A COMPARITIVE STUDY ON COST AWARE SECURE ROUTING (CASER) PROTOCOL WITH SLEEP WAKE STATE ROUTING PROTOCOL (SWSR)

Similar documents
ISSN Vol.04,Issue.12, September-2016, Pages:

ISSN Vol.04,Issue.11, August-2016, Pages:

PERFORMANCE ANALYSIS OF COST AWARE SECURE ROUTING PROTOCOL. Bharathi P 1, Nithyalakshmi R 2. M.E Communication Systems 1, Assistant Professor 1

Cost-Aware SEcure Routing (CASER) Protocol Design for Wireless Sensor Networks

CASER Protocol Using DCFN Mechanism in Wireless Sensor Network

Geographic Adaptive Fidelity and Geographic Energy Aware Routing in Ad Hoc Routing

Design of Cost- Aware Secure Routing (CASER) Protocol Mechanism in Wireless Sensor Network

Energy Aware Location Based Routing Protocols in Wireless Sensor Networks

End-To-End Delay Optimization in Wireless Sensor Network (WSN)

Research Article MFT-MAC: A Duty-Cycle MAC Protocol Using Multiframe Transmission for Wireless Sensor Networks

Lecture 8 Wireless Sensor Networks: Overview

EBRP: Energy Band based Routing Protocol for Wireless Sensor Networks

CLUSTER BASED ROUTING PROTOCOL FOR WIRELESS SENSOR NETWORKS

Geographical Routing Algorithms In Asynchronous Wireless Sensor Network

Comparison of TDMA based Routing Protocols for Wireless Sensor Networks-A Survey

Integrated Resource Adaptive On Demand Geographic Routing (IRA-ODGR) for MANET

MultiHop Routing for Delay Minimization in WSN

Mobile Agent Driven Time Synchronized Energy Efficient WSN

Maximizing the Lifetime of Clustered Wireless Sensor Network VIA Cooperative Communication

Energy Efficient Routing of Wireless Sensor Networks Using Virtual Backbone and life time Maximization of Nodes

Zonal Rumor Routing for. Wireless Sensor Networks

Fig. 2: Architecture of sensor node

ViTAMin: A Virtual Backbone Tree Algorithm for Minimal Energy Consumption in Wireless Sensor Network Routing

Figure 1. Clustering in MANET.

ALL ABOUT DATA AGGREGATION IN WIRELESS SENSOR NETWORKS

Routing Scheme in Energy efficient based Protocols for Wireless Sensor Networks

IMPORTANCE OF RELAY NODE SET FRAMEWORK FOR MANET COMMUNICATION ENVIRONMENT

Energy Efficient Data Gathering For Throughput Maximization with Multicast Protocol In Wireless Sensor Networks

SMITE: A Stochastic Compressive Data Collection. Sensor Networks

Performance and Comparison of Energy Efficient MAC Protocol in Wireless Sensor Network

An Energy Consumption Analytic Model for A Wireless Sensor MAC Protocol

TO DESIGN ENERGY EFFICIENT PROTOCOL BY FINDING BEST NEIGHBOUR FOR ZIGBEE PROTOCOL

IJREAT International Journal of Research in Engineering & Advanced Technology, Volume 1, Issue 2, April-May, 2013 ISSN:

Blackhole Attack Detection in Wireless Sensor Networks Using Support Vector Machine

An Energy Efficient Cluster based Load Balance Routing for Wireless Sensor Network

Model and Algorithms for the Density, Coverage and Connectivity Control Problem in Flat WSNs

Data-Centric Routing Mechanism Using Hash-Value in Wireless Sensor Network

2. REVIEW OF RELATED RESEARCH WORK. 2.1 Methods of Data Aggregation

RWPS: A Low Computation Routing Algorithm for Sensor Networks

Energy Aware and Anonymous Location Based Efficient Routing Protocol

Energy Efficient Zonal Stable Election Protocol for WSNs

Load Balanced Algorithm for Location Based Routing Around Dead Nodes in Wireless Sensor Networks

A NOVEL DISTRIBUTED PROTOCOL FOR RANDOMLY DEPLOYED CLUSTERED BASED WIRELESS SENSOR NETWORK:

Reliable and Energy Efficient Protocol for Wireless Sensor Network

Sleep/Wake Aware Local Monitoring (SLAM)

Wireless Sensor Networks (WSN) Tanyar Pooyeh Intelligent Robotics - winter semester 2013/14 Nov 11, 2013

Understanding Vehicular Ad-hoc Networks and Use of Greedy Routing Protocol

Maximum Coverage Range based Sensor Node Selection Approach to Optimize in WSN

Location Based Energy-Efficient Reliable Routing Protocol for Wireless Sensor Networks

Evaluation of Communication Overheads in Wireless Sensor Networks

Delay Performance of Multi-hop Wireless Sensor Networks With Mobile Sinks

New Active Caching Method to Guarantee Desired Communication Reliability in Wireless Sensor Networks

2 Proposed Routing Protocol

A NEW ENERGY LEVEL EFFICIENCY ISSUES IN MANET

CHAPTER 2 WIRELESS SENSOR NETWORKS AND NEED OF TOPOLOGY CONTROL

A REVIEW ON LEACH-BASED HIERARCHICAL ROUTING PROTOCOLS IN WIRELESS SENSOR NETWORK

Energy Efficient Collection Tree Protocol in Wireless Sensor Networks

Using Hybrid Algorithm in Wireless Ad-Hoc Networks: Reducing the Number of Transmissions

Efficient Detection and Elimination of Vampire Attacks in Wireless Ad-Hoc Sensor Networks

Efficient Broadcast Algorithms To Reduce number of transmission Based on Probability Scheme

NEW! Updates from previous draft Based on group mailing list discussions Added definition of optimal scalability with examples (captures idea of suffi

A Novel Protocol for Better Energy-Efficiency, Latency and Fault Tolerance in Wireless Sensor Network

Measure of Impact of Node Misbehavior in Ad Hoc Routing: A Comparative Approach

Reservation Packet Medium Access Control for Wireless Sensor Networks

Balanced Load Sharing Protocol for Wireless Sensor Networks

PERFORMANCE EVALUATION OF CONSUMED- ENERGY-TYPE-AWARE ROUTING (CETAR) FOR WIRELESS SENSOR NETWORKS

ENERGY SAVING IN WIRELESS SENSOR NETWORK WITH SPIN PROTOCOL

Index Terms: Base Station, Hop Count Indicator (HCI), Node Usage Indicator (NUI), Resource Biased Routing (RBR).

Review on an Underwater Acoustic Networks

IP Failure Handling Using Localized On-Demand Link State Routing

AN EFFICIENT MAC PROTOCOL FOR SUPPORTING QOS IN WIRELESS SENSOR NETWORKS

Receiver Based Multicasting Protocol for Wireless Sensor Networks

A Color-theory-based Energy Efficient Routing Algorithm for Wireless Sensor Networks

Event Driven Routing Protocols For Wireless Sensor Networks

Replacing Failed Sensor Nodes by Mobile Robots

DISCOVERING OPTIMUM FORWARDER LIST IN MULTICAST WIRELESS SENSOR NETWORK

ROUTING ALGORITHMS Part 1: Data centric and hierarchical protocols

An Energy-Efficient Data-Dissemination Protocol in Wireless Sensor Networks

Energy-efficient Data Dissemination in Wireless Sensor Networks

Data-Centric Query in Sensor Networks

The Impact of Clustering on the Average Path Length in Wireless Sensor Networks

AEC Algorithm for WSN Lifetime Enhancement

Trust and Energy-aware Routing Protocol for Wireless Sensor Networks

An efficient implementation of the greedy forwarding strategy

Random Asynchronous Wakeup Protocol for Sensor Networks

ADB: An Efficient Multihop Broadcast Protocol Based on Asynchronous Duty-Cycling in Wireless Sensor Networks

An Energy-aware Greedy Perimeter Stateless Routing Protocol for Mobile Ad hoc Networks

Simulations of the quadrilateral-based localization

Networking Sensors, II

SFM: An Energy Efficient Algorithm based on Reducing Control Messages in Wireless Sensor Networks

An Iterative Greedy Approach Using Geographical Destination Routing In WSN

Computer Based Image Algorithm For Wireless Sensor Networks To Prevent Hotspot Locating Attack

Sensor Deployment, Self- Organization, And Localization. Model of Sensor Nodes. Model of Sensor Nodes. WiSe

An Efficient Data-Centric Routing Approach for Wireless Sensor Networks using Edrina

A Simple Sink Mobility Support Algorithm for Routing Protocols in Wireless Sensor Networks

Challenges in Geographic Routing: Sparse Networks, Obstacles, and Traffic Provisioning

Generic Energy-Efficient Geographic Routing for Ad-Hoc Wireless Networks

Energy Aware Node Placement Algorithm for Wireless Sensor Network

An Optimized Lifetime Model using Energy Holes Reduction near Sink's Locality of WSN s

Nodes Energy Conserving Algorithms to prevent Partitioning in Wireless Sensor Networks

Transcription:

INTERNATIONAL JOURNAL OF RESEARCH IN COMPUTER APPLICATIONS AND ROBOTICS ISSN 2320-7345 A COMPARITIVE STUDY ON COST AWARE SECURE ROUTING (CASER) PROTOCOL WITH SLEEP WAKE STATE ROUTING PROTOCOL (SWSR) R.Sudha 1, G.Bakyalakshmi 2 1 Assistant Professor, Dept of CS, PSG College of Arts & Science, Coimbatore, Tamilnadu. E-Mail: sudha279@yahoo.com 2 Research scholar, Dept of CS, PSG College of Arts & Science, Coimbatore, Tamilnadu. E-Mail:bakya.psg@gmail.com Abstract: A wireless sensor network (WSN) of spatially distributed autonomous sensors to monitor physical or environmental conditions, such as temperature, sound, pressure, etc. and to cooperatively pass their data through the network to a main location. CASER tool is used to increase the life time of the networks. Caser tools use two parameters (i) energy balance control and (ii) probabilistic-based random walking. The EBC uses for energy consumption and the other one used for security. We propose non uniform technology in energy balanced consumption. In uniform technology the data s can t be send it for longer nodes to overcome this problem the non-uniform technology is proposed. Then we compared the Sleep awake protocol which is used to send the packet in energy efficient way Keywords: Sensor networks, CASER, EBC, Protocols, Security 1. INTRODUCTION A computer network or data network is a telecommunications network that allows computers to exchange data. In computer networks, networked computing devices pass data to each other along data connections. Data is transferred in the form of packets. The connections (network links) between nodes are established using either cable media or wireless media. The best-known computer network is the Internet. Network computer devices that originate, route and terminate the data are called network nodes. Nodes can include hosts such as personal computers, phones, servers as well as networking hardware. Two such devices are said to be networked together when one device is able to exchange information with the other device, whether or not they have a direct connection to each other. The recent technological advances make wireless sensor networks (WSNs) technically and economically feasible to be widely used in both military and civilian applications, such as monitoring of ambient conditions related to the environment, precious species and critical infrastructures. A key feature of such networks is that each network consists of a large number of un-tethered and unattended sensor nodes. These nodes often have very limited and non-replenishable energy resources, which makes energy an important design issue for these networks. G. B a k y a l a k s h m i e t a l Page 32

Routing is another very challenging design issue for WSNs. A properly designed routing protocol should not only ensure high message delivery ratio and low energy consumption for message delivery, but also balance the entire sensor network energy consumption, and thereby extend the sensor network lifetime. Routing is the process of selecting best paths in a network. A routing protocol specifies how routers communicate with each other, disseminating information that enables them to select routes between any two nodes on a computer network. Routing algorithms determine the specific choice of route. Each router has a priori knowledge only of networks attached to it directly. A routing protocol shares this information first among immediate neighbours, and then throughout the network. Fig. 1 wireless sensor network The network router is quickly transforming from a device dedicated to connecting disparate networks to an integrated services device capable of multiple functions beyond routing. More Cisco customers are deploying integrated services routers sophisticated network routers that deliver voice, video, data and Internet access, wireless, and other applications. The WSN is built of "nodes" from a few to several hundreds or even thousands, where each node is connected to one (or sometimes several) sensors. Each such sensor network node has typically several parts: a radio transceiver with an internal antenna or connection to an external antenna, a microcontroller, an electronic circuit for interfacing with the sensors and an energy source, usually a battery or an embedded form of energy harvesting. A sensor node might vary in size from that of a shoebox down to the size of a grain of dust, although functioning "motes" of genuine microscopic dimensions have yet to be created. The cost of sensor nodes is similarly variable, ranging from a few to hundreds of dollars, depending on the complexity of the individual sensor nodes. Size and cost constraints on sensor nodes result in corresponding constraints on resources such as energy, memory, computational speed and communications bandwidth. 2. RELATED WORK 2.1 Geographical forwarding problems: In our prior work we have considered a simple model where the number of relays is a constant which is known to the source. There the reward is simply the progress made by a relay node towards the sink. In the current work we have generalized our earlier model by allowing the number of relays to be not known to the source. Also, here we allow a general reward structure. There has been other work in the context of geographical forwarding and any cast routing, where the problem of choosing one among several neighboring nodes arises. Zorzi and Rao propose a distributed relaying algorithm called GeRaF (Geographical Random Forwarding) whose objective is to carry a packet to its destination in as few hops as possible, by making as large progress as possible at each relaying stage. These authors do not consider the tradeoff between the relay selection delay and the reward gained by selecting a relay, which is a major contribution of our work. Liu et al. Propose a relay selection approach as a part of CMAC, a protocol for geographical packet forwarding. Under CMAC, node i chooses an r that minimizes the expected normalized latency (which is the average ratio0 of one-hop delay and progress). The Random Asynchronous Wakeup (RAW) protocol also considers transmitting to the first node to wake-up that makes a progress of greater than a threshold. Interestingly, this is the structure of the optimal policy for our simplified model. Thus we have provided G. B a k y a l a k s h m i e t a l Page 33

Delivery Ratio INTERNATIONAL JOURNAL OF RESEARCH IN COMPUTER APPLICATIONS AND ROBOTICS analytical support for using such a threshold policy. For a sleep-wake cycling network, Kim et al. in have considered the problem of minimizing average end-to-end delay as a stochastic shortest path problem and have developed a distributed Bellman-Ford algorithm (referred to as the LOCAL-OPT) which yields optimal forwarding strategies for each node. However a major drawback is that a pre-configuration phase is required to run the LOCAL-OPT algorithm. 3. CASER PROTOCOL CASER protocol has two major advantages: (i) It ensures balanced energy consumption of the entire sensor network so that the lifetime of the WSNs can be maximized. (ii) CASER protocol supports multiple routing strategies based on the routing requirements, including fast/slow message delivery and secure message delivery to prevent routing traceback attacks and malicious traffic jamming attacks in WSNs. Our contributions of this paper can be summarized as follows: 1) We propose a secure and efficient Cost-Aware Secure Routing (CASER) protocol for WSNs. In this protocol, cost-aware based routing strategies can be applied to address the message delivery requirements. 2) We devise a quantitative scheme to balance the energy consumption so that both the sensor network lifetime and the total number of messages that can be delivered are maximized under the same energy deployment. 3) We develop theoretical formulas to estimate the number of routing hops in CASER under varying routing energy balance control and security requirements. 4) We quantitatively analyze security of the proposed routing algorithm. 5) We provide an optimal non-uniform energy deployment strategy for the given sensor networks based on the energy consumption ratio. Our theoretical and simulation results both show that under the same total energy deployment, we can increase the lifetime and the number of messages that can be delivered more than four times in the non-uniform energy deployment scenario. 1.8 1.6 1.4 1.2 1 0.8 CASER SWSR 0.6 0.4 0.2 0 1 2 3 4 5 Time(sec) Fig.2 message delivery ratio We summarize the CASER routing protocol in Algorithm1. It should be pointed out that the EBC parameter α can be configured in the message level, or in the node level based on the application scenario and the preference. When α increases from 0 to 1, more and more sensor nodes with relatively low energy levels will be excluded from the active routing selection. Therefore, the N A α shrinks as α increases. In other words, as α increases, the routing flexibility may reduce. As a result, the overall routing hops may increase. But since Ea(A) is defined as the average energy level of the nodes in NA, this subset is dynamic and will never be empty. Therefore, the next hop grid can always be selected from N A α. G. B a k y a l a k s h m i e t a l Page 34

Algorithm 1: Node A finds the next hop routing grid based on the EBC α 2 [0, 1] (i) Compute the average remaining energy of the adjacent neighboring grids: Ea (ii) Determine the candidate grids for the next routing hop: (iii) Send the message to the grid in the N A α that is closest to the sink node based on its relative location. 4. SLEEP-WAKE STATE ROUTING PROTOCOL The high level design goal of SWS is to relax the assumption that every node knows the location of its first hop and second-hop neighbours, and to simplify the wake-up hardware and wakeup signal. Again considering SWS uses the following steps to wake up the guards along the route from S to D: 1. Node S broadcasts a wake-up signal to all its first-hop neighbors (Z,W,n1 1 1). The wake-up signal includes the identity of both the current sender (S), the next-hop (n1), and the previous-hop (empty for S). 2. Each neighbors of S, after being woken up, decides whether to stay awake or go back to sleep based on the role that it may play on the ongoing communication. If that neighbor is the next-hop (n1), it stays awake to forward the data and to monitor the next-hop from it(n2 1 1) for the next-hop n1 over the link n1 n2, it stays awake to monitor the behavior of n1. If the node is a guard of a forwarding node over the previous-hop, it stays awake to detect fabrication by the forwarding node. A node can independently make this determination based on first and second-hop neighbor information. If none of these cases hold, the node goes back to sleep immediately. 3. Node S sends the data packet to n1 following the timing schedule presented 4. Nodes n1 1 1 after being woken up continue to stay awake for Tw. After that, it goes back to sleep. 5. n1 does the same steps that S did to wake up the next hop(n2), n2 2 2) and n1 s guards (S 1, 1). 6. If n1 fails to send the wakeup signal, the guard of n1with the lowest ID sends a two-hop broadcast of the wakeup signal through. If that guard fails, the guard with the next smallest ID sends the signal, and so on. This design ensures that if there is a chain of colluding malicious nodes then all the nodes will be suspected. 7. The process continues at each step till the destination. This scheme results in an increase in the energy consumption. Fig.3 sleep wake state routing protocol G. B a k y a l a k s h m i e t a l Page 35

5. CONCLUSION We are proposed and studied few protocols and compared the existing with proposed methods. The cost aware secure routing protocol is used to balance the energy consumption and increase network lifetime. Which is also having some drawbacks and it takes more time to send the data. So to overcome this problem we use sleep wake state routing protocol to send the packet in energy efficient way. In future work may be some efficient algorithm can be used to protect the data and send it in secure manner. 6. REFERENCES [1] Y. Li, J. Ren, and J. Wu, Quantitative measurement and design of source-location privacy schemes for wireless sensor networks, IEEE Transactions on Parallel and Distributed Systems, accepted, to appear. [2] Y. Li, J. Li, J. Ren, and J. Wu, Providing hop-by-hop authentication and source privacy in wireless sensor networks, in IEEE INFOCOM 2012 Mini-Conference, Orlando, Florida, USA., March 25-30, 2012 2012. [3] B. Karp and H. T. Kung, GPSR: Greedy perimeter stateless routing for wireless networks, in MobiCom 2000, New York, NY, USA, 2000, pp. 243 254. [4] J. Li, J. Jannotti, D. S. J. D. C. David, R. Karger, and R. Morris, A scal- able location service fo geographic ad hoc routing, in MobiCom 2000. ACM, 2000, pp. 120 130. [5] Y. Xu, J. Heidemann, and D. Estrin, Geography-informed energy conservation for ad-hoc routing, in the Seventh Annual ACM/IEEE International Conference on Mobile Computing and Networking, 2001, pp. 70 84. [6] Y. Yu, R. Govindan, and D. Estrin, Geographical and energy-aware routing: A recursive data dissemination protocol for wireless sensor networks, UCLA Computer Science Department Technical Report, UCLACSD,May 2001. [7] N. Bulusu, J. Heidemann, and D. Estrin, Gps-less low cost outdoor localization for very small devices, Computer science department, University of Southern California, Tech. Rep. Technical report00-729, April 2000. [8] A. Savvides, C.-C. Han, and M. B. Srivastava, Dynamic fine-grained localization in ad-hoc networks of sensors, in Proceedings of the Seventh ACM Annual International Conference on Mobile Computing and Networking (MobiCom), July 2001, pp. 166 179. [9] P. Bose, P. Morin, I. Stojmenovic, and J. Urrutia, Routing with guaranteed delivery in adhoc wireless networks, in 3rd Int. Workshopon Discrete Algorithms and methods for mobile computing and communications, 1999, pp. 48 55. 1045-9219 (c) 2013 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission. See [10] Routing with guaranteed delivery in ad hoc wireless networks, in the 3rd ACM International Workshop on Discrete Algorithms and Methods for Mobile Computing and Communications (DIAL M 99), Seattle, WA, August 1999, pp. 48 55. G. B a k y a l a k s h m i e t a l Page 36