE Dept., Sphoorthy Engineering College, Hyderabad Abstract- Wireless Sensor

More information

Impact of Black Hole and Sink Hole Attacks on Routing Protocols for WSN

Impact of Black Hole and Sink Hole Attacks on Routing Protocols for WSN Impact of Black Hole and Sink Hole Attacks on Routing Protocols for WSN Padmalaya Nayak V. Bhavani B. Lavanya ABSTRACT With the drastic growth of Internet and VLSI design, applications of WSNs are increasing

More information

Prianka.P 1, Thenral 2

Prianka.P 1, Thenral 2 An Efficient Routing Protocol design and Optimizing Sensor Coverage Area in Wireless Sensor Networks Prianka.P 1, Thenral 2 Department of Electronics Communication and Engineering, Ganadipathy Tulsi s

More information

Wireless Sensor Networks: Clustering, Routing, Localization, Time Synchronization

Wireless Sensor Networks: Clustering, Routing, Localization, Time Synchronization Wireless Sensor Networks: Clustering, Routing, Localization, Time Synchronization Maurizio Bocca, M.Sc. Control Engineering Research Group Automation and Systems Technology Department maurizio.bocca@tkk.fi

More information

Intra and Inter Cluster Synchronization Scheme for Cluster Based Sensor Network

Intra and Inter Cluster Synchronization Scheme for Cluster Based Sensor Network Intra and Inter Cluster Synchronization Scheme for Cluster Based Sensor Network V. Shunmuga Sundari 1, N. Mymoon Zuviria 2 1 Student, 2 Asisstant Professor, Computer Science and Engineering, National College

More information

A Modified LEACH Protocol for Increasing Lifetime of the Wireless Sensor Network

A Modified LEACH Protocol for Increasing Lifetime of the Wireless Sensor Network BULGARIAN ACADEMY OF SCIENCES CYBERNETICS AND INFORMATION TECHNOLOGIES Volume 16, No 3 Sofia 2016 Print ISSN: 1311-9702; Online ISSN: 1314-4081 DOI: 10.1515/cait-2016-0040 A Modified LEACH Protocol for

More information

Mobile Agent Driven Time Synchronized Energy Efficient WSN

Mobile Agent Driven Time Synchronized Energy Efficient WSN Mobile Agent Driven Time Synchronized Energy Efficient WSN Sharanu 1, Padmapriya Patil 2 1 M.Tech, Department of Electronics and Communication Engineering, Poojya Doddappa Appa College of Engineering,

More information

Performance Comparison of Energy Efficient Clustering Protocol in Heterogeneous Wireless Sensor Network

Performance Comparison of Energy Efficient Clustering Protocol in Heterogeneous Wireless Sensor Network Performance Comparison of Energy Efficient Clustering Protocol in Heterogeneous Wireless Sensor Network Priyanka.B.Patil 1 Student,Department of Electronics &Telecommunication D.Y. Patil College of Engineering

More information

An Adaptive Self-Organization Protocol for Wireless Sensor Networks

An Adaptive Self-Organization Protocol for Wireless Sensor Networks An Adaptive Self-Organization Protocol for Wireless Sensor Networks Kil-Woong Jang 1 and Byung-Soon Kim 2 1 Dept. of Mathematical and Information Science, Korea Maritime University 1 YeongDo-Gu Dongsam-Dong,

More information

ROUTING ALGORITHMS Part 2: Data centric and hierarchical protocols

ROUTING ALGORITHMS Part 2: Data centric and hierarchical protocols ROUTING ALGORITHMS Part 2: Data centric and hierarchical protocols 1 Negative Reinforcement Time out Explicitly degrade the path by re-sending interest with lower data rate. Source Gradient New Data Path

More information

International Journal of Advanced Research in Computer Science and Software Engineering

International Journal of Advanced Research in Computer Science and Software Engineering Volume 3, Issue 2, February 2013 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Analysis of

More information

Energy Efficiency and Latency Improving In Wireless Sensor Networks

Energy Efficiency and Latency Improving In Wireless Sensor Networks Energy Efficiency and Latency Improving In Wireless Sensor Networks Vivekchandran K. C 1, Nikesh Narayan.P 2 1 PG Scholar, Department of Computer Science & Engineering, Malabar Institute of Technology,

More information

A REVIEW ON LEACH-BASED HIERARCHICAL ROUTING PROTOCOLS IN WIRELESS SENSOR NETWORK

A REVIEW ON LEACH-BASED HIERARCHICAL ROUTING PROTOCOLS IN WIRELESS SENSOR NETWORK A REVIEW ON LEACH-BASED HIERARCHICAL ROUTING PROTOCOLS IN WIRELESS SENSOR NETWORK Md. Nadeem Enam 1, Ozair Ahmad 2 1 Department of ECE, Maulana Azad College of Engineering & Technology, Patna, (India)

More information

CROSS LAYER PROTOCOL (APTEEN) USING WSN FOR REAL TIME APPLICATION

CROSS LAYER PROTOCOL (APTEEN) USING WSN FOR REAL TIME APPLICATION CROSS LAYER PROTOCOL (APTEEN) USING WSN FOR REAL TIME APPLICATION V. A. Dahifale 1, N. Y. Siddiqui 2 PG Student, College of Engineering Kopargaon, Maharashtra, India 1 Assistant Professor, College of Engineering

More information

Novel Cluster Based Routing Protocol in Wireless Sensor Networks

Novel Cluster Based Routing Protocol in Wireless Sensor Networks ISSN (Online): 1694-0784 ISSN (Print): 1694-0814 32 Novel Cluster Based Routing Protocol in Wireless Sensor Networks Bager Zarei 1, Mohammad Zeynali 2 and Vahid Majid Nezhad 3 1 Department of Computer

More information

ISSN: ISO 9001:2008 Certified International Journal of Engineering and Innovative Technology (IJEIT) Volume 3, Issue 10, April 2014

ISSN: ISO 9001:2008 Certified International Journal of Engineering and Innovative Technology (IJEIT) Volume 3, Issue 10, April 2014 Two Way User Authentication Using Biometric Based Scheme for Wireless Sensor Networks Srikanth S P (Assistant professor, CSE Department, MVJCE, Bangalore) Deepika S Haliyal (PG Student, CSE Department,

More information

A Survey on Clustered-Aggregation Routing Techniques in Wireless Sensor Networks

A Survey on Clustered-Aggregation Routing Techniques in Wireless Sensor Networks A Survey on Clustered-Aggregation Routing Techniques in Wireless Sensor Networks Sushma K M, Manjula Devi T H [PG Student], [Associate Professor] Telecommunication Department Dayananda Sagar College of

More information

Energy-Efficient Communication Protocol for Wireless Micro-sensor Networks

Energy-Efficient Communication Protocol for Wireless Micro-sensor Networks Energy-Efficient Communication Protocol for Wireless Micro-sensor Networks Paper by: Wendi Rabiner Heinzelman, Anantha Chandrakasan, and Hari Balakrishnan Outline Brief Introduction on Wireless Sensor

More information

Figure 1. Clustering in MANET.

Figure 1. Clustering in MANET. Volume 6, Issue 12, December 2016 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Performance

More information

Efficient Hybrid Multicast Routing Protocol for Ad-Hoc Wireless Networks

Efficient Hybrid Multicast Routing Protocol for Ad-Hoc Wireless Networks Efficient Hybrid Multicast Routing Protocol for Ad-Hoc Wireless Networks Jayanta Biswas and Mukti Barai and S. K. Nandy CAD Lab, Indian Institute of Science Bangalore, 56, India {jayanta@cadl, mbarai@cadl,

More information

Maximizing the Lifetime of Clustered Wireless Sensor Network VIA Cooperative Communication

Maximizing the Lifetime of Clustered Wireless Sensor Network VIA Cooperative Communication Vol., Issue.3, May-June 0 pp--7 ISSN: - Maximizing the Lifetime of Clustered Wireless Sensor Network VIA Cooperative Communication J. Divakaran, S. ilango sambasivan Pg student, Sri Shakthi Institute of

More information

A Review Paper On The Performance Analysis Of LMPC & MPC For Energy Efficient In Underwater Sensor Networks

A Review Paper On The Performance Analysis Of LMPC & MPC For Energy Efficient In Underwater Sensor Networks www.ijecs.in International Journal Of Engineering And Computer Science ISSN:2319-7242 Volume 4 Issue 5 May 2015, Page No. 12171-12175 A Review Paper On The Performance Analysis Of LMPC & MPC For Energy

More information

Analysis of Cluster based Routing Algorithms in Wireless Sensor Networks using NS2 simulator

Analysis of Cluster based Routing Algorithms in Wireless Sensor Networks using NS2 simulator Analysis of Cluster based Routing Algorithms in Wireless Sensor Networks using NS2 simulator Ashika R. Naik Department of Electronics & Tele-communication, Goa College of Engineering (India) ABSTRACT Wireless

More information

Enhanced Timing-Sync Protocol for Sensor Networks

Enhanced Timing-Sync Protocol for Sensor Networks Enhanced Timing-Sync Protocol for Sensor Networks Shi Kyu Bae Abstract The prominent time synchronization protocol for wireless sensor networks (WSN), Timing-sync Protocol for Sensor Networks (TPSN), was

More information

Reliable Time Synchronization Protocol for Wireless Sensor Networks

Reliable Time Synchronization Protocol for Wireless Sensor Networks Reliable Time Synchronization Protocol for Wireless Sensor Networks Soyoung Hwang and Yunju Baek Department of Computer Science and Engineering Pusan National University, Busan 69-735, South Korea {youngox,yunju}@pnu.edu

More information

An Optimized Time Synchronization Algorithm for Mobile Submarine Sensor

An Optimized Time Synchronization Algorithm for Mobile Submarine Sensor IJCTA, 9(12), 2016, pp. 5727-5731 International Science Press 5727 An Optimized Time Synchronization Algorithm for Mobile Submarine Sensor Networ orks *L. Sivagami **J.Martin Leo Manickam, Member, IEEE

More information

Low Energy Adaptive Clustering Hierarchy based routing Protocols Comparison for Wireless Sensor Networks

Low Energy Adaptive Clustering Hierarchy based routing Protocols Comparison for Wireless Sensor Networks IOSR Journal of Computer Engineering (IOSR-JCE) e-issn: 2278-0661,p-ISSN: 2278-8727, Volume 16, Issue 6, Ver. II (Nov Dec. 2014), PP 56-61 Low Energy Adaptive Clustering Hierarchy based routing Protocols

More information

An Algorithm for Dynamic SDN Controller in Data Centre Networks

An Algorithm for Dynamic SDN Controller in Data Centre Networks IOSR Journal of Engineering (IOSRJEN) ISSN (e): 2250-3021, ISSN (p): 2278-8719 PP 04-08 www.iosrjen.org An Algorithm for Dynamic SDN Controller in Data Centre Networks Nirmala 1, Oliveruth 2, Varun 3 1

More information

Hierarchical Routing Algorithm to Improve the Performance of Wireless Sensor Network

Hierarchical Routing Algorithm to Improve the Performance of Wireless Sensor Network Hierarchical Routing Algorithm to Improve the Performance of Wireless Sensor Network Deepthi G B 1 Mrs. Netravati U M 2 P G Scholar (Digital Electronics), Assistant Professor Department of ECE Department

More information

Webpage: Volume 3, Issue III, March 2015 ISSN

Webpage:   Volume 3, Issue III, March 2015 ISSN A Survey on Hierarchical Routing Protocols for Wireless Sensor Networks Suparti Koul 1, Kiran Narang 2 1 M.Tech student Department of Computer Science and Engineering Hindu college of Engineering, Sonipat,

More information

A Survey On: Cluster Based Routing Protocols in Wireless Sensor Network

A Survey On: Cluster Based Routing Protocols in Wireless Sensor Network A Survey On: Cluster Based Routing Protocols in Wireless Sensor Network Sunil Kumar Patel 1, Dr. Ravi Kant Kapoor 2 P.G. Scholar, Department of Computer Engineering and Applications, NITTTR, Bhopal, MP,

More information

AN EFFICIENT MAC PROTOCOL FOR SUPPORTING QOS IN WIRELESS SENSOR NETWORKS

AN EFFICIENT MAC PROTOCOL FOR SUPPORTING QOS IN WIRELESS SENSOR NETWORKS AN EFFICIENT MAC PROTOCOL FOR SUPPORTING QOS IN WIRELESS SENSOR NETWORKS YINGHUI QIU School of Electrical and Electronic Engineering, North China Electric Power University, Beijing, 102206, China ABSTRACT

More information

Fault tolerant Multi Cluster head Data Aggregation Protocol in WSN (FMCDA)

Fault tolerant Multi Cluster head Data Aggregation Protocol in WSN (FMCDA) Fault tolerant Multi Cluster head Data Aggregation Protocol in WSN (FMCDA) Sushruta Mishra 1, Lambodar Jena 2, Alok Chakrabarty 3, Jyotirmayee Choudhury 4 Department of Computer Science & Engineering 1,

More information

Clustering Based Routing Protocols for Wireless Sensor Networks: A Survey

Clustering Based Routing Protocols for Wireless Sensor Networks: A Survey International Journal of Scientific and Research Publications, Volume 4, Issue 11, November 2014 1 Clustering Based Routing Protocols for Wireless Sensor Networks: A Survey Vivek pandiya raj *, B.Gunasundari

More information

FUZZY LOGIC APPROACH TO IMPROVING STABLE ELECTION PROTOCOL FOR CLUSTERED HETEROGENEOUS WIRELESS SENSOR NETWORKS

FUZZY LOGIC APPROACH TO IMPROVING STABLE ELECTION PROTOCOL FOR CLUSTERED HETEROGENEOUS WIRELESS SENSOR NETWORKS 3 st July 23. Vol. 53 No.3 25-23 JATIT & LLS. All rights reserved. ISSN: 992-8645 www.jatit.org E-ISSN: 87-395 FUZZY LOGIC APPROACH TO IMPROVING STABLE ELECTION PROTOCOL FOR CLUSTERED HETEROGENEOUS WIRELESS

More information

CHAPTER 5 PROPAGATION DELAY

CHAPTER 5 PROPAGATION DELAY 98 CHAPTER 5 PROPAGATION DELAY Underwater wireless sensor networks deployed of sensor nodes with sensing, forwarding and processing abilities that operate in underwater. In this environment brought challenges,

More information

CSMA based Medium Access Control for Wireless Sensor Network

CSMA based Medium Access Control for Wireless Sensor Network CSMA based Medium Access Control for Wireless Sensor Network H. Hoang, Halmstad University Abstract Wireless sensor networks bring many challenges on implementation of Medium Access Control protocols because

More information

Energy Conservation through Sleep Scheduling in Wireless Sensor Network 1. Sneha M. Patil, Archana B. Kanwade 2

Energy Conservation through Sleep Scheduling in Wireless Sensor Network 1. Sneha M. Patil, Archana B. Kanwade 2 Energy Conservation through Sleep Scheduling in Wireless Sensor Network 1. Sneha M. Patil, Archana B. Kanwade 2 1 Student Department of Electronics & Telecommunication, SITS, Savitribai Phule Pune University,

More information

Review on Packet Forwarding using AOMDV and LEACH Algorithm for Wireless Networks

Review on Packet Forwarding using AOMDV and LEACH Algorithm for Wireless Networks RESEARCH ARTICLE OPEN ACCESS Review on Packet Forwarding using AOMDV and LEACH Algorithm for Wireless Networks Mrs. P. V. Meghare 1, Prof. P. A. Deshmukh 2 1 Department of Computer Science, Nagpur University,

More information

Node Discovery and Localization Protocol for Mobile Underwater Sensor Networks

Node Discovery and Localization Protocol for Mobile Underwater Sensor Networks Node Discovery and Localization Protocol for Mobile Underwater Sensor Networks # Swathi Lakum 1 M.Tech, Computer Science Engineering, lakumswathi@gmail.com # Prasad Goranthala 2, Assoc. Professor, Department

More information

Rab Nawaz Jadoon DCS. Assistant Professor. Department of Computer Science. COMSATS Institute of Information Technology. Mobile Communication

Rab Nawaz Jadoon DCS. Assistant Professor. Department of Computer Science. COMSATS Institute of Information Technology. Mobile Communication Rab Nawaz Jadoon DCS Assistant Professor COMSATS IIT, Abbottabad Pakistan COMSATS Institute of Information Technology Mobile Communication WSN Wireless sensor networks consist of large number of sensor

More information

Time Synchronization in Wireless Networks

Time Synchronization in Wireless Networks Page 1 of 13 Time Synchronization in Wireless Networks Author: Michael Roche tke961@gmail.com Abstract: Time Synchronization in wireless networks is extremely important for basic communication, but it

More information

Abstract. Figure 1. Typical Mobile Sensor Node IJERTV2IS70270

Abstract. Figure 1. Typical Mobile Sensor Node IJERTV2IS70270 Base Station Assisted Routing Protocol For Wireless Sensor Network Vaibhav Pratap Singh and Harish Kumar Gurgaon Institute of Technology and Management (GITM), Gurgaon (Haryana), INDIA Abstract A wireless

More information

Distributed clustering algorithms for data-gathering in wireless mobile sensor networks

Distributed clustering algorithms for data-gathering in wireless mobile sensor networks J. Parallel Distrib. Comput. 67 (2007) 1187 1200 www.elsevier.com/locate/jpdc Distributed clustering algorithms for data-gathering in wireless mobile sensor networks Chuan-Ming Liu a,, Chuan-Hsiu Lee a,

More information

An Enhanced Aloha based Medium Access Control Protocol for Underwater Sensor Networks

An Enhanced Aloha based Medium Access Control Protocol for Underwater Sensor Networks An Enhanced Aloha based Medium Access Control Protocol for Underwater Sensor Networks Abdul Gaffar. H 1, a and P.Venkata Krishna 2,b 1 School of Computer Science and Engineering, VIT University, Vellore,

More information

Mobile Sink to Track Multiple Targets in Wireless Visual Sensor Networks

Mobile Sink to Track Multiple Targets in Wireless Visual Sensor Networks Mobile Sink to Track Multiple Targets in Wireless Visual Sensor Networks William Shaw 1, Yifeng He 1, and Ivan Lee 1,2 1 Department of Electrical and Computer Engineering, Ryerson University, Toronto,

More information

ISSN: X International Journal of Advanced Research in Electronics and Communication Engineering (IJARECE) Volume 6, Issue 1, January 2017

ISSN: X International Journal of Advanced Research in Electronics and Communication Engineering (IJARECE) Volume 6, Issue 1, January 2017 Energy Efficient Hierarchical Clustering Algorithm for Heterogeneous Wireless Sensor Networks Ritu Department of Electronics and Communication Engineering Guru Nanak Institute of Technology Mullana (Ambala),

More information

Energy-Efficient Cluster Formation Techniques: A Survey

Energy-Efficient Cluster Formation Techniques: A Survey Energy-Efficient Cluster Formation Techniques: A Survey Jigisha Patel 1, Achyut Sakadasariya 2 P.G. Student, Dept. of Computer Engineering, C.G.P.I.T, Uka Tarasadia University, Bardoli, Gujarat, India

More information

Z-SEP: Zonal-Stable Election Protocol for Wireless Sensor Networks

Z-SEP: Zonal-Stable Election Protocol for Wireless Sensor Networks Z-SEP: Zonal-Stable Election Protocol for Wireless Sensor Networks S. Faisal 1, N. Javaid 1, A. Javaid 2, M. A. Khan 1, S. H. Bouk 1, Z. A. Khan 3 1 COMSATS Institute of Information Technology, Islamabad,

More information

CVLEACH: Coverage based energy efficient LEACH algorithm

CVLEACH: Coverage based energy efficient LEACH algorithm CVLEACH: Coverage based energy efficient LEACH algorithm 1 Prof Ankit Thakkar and 2 Dr K Kotecha 1 Assistant Professor, CSE Department, Institute of Technology, Nirma University Ahmedabad, Gujarat 382

More information

End-To-End Delay Optimization in Wireless Sensor Network (WSN)

End-To-End Delay Optimization in Wireless Sensor Network (WSN) Shweta K. Kanhere 1, Mahesh Goudar 2, Vijay M. Wadhai 3 1,2 Dept. of Electronics Engineering Maharashtra Academy of Engineering, Alandi (D), Pune, India 3 MITCOE Pune, India E-mail: shweta.kanhere@gmail.com,

More information

Energy Consumption Estimation in Cluster based Underwater Wireless Sensor Networks Using M/M/1 Queuing Model

Energy Consumption Estimation in Cluster based Underwater Wireless Sensor Networks Using M/M/1 Queuing Model Energy Consumption Estimation in Cluster based Underwater Wireless Sensor Networks Using M/M/1 Queuing Model Manijeh Keshtgary Reza Mohammadi Mohammad Mahmoudi Mohammad Reza Mansouri ABSTRACT Underwater

More information

COMPARISON OF ENERGY EFFICIENT DATA TRANSMISSION APPROACHES FOR FLAT WIRELESS SENSOR NETWORKS

COMPARISON OF ENERGY EFFICIENT DATA TRANSMISSION APPROACHES FOR FLAT WIRELESS SENSOR NETWORKS COMPARISON OF ENERGY EFFICIENT DATA TRANSMISSION APPROACHES FOR FLAT WIRELESS SENSOR NETWORKS Saraswati Mishra 1 and Prabhjot Kaur 2 Department of Electrical, Electronics and Communication Engineering,

More information

Impact of IEEE MAC Packet Size on Performance of Wireless Sensor Networks

Impact of IEEE MAC Packet Size on Performance of Wireless Sensor Networks IOSR Journal of Electronics and Communication Engineering (IOSR-JECE) e-issn: 2278-2834,p- ISSN: 2278-8735.Volume 10, Issue 3, Ver. IV (May - Jun.2015), PP 06-11 www.iosrjournals.org Impact of IEEE 802.11

More information

An Efficient Data-Centric Routing Approach for Wireless Sensor Networks using Edrina

An Efficient Data-Centric Routing Approach for Wireless Sensor Networks using Edrina An Efficient Data-Centric Routing Approach for Wireless Sensor Networks using Edrina Rajasekaran 1, Rashmi 2 1 Asst. Professor, Department of Electronics and Communication, St. Joseph College of Engineering,

More information

Geographical Routing Algorithms In Asynchronous Wireless Sensor Network

Geographical Routing Algorithms In Asynchronous Wireless Sensor Network Geographical Routing Algorithms In Asynchronous Wireless Sensor Network Vaishali.S.K, N.G.Palan Electronics and telecommunication, Cummins College of engineering for women Karvenagar, Pune, India Abstract-

More information

Underwater Acoustic Networks

Underwater Acoustic Networks International Journal of Scientific & Engineering Research Volume 2, Issue 7, July-2011 1 Underwater Acoustic Networks G.Divya, Varshitha Prakash Abstract With the advances in acoustic modem technology

More information

AN EFFICIENT MAC PROTOCOL BASED ON HYBRID SUPERFRAME FOR WIRELESS SENSOR NETWORKS

AN EFFICIENT MAC PROTOCOL BASED ON HYBRID SUPERFRAME FOR WIRELESS SENSOR NETWORKS AN EFFICIENT MAC PROTOCOL BASED ON HYBRID SUPERFRAME FOR WIRELESS SENSOR NETWORKS Ge Ma and Dongyu Qiu Department of Electrical and Computer Engineering Concordia University, Montreal, QC, Canada tina0702@gmail.com,

More information

ROUTING ALGORITHMS Part 1: Data centric and hierarchical protocols

ROUTING ALGORITHMS Part 1: Data centric and hierarchical protocols ROUTING ALGORITHMS Part 1: Data centric and hierarchical protocols 1 Why can t we use conventional routing algorithms here?? A sensor node does not have an identity (address) Content based and data centric

More information

Catching BlackHole Attacks in Wireless Sensor Networks

Catching BlackHole Attacks in Wireless Sensor Networks Catching BlackHole Attacks in Wireless Sensor Networks Ashish M 1 and Mr. Jason Martis 2 1 M. Tech, Department Of ISE, NMAM Institute of Technology, Nitte 2 Asst. Prof, Department Of ISE, NMAM Institute

More information

IMPROVING THE DATA COLLECTION RATE IN WIRELESS SENSOR NETWORKS BY USING THE MOBILE RELAYS

IMPROVING THE DATA COLLECTION RATE IN WIRELESS SENSOR NETWORKS BY USING THE MOBILE RELAYS IMPROVING THE DATA COLLECTION RATE IN WIRELESS SENSOR NETWORKS BY USING THE MOBILE RELAYS 1 K MADHURI, 2 J.KRISHNA, 3 C.SIVABALAJI II M.Tech CSE, AITS, Asst Professor CSE, AITS, Asst Professor CSE, NIST

More information

IMPROVING WIRELESS SENSOR NETWORK LIFESPAN THROUGH ENERGY EFFICIENT ALGORITHMS

IMPROVING WIRELESS SENSOR NETWORK LIFESPAN THROUGH ENERGY EFFICIENT ALGORITHMS IMPROVING WIRELESS SENSOR NETWORK LIFESPAN THROUGH ENERGY EFFICIENT ALGORITHMS 1 M.KARPAGAM, 2 DR.N.NAGARAJAN, 3 K.VIJAIPRIYA 1 Department of ECE, Assistant Professor, SKCET, Coimbatore, TamilNadu, India

More information

An Improved Approach in Clustering Algorithm for Load Balancing in Wireless Sensor Networks

An Improved Approach in Clustering Algorithm for Load Balancing in Wireless Sensor Networks An Improved Approach in Clustering Algorithm for Load Balancing in Wireless Sensor Networks 1 J S Rauthan 1, S Mishra 2 Department of Computer Science & Engineering, B T Kumaon Institute of Technology,

More information

ALL ABOUT DATA AGGREGATION IN WIRELESS SENSOR NETWORKS

ALL ABOUT DATA AGGREGATION IN WIRELESS SENSOR NETWORKS e-issn 2455 1392 Volume 1 Issue 1, November 2015 pp. 1-7 http://www.ijcter.com ALL ABOUT DATA AGGREGATION IN WIRELESS SENSOR NETWORKS Komal Shah 1, Heena Sheth 2 1,2 M. S. University, Baroda Abstract--

More information

Dynamic Minimal Spanning Tree Routing Protocol for Large Wireless Sensor Networks

Dynamic Minimal Spanning Tree Routing Protocol for Large Wireless Sensor Networks Dynamic Minimal Spanning Tree Routing Protocol for Large Wireless Sensor Networks Guangyan Huang 1, Xiaowei Li 1, and Jing He 1 Advanced Test Technology Lab., Institute of Computing Technology, Chinese

More information

Energy Consumption for Cluster Based Wireless Routing Protocols in Sensor Networks

Energy Consumption for Cluster Based Wireless Routing Protocols in Sensor Networks Energy Consumption for Cluster Based Wireless Routing Protocols in Sensor Networks 1 J.Daniel Mano, 2 Dr.S.Sathappan 1 Ph.D Research Scholar, 2 Associate Professor 1 Department of Computer Science 1 Erode

More information

The Impact of Clustering on the Average Path Length in Wireless Sensor Networks

The Impact of Clustering on the Average Path Length in Wireless Sensor Networks The Impact of Clustering on the Average Path Length in Wireless Sensor Networks Azrina Abd Aziz Y. Ahmet Şekercioğlu Department of Electrical and Computer Systems Engineering, Monash University, Australia

More information

Dalimir Orfanus (IFI UiO + ABB CRC), , Cyber Physical Systems Clustering in Wireless Sensor Networks 2 nd part : Examples

Dalimir Orfanus (IFI UiO + ABB CRC), , Cyber Physical Systems Clustering in Wireless Sensor Networks 2 nd part : Examples Dalimir Orfanus (IFI UiO + ABB CRC), 27.10.2011, Cyber Physical Systems Clustering in Wireless Sensor Networks 2 nd part : Examples Clustering in Wireless Sensor Networks Agenda LEACH Energy efficient

More information

Fault Tolerant, Energy Saving Method for Reliable Information Propagation in Sensor Network

Fault Tolerant, Energy Saving Method for Reliable Information Propagation in Sensor Network Fault Tolerant, Energy Saving Method for Reliable Information Propagation in Sensor Network P.S Patheja, Akhilesh Waoo & Parul Shrivastava Dept.of Computer Science and Engineering, B.I.S.T, Anand Nagar,

More information

Multi-Hop Clustering Protocol using Gateway Nodes in Wireless Sensor Network

Multi-Hop Clustering Protocol using Gateway Nodes in Wireless Sensor Network Multi-Hop Clustering Protocol using Gateway Nodes in Wireless Sensor Network S. Taruna 1, Rekha Kumawat 2, G.N.Purohit 3 1 Banasthali University, Jaipur, Rajasthan staruna71@yahoo.com 2 Banasthali University,

More information

(EBHCR) Energy Balancing and Hierarchical Clustering Based Routing algorithm for Wireless Sensor Networks

(EBHCR) Energy Balancing and Hierarchical Clustering Based Routing algorithm for Wireless Sensor Networks Australian Journal of Basic and Applied Sciences, 5(9): 1376-1380, 2011 ISSN 1991-8178 (EBHCR) Energy Balancing and Hierarchical Clustering Based Routing algorithm for Wireless Sensor Networks 1 Roghaiyeh

More information

Energy Enhanced Base Station Controlled Dynamic Clustering Protocol for Wireless Sensor Networks

Energy Enhanced Base Station Controlled Dynamic Clustering Protocol for Wireless Sensor Networks Journal of Advances in Computer Networks, Vol. 1, No. 1, March 213 Energy Enhanced Base Station Controlled Dynamic Clustering Protocol for Wireless Sensor Networks K. Padmanabhan and P. Kamalakkannan consume

More information

WIRELESS SENSOR NETWORK S LIFE TIME ENHANCEMENT WITH AID OF DATA FUSION, LEACH-C AND SPREADING TECHNIQUES

WIRELESS SENSOR NETWORK S LIFE TIME ENHANCEMENT WITH AID OF DATA FUSION, LEACH-C AND SPREADING TECHNIQUES I J I T E ISSN: 2229-7367 3(-2), 202, pp. 375-380 WIRELESS SENSOR NETWORK S LIFE TIME ENHANCEMENT WITH AID OF DATA FUSION, LEACH-C AND SPREADING TECHNIQUES NAGARAJAN M. & GEETHA T. 2 Programmer, Department

More information

An Energy-efficient Distributed Self-organized Clustering Based Splitting and Merging in Wireless Sensor Networks

An Energy-efficient Distributed Self-organized Clustering Based Splitting and Merging in Wireless Sensor Networks RESEARCH ARTICLE OPEN ACCESS An Energy-efficient Distributed Self-organized Clustering Based Splitting and Merging in Wireless Sensor Networks Mrs.J.Monisha, PG scholar, Mrs.M.MuthuSelvi, Assistant Professor,

More information

WSN NETWORK ARCHITECTURES AND PROTOCOL STACK

WSN NETWORK ARCHITECTURES AND PROTOCOL STACK WSN NETWORK ARCHITECTURES AND PROTOCOL STACK Sensing is a technique used to gather information about a physical object or process, including the occurrence of events (i.e., changes in state such as a drop

More information

A Survey on Energy Efficient Hierarchical (Leach) Clustering Algorithms in Wireless Sensor Network

A Survey on Energy Efficient Hierarchical (Leach) Clustering Algorithms in Wireless Sensor Network A Survey on Energy Efficient Hierarchical (Leach) Clustering Algorithms in Wireless Sensor Network M.Usha 1, Dr.N.Sankarram 2 Dept of CSE, Velammal Engineering College. Chennai, India 1 Dept of CSE, RMK

More information

HIERARCHICAL ROUTING PROTOCOLS IN WIRELESS SENSOR NETWORK

HIERARCHICAL ROUTING PROTOCOLS IN WIRELESS SENSOR NETWORK International Journal of Information Technology and Knowledge Management January June 2009, Volume 2, No. 1, pp. 97-101 HIERARCHICAL ROUTING PROTOCOLS IN WIRELESS SENSOR NETWORK Dinesh Anand * & Sanjay

More information

Implementation of Energy Efficient Clustering Using Firefly Algorithm in Wireless Sensor Networks

Implementation of Energy Efficient Clustering Using Firefly Algorithm in Wireless Sensor Networks 014 1 st International Congress on Computer, Electronics, Electrical, and Communication Engineering (ICCEECE014) IPCSIT vol. 59 (014) (014) IACSIT Press, Singapore DOI: 10.7763/IPCSIT.014.V59.1 Implementation

More information

Ameliorate Threshold Distributed Energy Efficient Clustering Algorithm for Heterogeneous Wireless Sensor Networks

Ameliorate Threshold Distributed Energy Efficient Clustering Algorithm for Heterogeneous Wireless Sensor Networks Vol. 5, No. 5, 214 Ameliorate Threshold Distributed Energy Efficient Clustering Algorithm for Heterogeneous Wireless Sensor Networks MOSTAFA BAGHOURI SAAD CHAKKOR ABDERRAHMANE HAJRAOUI Abstract Ameliorating

More information

Keywords Wireless Sensor Network, Cluster, Energy Efficiency, Heterogeneous network, Cluster, Gateway

Keywords Wireless Sensor Network, Cluster, Energy Efficiency, Heterogeneous network, Cluster, Gateway Energy Efficient (EEC) Clustered rotocol for Heterogeneous Wireless Sensor Network Surender Kumar Manish rateek Bharat Bhushan Department of Computer Engg Department of Computer Engg Department of Computer

More information

LEACH and PGASIS Protocols in wireless sensor network: Study and Simulation

LEACH and PGASIS Protocols in wireless sensor network: Study and Simulation Available online www.ejaet.com European Journal of Advances in Engineering and Technology, 2018, 5(10): 810-814 Research Article ISSN: 2394-658X LEACH and PGASIS Protocols in wireless sensor network: Study

More information

Integrated Routing and Query Processing in Wireless Sensor Networks

Integrated Routing and Query Processing in Wireless Sensor Networks Integrated Routing and Query Processing in Wireless Sensor Networks T.Krishnakumar Lecturer, Nandha Engineering College, Erode krishnakumarbtech@gmail.com ABSTRACT Wireless Sensor Networks are considered

More information

K-SEP: A more stable SEP using K-Means Clustering and Probabilistic Transmission in WSN

K-SEP: A more stable SEP using K-Means Clustering and Probabilistic Transmission in WSN Research Article International Journal of Current Engineering and Technology E-ISSN 2277 4106, P-ISSN 2347-5161 2014 INPRESSCO, All Rights Reserved Available at http://inpressco.com/category/ijcet K-SEP:

More information

Experimental Demonstration of Super-TDMA: A MAC Protocol Exploiting Large Propagation Delays in Underwater Acoustic Networks

Experimental Demonstration of Super-TDMA: A MAC Protocol Exploiting Large Propagation Delays in Underwater Acoustic Networks Experimental Demonstration of Super-TDMA: A MAC Protocol Exploiting Large Propagation Delays in Underwater Acoustic Networks Prasad Anjangi and Mandar Chitre Department of Electrical & Computer Engineering,

More information

Introduction to Mobile Ad hoc Networks (MANETs)

Introduction to Mobile Ad hoc Networks (MANETs) Introduction to Mobile Ad hoc Networks (MANETs) 1 Overview of Ad hoc Network Communication between various devices makes it possible to provide unique and innovative services. Although this inter-device

More information

SMITE: A Stochastic Compressive Data Collection. Sensor Networks

SMITE: A Stochastic Compressive Data Collection. Sensor Networks SMITE: A Stochastic Compressive Data Collection Protocol for Mobile Wireless Sensor Networks Longjiang Guo, Raheem Beyah, and Yingshu Li Department of Computer Science, Georgia State University, USA Data

More information

IMPROVEMENT OF LEACH AND ITS VARIANTS IN WIRELESS SENSOR NETWORK

IMPROVEMENT OF LEACH AND ITS VARIANTS IN WIRELESS SENSOR NETWORK International Journal of Computer Engineering & Technology (IJCET) Volume 7, Issue 3, May-June 2016, pp. 99 107, Article ID: IJCET_07_03_009 Available online at http://www.iaeme.com/ijcet/issues.asp?jtype=ijcet&vtype=7&itype=3

More information

An Enhanced General Self-Organized Tree-Based Energy- Balance Routing Protocol (EGSTEB) for Wireless Sensor Network

An Enhanced General Self-Organized Tree-Based Energy- Balance Routing Protocol (EGSTEB) for Wireless Sensor Network www.ijecs.in International Journal Of Engineering And Computer Science ISSN: 239-7242 Volume 4 Issue 8 Aug 205, Page No. 3640-3643 An Enhanced General Self-Organized Tree-Based Energy- Balance Routing

More information

IMPACT OF LEADER SELECTION STRATEGIES ON THE PEGASIS DATA GATHERING PROTOCOL FOR WIRELESS SENSOR NETWORKS

IMPACT OF LEADER SELECTION STRATEGIES ON THE PEGASIS DATA GATHERING PROTOCOL FOR WIRELESS SENSOR NETWORKS IMPACT OF LEADER SELECTION STRATEGIES ON THE PEGASIS DATA GATHERING PROTOCOL FOR WIRELESS SENSOR NETWORKS Indu Shukla, Natarajan Meghanathan Jackson State University, Jackson MS, USA indu.shukla@jsums.edu,

More information

AN ENERGY EFFICIENT AND RELIABLE TWO TIER ROUTING PROTOCOL FOR TOPOLOGY CONTROL IN WIRELESS SENSOR NETWORKS

AN ENERGY EFFICIENT AND RELIABLE TWO TIER ROUTING PROTOCOL FOR TOPOLOGY CONTROL IN WIRELESS SENSOR NETWORKS AN ENERGY EFFICIENT AND RELIABLE TWO TIER ROUTING PROTOCOL FOR TOPOLOGY CONTROL IN WIRELESS SENSOR NETWORKS Shivakumar A B 1, Rashmi K R 2, Ananda Babu J. 3 1,2 M.Tech (CSE) Scholar, 3 CSE, Assistant Professor,

More information

The Flooding Time Synchronization Protocol

The Flooding Time Synchronization Protocol The Flooding Time Synchronization Protocol Miklos Maroti, Branislav Kusy, Gyula Simon and Akos Ledeczi Vanderbilt University Contributions Better understanding of the uncertainties of radio message delivery

More information

State-Based Synchronization Protocol in Sensor Networks

State-Based Synchronization Protocol in Sensor Networks State-Based Synchronization Protocol in Sensor Networks Shang-Chih Hsu Wei Yen 1 1 Department of Computer Science and Engineering, Tatung University, Taipei, Taiwan, ROC shanzihsu@yahoo.com.tw, wyen@ttu.edu.tw

More information