Distributed Mobility Management for Target Tracking in Mobile Sensor Networks by

Size: px
Start display at page:

Download "Distributed Mobility Management for Target Tracking in Mobile Sensor Networks by"

Transcription

1 Ad Hoc Networks Seminar WS 08/09 Computer Networks and Telematics University of Freiburg Distributed Mobility Management for Target Tracking in Mobile Sensor Networks by Y. Zou, IEEE Member,, and K. Chakrabarty, IEEE Senior Member in IEEE Transactions on Mobile Computing, August Final Presentation - Presenter: Salek Talangi Freiburg,

2 Agenda Introduction General MANET Characteristics Difference between Mobile Ad Hoc and Mobile Sensor Networks Purpose of presented work Algorithm and simplifications Results of simulation My opinion and questions Salek Talangi - Distributed Mobility Management for Target Tracking in Mobile Sensor Networks 2

3 Authors Yi Zou Studied in China and Singapore PhD from Duke University, Durham NC Now research associate at Duke University Krishnendu Chakrabarty Studied in India and USA PhD from University of Michigan, MI Now professor at Duke University Salek Talangi - Distributed Mobility Management for Target Tracking in Mobile Sensor Networks 3

4 General MANET Characteristics Members joining and leaving the network. No base station. Difficult to create scheme for handover. No dedicated routers. Communication connectivity is weak. Salek Talangi - Distributed Mobility Management for Target Tracking in Mobile Sensor Networks 4

5 Difference between Mobile Ad Hoc and Sensor Networks MANET: random movement Mobile Senor Network: purposeful movement Salek Talangi - Distributed Mobility Management for Target Tracking in Mobile Sensor Networks 5

6 Purpose Creation of an algorithm that estimates the consequences of node movement. as result: Autonomous decision of a node if it should move. that suits to the general MANET Characteristics and needs as few communication as possible. Salek Talangi - Distributed Mobility Management for Target Tracking in Mobile Sensor Networks 6

7 Consequences of Movement Positive but also Negative Salek Talangi - Distributed Mobility Management for Target Tracking in Mobile Sensor Networks 7

8 Consequences of Movement Following changes S/N Communication connectivity Surveillance area Remaining power Salek Talangi - Distributed Mobility Management for Target Tracking in Mobile Sensor Networks 8

9 Processing possibilities One centralized processing node (cluster head) Changing cluster heads Local sensor integration Local sensor integration + onehop neighborhood Salek Talangi - Distributed Mobility Management for Target Tracking in Mobile Sensor Networks 9

10 Algorithm Aim: S/N improvement at minimal costs. Prerequisite: Data about one-hop neighborhood present in all nodes. Salek Talangi - Distributed Mobility Management for Target Tracking in Mobile Sensor Networks 10

11 Algorithm (simplified) (1) Predict possible sensor results for all possible new sensor positions (also from one-hop network). (2) Treat them as true results. (3) Calculate which movement of which node gives best results. (4) If processing node is the best node to move, move to computed position. Salek Talangi - Distributed Mobility Management for Target Tracking in Mobile Sensor Networks 11

12 Algorithm Algorithm is executed locally in every node sensing a target. Best results refers to positive and negative consequences of movement. Movement decision problem becomes a problem of selecting the best sensor (which is researched in prior work). Salek Talangi - Distributed Mobility Management for Target Tracking in Mobile Sensor Networks 12

13 Simplifications Constant speed. Small sampling intervals. Candidate locations defined by a grid. Nodes move iff a target is detected. Nodes move always successful. Salek Talangi - Distributed Mobility Management for Target Tracking in Mobile Sensor Networks 13

14 Simplifications (cont.) Only one-hop neighborhood. Neighbor nodes don't change. Nodes have neighbor data (no protocol for exchange). Only a few costs are considered. Salek Talangi - Distributed Mobility Management for Target Tracking in Mobile Sensor Networks 14

15 Advantages No communication required at decision time. No overhead for communication (HELLO messages are sent anyway). Almost no energy consumption for communication. Only knowledge about one-hop neighborhood required. Salek Talangi - Distributed Mobility Management for Target Tracking in Mobile Sensor Networks 15

16 Problems Number of needed calculations increases with neighborhood. Not all sensing nodes in onehop neighborhood. Salek Talangi - Distributed Mobility Management for Target Tracking in Mobile Sensor Networks 16

17 Application Tested with MatLab with 20 identical nodes deployed at random Sensing: 9m radius Communication: 18m radius 20m x 20m grid Speed 1m/s, Sampling interval 1s Salek Talangi - Distributed Mobility Management for Target Tracking in Mobile Sensor Networks 17

18 Application results Comparisons with other methods show better results towards selected criteria. Methods compared in simulation: Static Sensor Networks (tracking results). Random Mobile Sensor Network (tracking results). Centralized implementation of MSN (energy consumption). Salek Talangi - Distributed Mobility Management for Target Tracking in Mobile Sensor Networks 18

19 My demurs Chosen simulation values seem weird. Energy consumption for communication not that important. Calculations done multiple times at different nodes. No information on how nodes know their position. No information on data exchange. Only one target considered. Salek Talangi - Distributed Mobility Management for Target Tracking in Mobile Sensor Networks 19

20 Questions?!?????????????? Salek Talangi - Distributed Mobility Management for Target Tracking in Mobile Sensor Networks 20

21 Thank you for your attention

Detection of Attacks on Application and Routing Layer in Tactical MANETs

Detection of Attacks on Application and Routing Layer in Tactical MANETs communication systems group Detection of Attacks on Application and Routing Layer in Tactical MANETs Elmar Gerhards-Padilla, Nils Aschenbruck 1 Structure Mobile Ad-hoc Network (MANET) Tactical MANET Reference

More information

International Journal of Computer & Organization Trends Volume 5 Issue 1 Jan to Feb 2015

International Journal of Computer & Organization Trends Volume 5 Issue 1 Jan to Feb 2015 Introducing Autonomous Car Methodology in WSN Promita Maitra 1, Sohini Nandi 2, Ipsita Saha 3, Poojarini Mitra 4, Sayani Chandra 5 1 Student, Dept. of Computer Science and Engineering, Gurunanak Institute

More information

MultiHop Routing for Delay Minimization in WSN

MultiHop Routing for Delay Minimization in WSN MultiHop Routing for Delay Minimization in WSN Sandeep Chaurasia, Saima Khan, Sudesh Gupta Abstract Wireless sensor network, consists of sensor nodes in capacity of hundred or thousand, which deployed

More information

A Security Management Scheme Using a Novel Computational Reputation Model for Wireless and Mobile Ad hoc Networks

A Security Management Scheme Using a Novel Computational Reputation Model for Wireless and Mobile Ad hoc Networks 5th ACM Workshop on Performance Evaluation of Wireless Ad Hoc, Sensor, and Ubiquitous Networks (PE-WASUN) A Security Management Scheme Using a Novel Computational Reputation Model for Wireless and Mobile

More information

Kapitel 5: Mobile Ad Hoc Networks. Characteristics. Applications of Ad Hoc Networks. Wireless Communication. Wireless communication networks types

Kapitel 5: Mobile Ad Hoc Networks. Characteristics. Applications of Ad Hoc Networks. Wireless Communication. Wireless communication networks types Kapitel 5: Mobile Ad Hoc Networks Mobilkommunikation 2 WS 08/09 Wireless Communication Wireless communication networks types Infrastructure-based networks Infrastructureless networks Ad hoc networks Prof.

More information

Rab Nawaz Jadoon DCS. Assistant Professor. Department of Computer Science. COMSATS Institute of Information Technology. Mobile Communication

Rab Nawaz Jadoon DCS. Assistant Professor. Department of Computer Science. COMSATS Institute of Information Technology. Mobile Communication Rab Nawaz Jadoon DCS Assistant Professor COMSATS IIT, Abbottabad Pakistan COMSATS Institute of Information Technology Mobile Communication WSN Wireless sensor networks consist of large number of sensor

More information

Part I. Wireless Communication

Part I. Wireless Communication 1 Part I. Wireless Communication 1.5 Topologies of cellular and ad-hoc networks 2 Introduction Cellular telephony has forever changed the way people communicate with one another. Cellular networks enable

More information

Clustering Based Certificate Revocation Scheme for Malicious Nodes in MANET

Clustering Based Certificate Revocation Scheme for Malicious Nodes in MANET International Journal of Scientific and Research Publications, Volume 3, Issue 5, May 2013 1 Clustering Based Certificate Revocation Scheme for Malicious Nodes in MANET Ms.T.R.Panke * M.B.E.S.College of

More information

Mobile Ad-hoc and Sensor Networks Lesson 04 Mobile Ad-hoc Network (MANET) Routing Algorithms Part 1

Mobile Ad-hoc and Sensor Networks Lesson 04 Mobile Ad-hoc Network (MANET) Routing Algorithms Part 1 Mobile Ad-hoc and Sensor Networks Lesson 04 Mobile Ad-hoc Network (MANET) Routing Algorithms Part 1 Oxford University Press 2007. All rights reserved. 1 Ad-hoc networks deployment For routing, target detection,

More information

Effective Cluster Based Certificate Revocation with Vindication Capability in MANETS Project Report

Effective Cluster Based Certificate Revocation with Vindication Capability in MANETS Project Report Effective Cluster Based Certificate Revocation with Vindication Capability in MANETS Project Report Mandadapu Sravya M.Tech, Department of CSE, G. Narayanamma Institute of Technology and Science. Ch.Mandakini

More information

DISTANCE BASED CLUSTER FORMATION FOR ENHANCING THE NETWORK LIFE TIME IN MANETS

DISTANCE BASED CLUSTER FORMATION FOR ENHANCING THE NETWORK LIFE TIME IN MANETS International Research Journal of Engineering and Technology (IRJET) e-issn: 2395-56 DISTANCE BASED CLUSTER FORMATION FOR ENHANCING THE NETWORK LIFE TIME IN MANETS Haftom Gebrehiwet Kidanu 1, Prof. Pallam

More information

Sensor Deployment, Self- Organization, And Localization. Model of Sensor Nodes. Model of Sensor Nodes. WiSe

Sensor Deployment, Self- Organization, And Localization. Model of Sensor Nodes. Model of Sensor Nodes. WiSe Sensor Deployment, Self- Organization, And Localization Material taken from Sensor Network Operations by Shashi Phoa, Thomas La Porta and Christopher Griffin, John Wiley, 2007 5/20/2008 WiSeLab@WMU; www.cs.wmich.edu/wise

More information

The General Analysis of Proactive Protocols DSDV, FSR and WRP

The General Analysis of Proactive Protocols DSDV, FSR and WRP Volume 116 No. 10 2017, 375-380 ISSN: 1311-8080 (printed version); ISSN: 1314-3395 (on-line version) url: http://www.ijpam.eu ijpam.eu The General Analysis of Proactive Protocols DSDV, FSR and WRP 1 Dr.

More information

Estimation of Network Partition Problem in Mobile Ad hoc Network

Estimation of Network Partition Problem in Mobile Ad hoc Network Estimation of Network Partition Problem in Mobile Ad hoc Network Varaprasad Golla B.M.S.College of Engineering Bangalore, India varaprasad555555@yahoo.co.in ABSTRACT: A node cannot communicate with others

More information

Efficient Message Caching Scheme for MANET

Efficient Message Caching Scheme for MANET Efficient Message Caching Scheme for MANET S. Manju 1, Mrs. K. Vanitha, M.E., (Ph.D) 2 II ME (CSE), Dept. of CSE, Al-Ameen Engineering College, Erode, Tamil Nadu, India 1 Assistant Professor, Dept. of

More information

6367(Print), ISSN (Online) Volume 4, Issue 2, March April (2013), IAEME & TECHNOLOGY (IJCET)

6367(Print), ISSN (Online) Volume 4, Issue 2, March April (2013), IAEME & TECHNOLOGY (IJCET) INTERNATIONAL International Journal of Computer JOURNAL Engineering OF COMPUTER and Technology ENGINEERING (IJCET), ISSN 0976- & TECHNOLOGY (IJCET) ISSN 0976 6367(Print) ISSN 0976 6375(Online) Volume 4,

More information

GATEWAY MULTIPOINT RELAYS AN MPR-BASED BROADCAST ALGORITHM FOR AD HOC NETWORKS. Ou Liang, Y. Ahmet Şekercioğlu, Nallasamy Mani

GATEWAY MULTIPOINT RELAYS AN MPR-BASED BROADCAST ALGORITHM FOR AD HOC NETWORKS. Ou Liang, Y. Ahmet Şekercioğlu, Nallasamy Mani GATEWAY MULTIPOINT RELAYS AN MPR-BASED BROADCAST ALGORITHM FOR AD HOC NETWORKS Ou Liang, Y. Ahmet Şekercioğlu, Nallasamy Mani Centre for Telecommunication and Information Engineering Monash University,

More information

CLUSTER BASED ROUTING PROTOCOL FOR WIRELESS SENSOR NETWORKS

CLUSTER BASED ROUTING PROTOCOL FOR WIRELESS SENSOR NETWORKS CLUSTER BASED ROUTING PROTOCOL FOR WIRELESS SENSOR NETWORKS M.SASIKUMAR 1 Assistant Professor, Dept. of Applied Mathematics and Computational Sciences, PSG College of Technology, Coimbatore, Tamilnadu,

More information

Design and Implementation of Topology Adaptive Distributed Clustering Protocol for MANET

Design and Implementation of Topology Adaptive Distributed Clustering Protocol for MANET International Journal of Engineering and Advanced Technology (IJEAT) ISSN: 2249 8958, Volume-6 Issue-6, August 2017 Design and Implementation of Topology Adaptive Distributed Clustering Protocol for MANET

More information

A Comparative and Performance Study of On Demand Multicast Routing Protocols for Ad Hoc Networks

A Comparative and Performance Study of On Demand Multicast Routing Protocols for Ad Hoc Networks A Comparative and Performance Study of On Demand Multicast Routing Protocols for Ad Hoc Networks P.Madhan Mohan #, J.James Johnson #, K.Murugan $ and V.Ramachandran % # Under Graduate Student $ Senior

More information

Dalimir Orfanus (IFI UiO + ABB CRC), , Cyber Physical Systems Clustering in Wireless Sensor Networks 2 nd part : Examples

Dalimir Orfanus (IFI UiO + ABB CRC), , Cyber Physical Systems Clustering in Wireless Sensor Networks 2 nd part : Examples Dalimir Orfanus (IFI UiO + ABB CRC), 27.10.2011, Cyber Physical Systems Clustering in Wireless Sensor Networks 2 nd part : Examples Clustering in Wireless Sensor Networks Agenda LEACH Energy efficient

More information

Pervasive and Mobile Computing. Improved sensor network lifetime with multiple mobile sinks

Pervasive and Mobile Computing. Improved sensor network lifetime with multiple mobile sinks Pervasive and Mobile Computing 5 (2009) 542 555 Contents lists available at ScienceDirect Pervasive and Mobile Computing journal homepage: www.elsevier.com/locate/pmc Fast track article Improved sensor

More information

Routing Protocols in MANETs

Routing Protocols in MANETs Chapter 4 Routing Protocols in MANETs 4.1 Introduction The main aim of any Ad Hoc network routing protocol is to meet the challenges of the dynamically changing topology and establish a correct and an

More information

MPBCA: Mobility Prediction Based Clustering Algorithm for MANET

MPBCA: Mobility Prediction Based Clustering Algorithm for MANET MPBCA: Mobility Prediction Based Clustering Algorithm for MANET Rani.V.G Associate Professor Research and Development Center Bharathiar University Coimbatore, India ranikhans@gmail.com Dr.M.Punithavalli

More information

A Comprehensive Review of Distance and Density Based Cluster Head Selection Schemes

A Comprehensive Review of Distance and Density Based Cluster Head Selection Schemes Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology ISSN 2320 088X IJCSMC, Vol. 3, Issue.

More information

Content. 1. Introduction. 2. The Ad-hoc On-Demand Distance Vector Algorithm. 3. Simulation and Results. 4. Future Work. 5.

Content. 1. Introduction. 2. The Ad-hoc On-Demand Distance Vector Algorithm. 3. Simulation and Results. 4. Future Work. 5. Rahem Abri Content 1. Introduction 2. The Ad-hoc On-Demand Distance Vector Algorithm Path Discovery Reverse Path Setup Forward Path Setup Route Table Management Path Management Local Connectivity Management

More information

International Journal of Advanced Engineering Research and Science (IJAERS) [Vol-1, Issue-2, July 2014] ISSN:

International Journal of Advanced Engineering Research and Science (IJAERS) [Vol-1, Issue-2, July 2014] ISSN: Cluster Based Id Revocation with Vindication Capability for Wireless Network S. Janani Devi* *Assistant Professor, ECE, A.S.L.Pauls College of Engineering and Technology, Tamilnadu, India ABSTRACT: The

More information

DBSCAN APLLY In Weighted Clustering Algorithm

DBSCAN APLLY In Weighted Clustering Algorithm DBSCAN APLLY In Weighted Clustering Algorithm for MANET Manju Vishwakarma Research Scholar, Department of Computer Science and Engineering, Bhilai Institute of Technology, Durg, India. Partha Roy Associate

More information

Epidemic Routing for Partially-Connected Ad Hoc Networks

Epidemic Routing for Partially-Connected Ad Hoc Networks Epidemic Routing for Partially-Connected Ad Hoc Networks Presented By- Kannan Chandrasekaran MS Computer Science, EECS, University of Kansas, Lawrence. Email: kannanc@ku.edu Amin Vahdat and David Becker,

More information

COMPARATIVE PERFORMANCE ANALYSIS OF TEEN SEP LEACH ERP EAMMH AND PEGASIS ROUTING PROTOCOLS

COMPARATIVE PERFORMANCE ANALYSIS OF TEEN SEP LEACH ERP EAMMH AND PEGASIS ROUTING PROTOCOLS COMPARATIVE PERFORMANCE ANALYSIS OF TEEN SEP LEACH ERP EAMMH AND PEGASIS ROUTING PROTOCOLS Neha Jain 1, Manasvi Mannan 2 1 Research Scholar, Electronics and Communication Engineering, Punjab College Of

More information

Wireless Sensor Networks (WSN) Tanyar Pooyeh Intelligent Robotics - winter semester 2013/14 Nov 11, 2013

Wireless Sensor Networks (WSN) Tanyar Pooyeh Intelligent Robotics - winter semester 2013/14 Nov 11, 2013 Wireless Sensor Networks (WSN) Tanyar Pooyeh 2pooyeh@informatik.uni-hamburg.de Intelligent Robotics - winter semester 2013/14 Nov 11, 2013 Outline Multi-hop Wireless Networks MANETs, VANETs, WSNs Routing

More information

Energy Efficient Data Gathering For Throughput Maximization with Multicast Protocol In Wireless Sensor Networks

Energy Efficient Data Gathering For Throughput Maximization with Multicast Protocol In Wireless Sensor Networks Energy Efficient Data Gathering For Throughput Maximization with Multicast Protocol In Wireless Sensor Networks S. Gokilarani 1, P. B. Pankajavalli 2 1 Research Scholar, Kongu Arts and Science College,

More information

OA-DVFA: A Distributed Virtual Forces-based Algorithm to Monitor an Area with Unknown Obstacles

OA-DVFA: A Distributed Virtual Forces-based Algorithm to Monitor an Area with Unknown Obstacles OA-DVFA: A Distributed Virtual Forces-based Algorithm to Monitor an Area with Unknown Obstacles Ines Khoufi, Pascale Minet, Anis Laouiti To cite this version: Ines Khoufi, Pascale Minet, Anis Laouiti.

More information

Presentation Structure

Presentation Structure Trust management issues for ad hoc and self-organized networks Vassileios Tsetsos, Giannis F. Marias and Sarantis Paskalis esec / P-Comp / CNL Research Groups and Labs Dept. of Informatics and Telecommunications,

More information

Data gathering using mobile agents for reducing traffic in dense mobile wireless sensor networks

Data gathering using mobile agents for reducing traffic in dense mobile wireless sensor networks Mobile Information Systems 9 (23) 295 34 295 DOI.3233/MIS-364 IOS Press Data gathering using mobile agents for reducing traffic in dense mobile wireless sensor networks Keisuke Goto, Yuya Sasaki, Takahiro

More information

White Paper. Mobile Ad hoc Networking (MANET) with AODV. Revision 1.0

White Paper. Mobile Ad hoc Networking (MANET) with AODV. Revision 1.0 White Paper Mobile Ad hoc Networking (MANET) with AODV Revision 1.0 This page is intentionally blank, or rather nearly blank. Table of Contents TABLE OF CONTENTS...3 TABLE OF FIGURES...4 WHAT IS MANET?...5

More information

Security of Mobile Ad Hoc and Wireless Sensor Networks

Security of Mobile Ad Hoc and Wireless Sensor Networks Security of Mobile Ad Hoc and Wireless Sensor Networks July, 2013 Edward Bonver LA Board Member Symantec Corporation edward@owasp.org Copyright The Foundation Permission is granted to copy, distribute

More information

The Research of Long-Chain Wireless Sensor Network Based on 6LoWPAN

The Research of Long-Chain Wireless Sensor Network Based on 6LoWPAN 2017 5th International Conference on Enterprise Systems The Research of Long-Chain Wireless Sensor Network Based on 6LoWPAN Weilan Lin linweilan@gz.sia.cn Shuangfei Zi zishuangfei@gz.sia.cn Zhiyi Fan Department

More information

An improved protocol for Energy efficient communication in Wireless Sensor Network

An improved protocol for Energy efficient communication in Wireless Sensor Network International Journal of Scientific Research Engineering & Technology (IJSRET), ISSN 2278 882 81 An improved protocol for Energy efficient communication in Wireless Sensor Network Aman Deep Singh 1, Mr

More information

Investigation on OLSR Routing Protocol Efficiency

Investigation on OLSR Routing Protocol Efficiency Investigation on OLSR Routing Protocol Efficiency JIRI HOSEK 1, KAROL MOLNAR 2 Department of Telecommunications Faculty of Electrical Engineering and Communication, Brno University of Technology Purkynova

More information

COMPARATIVE ANALYSIS AND STUDY OF DIFFERENT QOS PARAMETERS OF WIRELESS AD-HOC NETWORK

COMPARATIVE ANALYSIS AND STUDY OF DIFFERENT QOS PARAMETERS OF WIRELESS AD-HOC NETWORK COMPARATIVE ANALYSIS AND STUDY OF DIFFERENT QOS PARAMETERS OF WIRELESS AD-HOC NETWORK Nalin Gahlaut 1, Jaya sharma 2, Pankaj Kumar 3, Kaushal Kumar 4 1 Doctoral Candidate, Uttarakhand Technical University,

More information

Wireless Sensor Networks (WSN)

Wireless Sensor Networks (WSN) Wireless Sensor Networks (WSN) Introduction M. Schölzel Difference to existing wireless networks Infrastructure-based networks e.g., GSM, UMTS, Base stations connected to a wired backbone network Mobile

More information

EnergyEfficientWeightedClusteringAlgorithminWirelessSensorNetworks

EnergyEfficientWeightedClusteringAlgorithminWirelessSensorNetworks Global Journal of Computer Science and Technology: E Network, Web & Security Volume 17 Issue 2 Version 1.0 Type: Double Blind Peer Reviewed International Research Journal Publisher: Global Journals Inc.

More information

QoS Routing using OLSR with Optimization for Flooding

QoS Routing using OLSR with Optimization for Flooding QoS Routing using OLSR with Optimization for Flooding 1 Suman Banik, 2 Bibhash Roy, 3 Parthi Dey, 4 Nabendu Chaki, 5 Sugata Sanyal 1 Department of Election, Govt. of Tripura, India, 2 Tripura Institute

More information

WSN Routing Protocols

WSN Routing Protocols WSN Routing Protocols 1 Routing Challenges and Design Issues in WSNs 2 Overview The design of routing protocols in WSNs is influenced by many challenging factors. These factors must be overcome before

More information

Study on Techniques for Cluster Head Formation over Mobile Ad Hoc Networks

Study on Techniques for Cluster Head Formation over Mobile Ad Hoc Networks Study on Techniques for Cluster Head Formation over Mobile Ad Hoc Networks B.Sindhuja 1, Dr.J.Shanthini 2 PG Scholar, Department of Information Technology, SNS College of Technology, Coimbatore, Tamil

More information

Implementing Crytoptographic Technique in Cluster Based Environment for Secure Mobile Adhoc Networks

Implementing Crytoptographic Technique in Cluster Based Environment for Secure Mobile Adhoc Networks Implementing Crytoptographic Technique in Cluster Based Environment for Secure Mobile Adhoc Networks Kiruba Priyadharshini.P 1, L.R.Priya 2, Dr.Ruba Soundar.K 3 1, 2, 3 Department of Communication Systems,

More information

SMITE: A Stochastic Compressive Data Collection. Sensor Networks

SMITE: A Stochastic Compressive Data Collection. Sensor Networks SMITE: A Stochastic Compressive Data Collection Protocol for Mobile Wireless Sensor Networks Longjiang Guo, Raheem Beyah, and Yingshu Li Department of Computer Science, Georgia State University, USA Data

More information

ICS 351: Today's plan. distance-vector routing game link-state routing OSPF

ICS 351: Today's plan. distance-vector routing game link-state routing OSPF ICS 351: Today's plan distance-vector routing game link-state routing OSPF distance-vector routing game 1. prepare a list of all neighbors and the links to them, and the metric for each link 2. create

More information

Mitigating Hot Spot Problems in Wireless Sensor Networks Using Tier-Based Quantification Algorithm

Mitigating Hot Spot Problems in Wireless Sensor Networks Using Tier-Based Quantification Algorithm BULGARIAN ACADEMY OF SCIENCES CYBERNETICS AND INFORMATION TECHNOLOGIES Volume 16, No 1 Sofia 2016 Print ISSN: 1311-9702; Online ISSN: 1314-4081 DOI: 10.1515/cait-2016-0005 Mitigating Hot Spot Problems

More information

An Enhanced Algorithm to Find Dominating Set Nodes in Ad Hoc Wireless Networks

An Enhanced Algorithm to Find Dominating Set Nodes in Ad Hoc Wireless Networks Georgia State University ScholarWorks @ Georgia State University Computer Science Theses Department of Computer Science 12-4-2006 An Enhanced Algorithm to Find Dominating Set Nodes in Ad Hoc Wireless Networks

More information

International Journal of Scientific & Engineering Research, Volume 6, Issue 3, March ISSN

International Journal of Scientific & Engineering Research, Volume 6, Issue 3, March ISSN International Journal of Scientific & Engineering Research, Volume 6, Issue 3, March-2015 768 Overview of Border Control Using Wireless Sensor Network Mosad H Alkhathami Department of Electrical and Computer

More information

Mobile Ad-hoc and Sensor Networks Lesson 05 Mobile Ad-hoc Network (MANET) Routing Algorithms Part 2

Mobile Ad-hoc and Sensor Networks Lesson 05 Mobile Ad-hoc Network (MANET) Routing Algorithms Part 2 Mobile Ad-hoc and Sensor Networks Lesson 05 Mobile Ad-hoc Network (MANET) Routing Algorithms Part 2 Oxford University Press 2007. All rights reserved. 1 Temporally ordered routing algorithm (TORA) A reactive

More information

Mobile Communications. Ad-hoc and Mesh Networks

Mobile Communications. Ad-hoc and Mesh Networks Ad-hoc+mesh-net 1 Mobile Communications Ad-hoc and Mesh Networks Manuel P. Ricardo Faculdade de Engenharia da Universidade do Porto Ad-hoc+mesh-net 2 What is an ad-hoc network? What are differences between

More information

Study and Analysis of Routing Protocols RIP and DSR Using Qualnet V5

Study and Analysis of Routing Protocols RIP and DSR Using Qualnet V5 Study and Analysis of Routing Protocols RIP and DSR Using Qualnet V5 Nallamalla Anusha Department of Computer Science and Engineering Baba Institute of Technology and Sciences, Visakhapatnam, Andhra Pradesh-

More information

Regression Based Cluster Formation for Enhancement of Lifetime of WSN

Regression Based Cluster Formation for Enhancement of Lifetime of WSN Regression Based Cluster Formation for Enhancement of Lifetime of WSN K. Lakshmi Joshitha Assistant Professor Sri Sai Ram Engineering College Chennai, India lakshmijoshitha@yahoo.com A. Gangasri PG Scholar

More information

Fig. 2: Architecture of sensor node

Fig. 2: Architecture of sensor node Volume 4, Issue 11, November 2014 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com To Reduce

More information

Juniper JN0-647 Exam. Volume: 65 Questions. Question: 1 Which protocol is a multicast routing protocol? A. OSPF B. BGP C. PIM D. IS-IS.

Juniper JN0-647 Exam. Volume: 65 Questions. Question: 1 Which protocol is a multicast routing protocol? A. OSPF B. BGP C. PIM D. IS-IS. Volume: 65 Questions Question: 1 Which protocol is a multicast routing protocol? A. OSPF B. BGP C. PIM D. IS-IS Answer: C Question: 2 Referring to the exhibit, how is R1 learning the route from R2? A.

More information

Thread in Commercial Backgrounder

Thread in Commercial Backgrounder Thread in Commercial Backgrounder September 2018 An introduction to Thread, its Network Topology and Application Support 1 What is Thread Thread is an open standard for wireless communication providing

More information

Intra and Inter Cluster Synchronization Scheme for Cluster Based Sensor Network

Intra and Inter Cluster Synchronization Scheme for Cluster Based Sensor Network Intra and Inter Cluster Synchronization Scheme for Cluster Based Sensor Network V. Shunmuga Sundari 1, N. Mymoon Zuviria 2 1 Student, 2 Asisstant Professor, Computer Science and Engineering, National College

More information

Ad Hoc Routing Protocols and Issues

Ad Hoc Routing Protocols and Issues Ad Hoc Routing Protocols and Issues Stefano Basagni ECE Dept Northeastern University Boston, Jan 2003 Ad hoc (AD-HAHK or AD-HOKE)-Adjective a) Concerned with a particular end or purpose, and b) formed

More information

EPARGA: A Resourceful Power Aware Routing Protocol for MANETs

EPARGA: A Resourceful Power Aware Routing Protocol for MANETs EPARGA: A Resourceful Power Aware Routing Protocol for MANETs Shipra Suman, Er. Aditi Agrawal, Prof. A.K. Jaiswal Abstract A Mobile Ad-hoc Network (MANET) is a collection of wireless mobile hosts which

More information

Using VCG based Designing and Electing Secure Leader Model for Intrusion Detection System in Manet

Using VCG based Designing and Electing Secure Leader Model for Intrusion Detection System in Manet International Journal of Wireless Networks and Communications. ISSN 0975-6507 Volume 4, Number 1 (2012), pp. 71-81 International Research Publication House http://www.irphouse.com Using VCG based Designing

More information

Routing Algorithms McGraw-Hill The McGraw-Hill Companies, Inc., 2001

Routing Algorithms McGraw-Hill The McGraw-Hill Companies, Inc., 2001 Routing Algorithms Main issue is how the routers that constitute the network layer of a network cooperate to find the best routes between all pairs of stations. Routing algorithm at a router decides which

More information

A Survey on Underwater Sensor Network Architecture and Protocols

A Survey on Underwater Sensor Network Architecture and Protocols A Survey on Underwater Sensor Network Architecture and Protocols Rakesh V S 4 th SEM M.Tech, Department of Computer Science MVJ College of Engineering Bangalore, India raki.rakesh102@gmail.com Srimathi

More information

Configuring a Rendezvous Point

Configuring a Rendezvous Point Version History Version Number Date Notes 1 03/15/2002 This document was created. The purpose of this document is to outline four recommended methods for configuring a rendezvous point (RP) in a Protocol

More information

CROSS LAYER PROTOCOL (APTEEN) USING WSN FOR REAL TIME APPLICATION

CROSS LAYER PROTOCOL (APTEEN) USING WSN FOR REAL TIME APPLICATION CROSS LAYER PROTOCOL (APTEEN) USING WSN FOR REAL TIME APPLICATION V. A. Dahifale 1, N. Y. Siddiqui 2 PG Student, College of Engineering Kopargaon, Maharashtra, India 1 Assistant Professor, College of Engineering

More information

Routing Protocols in MANET: Comparative Study

Routing Protocols in MANET: Comparative Study Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 7, July 2014, pg.119

More information

Wireless Network Security Spring 2013

Wireless Network Security Spring 2013 Wireless Network Security 14-814 Spring 2013 Patrick Tague Class #4 Wireless Systems II Project proposals: Announcements Written proposal due in 1 week Presentation in class in 1 week Contact me to discuss

More information

An Energy-based Clustering Algorithm for Wireless Sensor Networks

An Energy-based Clustering Algorithm for Wireless Sensor Networks An Energy-based Clustering Algorithm for Wireless Sensor Networks Jin Wang 1, Xiaoqin Yang 1, Yuhui Zheng 1, Jianwei Zhang, Jeong-Uk Kim 3 1 Jiangsu Engineering Center of Network Monitoring, Naning University

More information

Outline. Introduction. Outline. Introduction (Cont.) Introduction (Cont.)

Outline. Introduction. Outline. Introduction (Cont.) Introduction (Cont.) An Energy-Efficient Distributed Algorithm for Minimum-Latency Aggregation Scheduling in Wireless Sensor Networks Yingshu Li, Longjiang Guo, and Sushil K. Prasad Department of Computer Science, Georgia

More information

A Rank Table Based Routing Method for Multi-Sink Zigbee Wireless Sensor Network

A Rank Table Based Routing Method for Multi-Sink Zigbee Wireless Sensor Network Journal of Communications Vol. 8, No. 8, August 2013 A Rank Table Based Routing Method for Multi-Sink Zigbee Wireless Sensor Network Qianrong Gu1, Hongying Zuo2, Ruidan Su3, Jihui Xu1, and Huaiyu Xu1 1

More information

A Performance Comparison of Multi-Hop Wireless Ad Hoc Network Routing Protocols. Broch et al Presented by Brian Card

A Performance Comparison of Multi-Hop Wireless Ad Hoc Network Routing Protocols. Broch et al Presented by Brian Card A Performance Comparison of Multi-Hop Wireless Ad Hoc Network Routing Protocols Broch et al Presented by Brian Card 1 Outline Introduction NS enhancements Protocols: DSDV TORA DRS AODV Evaluation Conclusions

More information

Performance Evaluation of Mesh - Based Multicast Routing Protocols in MANET s

Performance Evaluation of Mesh - Based Multicast Routing Protocols in MANET s Performance Evaluation of Mesh - Based Multicast Routing Protocols in MANET s M. Nagaratna Assistant Professor Dept. of CSE JNTUH, Hyderabad, India V. Kamakshi Prasad Prof & Additional Cont. of. Examinations

More information

The Impact of Clustering on the Average Path Length in Wireless Sensor Networks

The Impact of Clustering on the Average Path Length in Wireless Sensor Networks The Impact of Clustering on the Average Path Length in Wireless Sensor Networks Azrina Abd Aziz Y. Ahmet Şekercioğlu Department of Electrical and Computer Systems Engineering, Monash University, Australia

More information

Ms A.Naveena Electronics and Telematics department, GNITS, Hyderabad, India.

Ms A.Naveena Electronics and Telematics department, GNITS, Hyderabad, India. Dynamic Training Intrusion Detection Scheme for Blackhole Attack in MANETs Ms A.Naveena Electronics and Telematics department, GNITS, Hyderabad, India. Dr. K.Rama Linga Reddy Electronics and Telematics

More information

Lifetime Analysis of Random Event-Driven Clustered Wireless Sensor Networks. Presented by Yao Zheng

Lifetime Analysis of Random Event-Driven Clustered Wireless Sensor Networks. Presented by Yao Zheng Lifetime Analysis of Random Event-Driven Clustered Wireless Sensor Networks Presented by Yao Zheng Contributions Analyzing the lifetime of WSN without knowing the lifetime of sensors Find a accurate approximation

More information

Comparative Performance of PRO-AODV, DFRR, CPRR algorithm based on Link Failure Route Rectification problem in Mobile Sensor Network

Comparative Performance of PRO-AODV, DFRR, CPRR algorithm based on Link Failure Route Rectification problem in Mobile Sensor Network Comparative Performance of PRO-AODV, DFRR, CPRR algorithm based on Link Failure Route Rectification problem in Mobile Sensor Network K.Hanumanthu Naik 1, Dr.V.Raghunatha Reddy 2 1 Research Scholar, Department

More information

Chapter 16. Wireless LAN, Mobile Ad Hoc Networks, and MANET Routing Protocols. Wireless Network Models. Illustration of an ad hoc network

Chapter 16. Wireless LAN, Mobile Ad Hoc Networks, and MANET Routing Protocols. Wireless Network Models. Illustration of an ad hoc network Chapter 16 Wireless LAN, Mobile Ad Hoc Networks, and MANET Routing Protocols Associate Prof. Yuh-Shyan Chen Department of CSIE National Chung Cheng University Wireless Network Models With Infrastructure:

More information

Wireless LAN, Mobile Ad Hoc Networks, and MANET Routing Protocols

Wireless LAN, Mobile Ad Hoc Networks, and MANET Routing Protocols Chapter 16 Wireless LAN, Mobile Ad Hoc Networks, and MANET Routing Protocols Associate Prof. Yuh-Shyan Chen Department of CSIE National Chung Cheng University 2002/11/ Yuh-Shyan Chen 1 Wireless Network

More information

Simulation-based Analysis of Security Exposures in Mobile Ad Hoc Networks

Simulation-based Analysis of Security Exposures in Mobile Ad Hoc Networks Simulation-based Analysis of Security Exposures in Mobile Ad Hoc Networks Pietro Michiardi and Refik Molva Piero.Michiardi@eurecom.fr Refik.Molva@eurecom.fr Institut Eurécom, 2229 Route des Crêtes BP 193

More information

Analysis QoS Parameters for Mobile Ad-Hoc Network Routing Protocols: Under Group Mobility Model

Analysis QoS Parameters for Mobile Ad-Hoc Network Routing Protocols: Under Group Mobility Model 2009 International Conference on Computer Engineering and Applications IPCSIT vol.2 (2011) (2011) IACSIT Press, Singapore Analysis QoS Parameters for Mobile Ad-Hoc Network Routing Protocols: Under Group

More information

AN ENERGY EFFICIENT AND RELIABLE TWO TIER ROUTING PROTOCOL FOR TOPOLOGY CONTROL IN WIRELESS SENSOR NETWORKS

AN ENERGY EFFICIENT AND RELIABLE TWO TIER ROUTING PROTOCOL FOR TOPOLOGY CONTROL IN WIRELESS SENSOR NETWORKS AN ENERGY EFFICIENT AND RELIABLE TWO TIER ROUTING PROTOCOL FOR TOPOLOGY CONTROL IN WIRELESS SENSOR NETWORKS Shivakumar A B 1, Rashmi K R 2, Ananda Babu J. 3 1,2 M.Tech (CSE) Scholar, 3 CSE, Assistant Professor,

More information

Link Lifetime Prediction in Mobile Ad-Hoc Network Using Curve Fitting Method

Link Lifetime Prediction in Mobile Ad-Hoc Network Using Curve Fitting Method IJCSNS International Journal of Computer Science and Network Security, VOL.17 No.5, May 2017 265 Link Lifetime Prediction in Mobile Ad-Hoc Network Using Curve Fitting Method Mohammad Pashaei, Hossein Ghiasy

More information

Selective Forwarding Attacks Detection in WSNs

Selective Forwarding Attacks Detection in WSNs Selective Forwarding Attacks Detection in WSNs Naser M. Alajmi and Khaled M. Elleithy Computer Science and Engineering Department, University of Bridgeport, Bridgeport, CT, USA nalajmi@my.bridgeport.edu,

More information

A Mobile-Sink Based Distributed Energy-Efficient Clustering Algorithm for WSNs

A Mobile-Sink Based Distributed Energy-Efficient Clustering Algorithm for WSNs A Mobile-Sink Based Distributed Energy-Efficient Clustering Algorithm for WSNs Sarita Naruka 1, Dr. Amit Sharma 2 1 M.Tech. Scholar, 2 Professor, Computer Science & Engineering, Vedant College of Engineering

More information

Design and Implementation of a Simulator for Ad Hoc Network Routing Protocols

Design and Implementation of a Simulator for Ad Hoc Network Routing Protocols Design and Implementation of a Simulator for Ad Hoc Network Routing Protocols Mudit, Sachin Chaudhary Abstract In consideration of adaptability to the environment and flexibility in protocol construction,

More information

A Comparative Analysis of Pro-active Routing Protocols in MANET

A Comparative Analysis of Pro-active Routing Protocols in MANET Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 6, June 2014, pg.144

More information

Performance Analysis of MANET Routing Protocols OLSR and AODV

Performance Analysis of MANET Routing Protocols OLSR and AODV VOL. 2, NO. 3, SEPTEMBER 211 Performance Analysis of MANET Routing Protocols OLSR and AODV Jiri Hosek Faculty of Electrical Engineering and Communication, Brno University of Technology Email: hosek@feec.vutbr.cz

More information

CLASSIFICATION OF ROUTING Routing. Fig.1 Types of routing

CLASSIFICATION OF ROUTING Routing. Fig.1 Types of routing Volume 5, Issue 5, MAY 2015 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com A Survey on Unicast

More information

Performance Evaluation of Various Routing Protocols in MANET

Performance Evaluation of Various Routing Protocols in MANET 208 Performance Evaluation of Various Routing Protocols in MANET Jaya Jacob 1,V.Seethalakshmi 2 1 II MECS,Sri Shakthi Institute of Science and Technology, Coimbatore, India 2 Associate Professor-ECE, Sri

More information

Outline. CS5984 Mobile Computing. Dr. Ayman Abdel-Hamid, CS5984. Wireless Sensor Networks 1/2. Wireless Sensor Networks 2/2

Outline. CS5984 Mobile Computing. Dr. Ayman Abdel-Hamid, CS5984. Wireless Sensor Networks 1/2. Wireless Sensor Networks 2/2 CS5984 Mobile Computing Outline : a Survey Dr. Ayman Abdel-Hamid Computer Science Department Virginia Tech An Introduction to 1 2 1/2 Advances in micro-electro-mechanical systems technology, wireless communications,

More information

Dominating Set & Clustering Based Network Coverage for Huge Wireless Sensor Networks

Dominating Set & Clustering Based Network Coverage for Huge Wireless Sensor Networks Dominating Set & Clustering Based Network Coverage for Huge Wireless Sensor Networks Mohammad Mehrani, Ali Shaeidi, Mohammad Hasannejad, and Amir Afsheh Abstract Routing is one of the most important issues

More information

CSMA based Medium Access Control for Wireless Sensor Network

CSMA based Medium Access Control for Wireless Sensor Network CSMA based Medium Access Control for Wireless Sensor Network H. Hoang, Halmstad University Abstract Wireless sensor networks bring many challenges on implementation of Medium Access Control protocols because

More information

Scalability Performance of AODV, TORA and OLSR with Reference to Variable Network Size

Scalability Performance of AODV, TORA and OLSR with Reference to Variable Network Size Lovekesh Kumar / International Journal of Engineering Research and Applications (IJERA) ISSN: Scalability Performance of AODV, TORA and OLSR with Reference to Variable Network Size Lovekesh Kumar* *(Department

More information

Impact of Black Hole and Sink Hole Attacks on Routing Protocols for WSN

Impact of Black Hole and Sink Hole Attacks on Routing Protocols for WSN Impact of Black Hole and Sink Hole Attacks on Routing Protocols for WSN Padmalaya Nayak V. Bhavani B. Lavanya ABSTRACT With the drastic growth of Internet and VLSI design, applications of WSNs are increasing

More information

Mobile Ad-hoc Networks

Mobile Ad-hoc Networks Mobile Ad-hoc Networks Fred Baker 1 The manet problem Mobile Random and perhaps constantly changing Ad-hoc Not engineered Networks Elastic data applications which use networks to communicate 2 Examples

More information

2013, IJARCSSE All Rights Reserved Page 85

2013, IJARCSSE All Rights Reserved Page 85 Volume 3, Issue 12, December 2013 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Overview of

More information

within unicast packets that are organized into multicast data when they reach their destination. I.INTRODUCTION

within unicast packets that are organized into multicast data when they reach their destination. I.INTRODUCTION ISSN XXXX XXXX 2016 IJESC Research Article Volume 6 Issue No.10 Mobile Synchronized Wireless Sensor Network: An Energy Efficient Data Transmission Using DVMRP N. Renga Veni 1, T.Samraj Lawrence 2, J.Jevin

More information

EEEM: An Energy-Efficient Emulsion Mechanism for Wireless Sensor Networks

EEEM: An Energy-Efficient Emulsion Mechanism for Wireless Sensor Networks EEEM: An Energy-Efficient Emulsion Mechanism for Wireless Sensor Networks M.Sudha 1, J.Sundararajan 2, M.Maheswari 3 Assistant Professor, ECE, Paavai Engineering College, Namakkal, Tamilnadu, India 1 Principal,

More information