SlideShare a Scribd company logo
1 of 4
Download to read offline
IOSR Journal of Computer Engineering (IOSR-JCE)
e-ISSN: 2278-0661,p-ISSN: 2278-8727, Volume 17, Issue 3, Ver. 1 (May – Jun. 2015), PP 89-92
www.iosrjournals.org
DOI: 10.9790/0661-17318992 www.iosrjournals.org 89 | Page
Ant Colony Optimization for Wireless Sensor Network: A Review
Benu1
, Chakshu Goel2
, Sheenam3
1
(Lecturer, Department of ECE, SBSSTC Poly wing, Ferozepur (Pb.), India)
2
(Assistant Professor, Department of ECE, SBSSTC, Ferozepur (Pb.), India)
3
(M.Tech Scholar, Department of ECE, SBSSTC, Ferozepur (Pb.),India)
Abstract: A wireless sensor network is a gathering of specific transducers with a correspondences foundation
for observing and recording conditions at diverse areas. Ant colony optimization algorithm (ACO) is a
probabilistic procedure for tackling computational issues which can be lessened to discovering great ways
through diagrams. Clustering is the undertaking of collection a set of items in such a route, to the point that
questions in the same gathering are more comparative (in some way or an alternate) to one another than to
those in dissimilar gatherings (clusters).We will execute this by utilizing NS-2 Simulator.
Keywords: Ant Colony Optimization, clustering, energy efficiency, WSN
I. Introduction
A wireless sensor network is a gathering of specific transducers with a correspondences foundation for
observing and recording conditions at diverse areas. Generally checked parameters are temperature, humidity,
weight, wind direction and velocity, enlightenment force, vibration power, sound force, force line voltage,
substance focuses, pollutant and basic body capacities. A sensor system comprises of various detection stations
called sensor hubs, each of which is little, lightweight and versatile. Each sensor hub is outfitted with a
transducer, microcomputer, handset and force source. The transducer produces electrical signs focused around
sensed physical impacts and phenomena. The microcomputer courses of action and stores the sensor yield. The
handset gets charges from a focal PC and transmits information to that PC. The power for every sensor hub is
gotten from a battery.
A Wireless Sensor Network Mobile communications and wireless networking technology has seen a
third time advancement. In technological advancements and also in application demands various classes of
communication networks have combined like Cellular networks, Ad hoc Networks, Sensor Networks and Mesh
Networks. Cellular network depend upon infrastructure. Ad hoc networks are comes in the category of wireless
networks that organize multi hop radio relaying when the nodes are dynamically and arbitrarily located. Ad-hoc
network are does not depend upon network. Nodes measure the ambient conditions in the environment
surrounding them. These measurements include signal transformation that can be processed to show some
characteristics about the phenomenon. The data collected is routed to sink node which is very special node
.Then by using internet or satellite the sink node send data to user, through a gateway.
II. Important Terms In WSN
2.1 Sensor Node
A sensor node is the center part of a WSN. Sensor nodes can tackle numerous parts in a system, for
example, simple sensing; data storage; routing; and data processing.
2.2 Clusters
Clusters are the hierarchical unit for WSNs. The thick way of these net- works obliges the requirement
for them to be separated into clusters to simplify tasks such a Communication.
2.3 Cluster Heads
Clusters heads are the association pioneer of a cluster. They frequently are obliged to arrange exercises
in the cluster. These tasks incorporate yet are not restricted to data-aggregation and sorting out the
communication schedule of a cluster.
2.4 Base Station
Base station is at the upper level of the progressive WSN. It gives the communication interface
between the sensor network and the end-client.
Ant Colony Optimization for Wireless Sensor Network: A Review
DOI: 10.9790/0661-17318992 www.iosrjournals.org 90 | Page
2.5 End User
The information in a sensor network can be utilized for an extensive variety of uses. Hence, a specific
application may make utilization of the system information over the web, utilizing a PDA, or even a desktop PC.
III. Routing Protocols in WSN
3.1 Location-based Protocols
In area based conventions, sensor hubs are tended to by method for their areas. Area data for sensor
hubs is needed for sensor organizes by the greater part of the steering conventions to compute the separation
between two specific hubs so that vitality utilization can be evaluated. In this segment, we display a specimen of
area mind full routing protocols proposed for WSNs.
3.2 Data Centric Protocols
Data-centric protocols contrast from traditional address-centric protocols in the way that the
information is sent from source sensors to the sink. In address-centric protocol each one source sensor that has
the proper information reacts by sending its information to the sink freely of all different sensors. Be that as it
may, in data-centric protocols, when the source sensors send their information to the sink, halfway sensors can
perform some manifestation of collection on the information starting from different source sensors and send the
totaled information around the sink. This procedure can bring about vitality funds due to less transmission
needed to send the information from the sources to the sink.
3.3 Mobility-based Protocols
Mobility brings new difficulties to routing protocols in WSNs. Sink versatility requires energy efficient
protocols to ensure information conveyance started from source sensors to portable sinks.
3.4 Multipath-based Protocols
Considering information transmission between source sensors and the sink, there are two routing
paradigms: single-way routing and multipath routing. In single-way routing, each one source sensor sends its
information to the sink by means of the briefest way. In multipath routing, each one source sensor finds to start
with k shortest ways to the sink and partitions its heap evenly among these ways.
IV. Ant Colony Optimization Algorithm
This algorithm is an individual of the ant colony algorithm family, in swarm intelligence method, and it
constitutes some met heuristic improvements. At first proposed by Marco Dorigo in 1992 in his PhD thesis, the
first algorithm was expecting to hunt down an ideal way in a graph, in light of the conduct of ants looking for a
way between their colony and a source of food. The first thought has since differentiated to understand a more
extensive class of numerical issues, and accordingly, a few issues have developed, drawing on different parts of
the conduct of ants.
4.1 Related work
Yan Liang et al [1] “A Biologically Inspired Sensor Wakeup Control Method for Wireless Sensor
Networks” This paper displays an artificial ant colony approachto distributed sensor wakeup control (SWC) in
wireless sensor networks(WSN) to finish the joint errand of surveillance and target following. Every sensor hub
is displayed as a ground dwelling insect, and the issue of target discovery is demonstrated as the sustenance
finding by ants. Once the sustenance is found, the ground dwelling insect will discharge pheromone. The
correspondence, nullification, and combination of target data are demonstrated as the methods of pheromone
dispersion, misfortune, and collection. Since the collected pheromone can gauge the presence of a target, it is
utilized to focus the likelihood of ground dwelling insect seeking action in the following round. To the best of
our insight, this is the primary organically motivated SWC technique in the WSN. Such a organically motivated
strategy has different alluring points of interest. First and foremost, it is distributive and does not oblige an
unified control alternately group pioneers. In this way, it is free of the issues created by pioneer disappointments
and can spare the correspondence cost for pioneer choice. Second, it is strong to false cautions on the grounds
that the performance is gathered transiently and spatially and hence is more solid for wakeup control. Third, the
proposed system does not require the information of hub position. Two hypotheses are displayed to
diagnostically focus the key parameters in the system: the base what's more greatest performance. Recreations
are completed to assess the execution of the proposed system in examination with agent techniques.
Liu Yanfei et al [2] “An improved design of ZigBee Wireless Sensor Network” ZigBee is a low rate,
low power utilization remote correspondence innovation, which can be generally utilized as a part of the remote
sensor system (WSN). WSN is made out of many hubs, the majority of the sensor hubs data in the system will
be sent to the facilitator, so the organizer typically attempt the undertaking to gather sensor information data,
Ant Colony Optimization for Wireless Sensor Network: A Review
DOI: 10.9790/0661-17318992 www.iosrjournals.org 91 | Page
moderate the data, prepare the data, furthermore as the interface of the system with the client. The facilitator
ought to speak with the host PC by the upper convention, so the organizer conveys an excess of burden,
particularly in the expansive scale remote sensor system, which will have a terrible impact on the system
correspondence. The impact demonstrated terrible ongoing, information bundle misfortune, and steadiness
diminish. The paper introduces an enhanced configuration of ZigBee Wireless Sensor Network. In the system
the facilitator just manages the undertaking on the ZigBee system, the rest undertakings will be prepared by an
alternate processor. The processor joined with the Coordinator by RS-232 interface. All information data will be
sent to the processor however the serial port. So the processor embraces the errand to manage information,
preserve the system data, and speak with the host PC. Finally we tried the enhanced ZigBee remote system and
check the impact.
Modares, H et al [3] “Overview of Security Issues in Wireless Sensor Networks” Wireless sensor
networks (WSN) are for the most part set up for social affair records from insecure environment. Almost all
security protocols’ for WSN accept that the adversary can attain to completely control over a sensor hub by
method for direct physical access. The presence of sensor systems as one of the primary innovation later on has
postured different difficulties to specialists. Remote sensor systems are made out of expansive number of small
sensor hubs, running independently, and in different cases, with none get to renewable vitality assets. Likewise,
security being major to the acknowledgement and utilize of sensor systems for various applications, additionally
diverse set of difficulties in sensor systems are existed. In this paper we will concentrate on security of Wireless
Sensor Network.
Marriwala, N et al [4] “An approach to increase the wireless sensor network lifetime” A wireless
sensor network comprise of little gadgets, called sensor hubs that are outfitted with sensors to screen the
physical and natural conditions, for example, weight, temperature, stickiness, movement, speed and so on. The
hubs in the remote sensor system were battery fueled, so one of the vital issues in remote sensor system is the
intrinsic constrained battery control inside system sensor hubs. Minimizing vitality dispersal and amplifying
system lifetime are imperative issues in the configuration of sensor systems so if the force depleted hub would
stop from the system, and it general influence the system lifetime. Minimizing vitality dissemination and
boosting system lifetime are imperative issues in the outline of uses and conventions for sensor systems. In this
paper there is change of lifetime of remote sensor arrange in wording expanding alive hubs in system by
utilizing an alternate methodology to choose group head. The bunch head determination is focused around the
premise of greatest leftover vitality and least separation and picks an ideal congratulatory gesture between the
group heads to transmit to the base station.
Mittal, R. et al [5] “Wireless sensor networks for monitoring the environmental activities” The region
of sensor system has a long history and numerous sort of sensor gadgets are utilized as a part of different
genuine applications. Here, we present Wireless sensor system which when consolidate with different zones
then assumes an imperative part in investigating the information of backwoods temperature, bioinformatics,
water pollution, activity control, telecom and so forth. Because of the progression in the territory of remote
sensor system and their capacity to create huge measure of spatial/transient information, dependably pull in
specialists for applying information mining systems and getting intriguing results. Remote sensor arranges in
checking the ecological exercises develops and this pull in more prominent investment and test for discovering
the examples from substantial measure of spatial/transient datasets. These datasets are produced by sensor hubs
which are conveyed in some tropical locales or from some wearable sensor hubs which are joined with wild
creatures in natural life hundreds of years. Sensor systems create constant stream of information over the long
haul. Thus, Data mining procedures dependably assumes an imperative part for extricating the learning structure
huge remote sensor system information. In this paper, we show the recognition of sensor information
abnormalities, Sensor information grouping, Pattern matching and their intriguing results and with these results
we can investigate the sensor hub information in distinctive ways.
Sobralet al [6] “Automated design of fuzzy rule base using ant colony optimization for improving the
performance in Wireless Sensor Networks “In this paper author displays a proposition for evaluating the nature
of courses utilizing fuzzy system to help the Directed Diffusion directing protocol. The fuzzy system is utilized
to gauge the level of the course quality, in view of the number of hops and the least vitality level among the
nodes that structure the route. An Ant Colony Optimization (ACO) algorithm is utilized to change in a
programmed way the standard base of the fuzzy system with a specific end goal to enhance the order method of
courses, subsequently expanding the vitality proficiency of the system. The simulations demonstrated that the
proposition is successful from the perspective of the packet loss rate, the important time to send a particular
number of messages to the sink node and the lifetime of the first sensor node, which is characterized as the
period that the first sensor node die due to the battery exhaustion.
Ant Colony Optimization for Wireless Sensor Network: A Review
DOI: 10.9790/0661-17318992 www.iosrjournals.org 92 | Page
V. Techniques Used
5.1 Data Mining
Data mining is the computational methodology of finding patterns in large information sets including
systems at the crossing point of artificial consciousness, machine learning, insights, and database systems. The
general objective of the information mining procedure is to concentrate data from an information set and change
it into a reasonable structure for further use. Aside from the crude examination step, it includes database and
information administration perspectives, information preprocessing, model and derivation contemplations,
interestingness measurements, complexity contemplations, post-handling of found structures, visualization, and
online updating.
5.2 Ant Colony Optimization algorithm
The ant colony optimization algorithm (ACO) is a probabilistic system for tackling computational
issues which can be diminished to discovering great ways through diagrams. This algorithm is a part of the ant
colony algorithms family, in swarm insights routines, and it constitutes some Meta heuristic advancements.
VI. Conclusion
Previous work presents an artificial ant colony approach to distributed sensor wakeup control (SWC) in
wireless sensor networks (WSN) to accomplish the joint task of surveillance and target tracking. Once the food
is found, the ant will release pheromone. The communication, nullification, and combination of target data are
displayed as the techniques of pheromone dissemination, misfortune, and aggregation. Since the aggregated
pheromone can measure the presence of a target, it is utilized to focus the likelihood of ant-searching activity
movement in the following round. This method has multiple advantages but still it lacks by various ways like
there is a lack of criteria for selection of clusters that which one are affected or not and also affected area node
wake up all other nodes, this need to be improve. In our work we introduce new probability function for routing,
introduce Intensity based wake up selection in the cluster, find effected area in the cluster & find efficiency
routing for affected clusters.
References
[1]. Y. Liang and R. Wang, A Biologically Inspired Sensor Wakeup Control Method for Wireless Sensor Networks, IEEE Transactions
On Systems, Man and Cybernetics, pp. 525-538, 2010.
[2]. L.Yanfei, Q. Xiaojun and Z. Yunhe , An improved design of ZigBee Wireless Sensor Network, 2nd IEEE International Conference
onComputer Science and Information Technology, pp. 515-518, 2009.
[3]. H.Modares and A,Moravejosharieh, “Overview of Security Issues in Wireless Sensor Networks, IEEE Third International
Conference onComputational Intelligence, Modelling and Simulation, pp. 308-311, 2011.
[4]. N.Marriwala and P.Rathee, An approach to increase the wireless sensor network lifetime, IEEE World Congress on Information and
Communication Technologies, pp. 495-499, 2012.
[5]. R.Mittal and M.P.S Bhatia, Wireless sensor networks for monitoring the environmental activities, IEEE International Conference
onComputational Intelligence and Computing Research, pp. 1-5, 2010.
[6]. J.V.V Sobral, Automated design of fuzzy rule base using ant colony optimization for improving the performance in Wireless Sensor
Networks, pp. 1 – 8, IEEE, 2013.
[7]. U. Ahmed and F.B. Hussain, Energy efficient routing protocol for zone based mobile sensor networks, IEEE 7th international
Wireless Communications and Mobile Computing conference, pp. 1081-1086, 2011.
[8]. Y. Han and Z. Lin, A geographically opportunistic routing protocol used in mobile wireless sensor networks, 9th IEEE international
conference on Networking, Sensing and Control, pp. 216-221, 2012.
[9]. A. Kuamr and N.V. energy efficiency and network lifetime maximization in wireless sensor networks using Improved Ant Colony
Optimization, pp 1-5, IEEE, 2012.

More Related Content

What's hot

Security based Clock Synchronization technique in Wireless Sensor Network for...
Security based Clock Synchronization technique in Wireless Sensor Network for...Security based Clock Synchronization technique in Wireless Sensor Network for...
Security based Clock Synchronization technique in Wireless Sensor Network for...iosrjce
 
Efficient IOT Based Sensor Data Analysis in Wireless Sensor Networks with Cloud
Efficient IOT Based Sensor Data Analysis in Wireless Sensor Networks with CloudEfficient IOT Based Sensor Data Analysis in Wireless Sensor Networks with Cloud
Efficient IOT Based Sensor Data Analysis in Wireless Sensor Networks with Cloudiosrjce
 
An Analytical Model of Latency and Data Aggregation Tradeoff in Cluster Based...
An Analytical Model of Latency and Data Aggregation Tradeoff in Cluster Based...An Analytical Model of Latency and Data Aggregation Tradeoff in Cluster Based...
An Analytical Model of Latency and Data Aggregation Tradeoff in Cluster Based...ijsrd.com
 
Protected Data Collection In WSN by Filtering Attackers Influence (Published ...
Protected Data Collection In WSN by Filtering Attackers Influence (Published ...Protected Data Collection In WSN by Filtering Attackers Influence (Published ...
Protected Data Collection In WSN by Filtering Attackers Influence (Published ...sangasandeep
 
Iaetsd a survey on enroute filtering scheme in
Iaetsd a survey on enroute filtering scheme inIaetsd a survey on enroute filtering scheme in
Iaetsd a survey on enroute filtering scheme inIaetsd Iaetsd
 
A Generic Open Source Framework for Auto Generation of Data Manipulation Comm...
A Generic Open Source Framework for Auto Generation of Data Manipulation Comm...A Generic Open Source Framework for Auto Generation of Data Manipulation Comm...
A Generic Open Source Framework for Auto Generation of Data Manipulation Comm...iosrjce
 
Online stream mining approach for clustering network traffic
Online stream mining approach for clustering network trafficOnline stream mining approach for clustering network traffic
Online stream mining approach for clustering network trafficeSAT Publishing House
 
Online stream mining approach for clustering network traffic
Online stream mining approach for clustering network trafficOnline stream mining approach for clustering network traffic
Online stream mining approach for clustering network trafficeSAT Journals
 
A HYBRID FUZZY SYSTEM BASED COOPERATIVE SCALABLE AND SECURED LOCALIZATION SCH...
A HYBRID FUZZY SYSTEM BASED COOPERATIVE SCALABLE AND SECURED LOCALIZATION SCH...A HYBRID FUZZY SYSTEM BASED COOPERATIVE SCALABLE AND SECURED LOCALIZATION SCH...
A HYBRID FUZZY SYSTEM BASED COOPERATIVE SCALABLE AND SECURED LOCALIZATION SCH...ijwmn
 
A NOVEL APPROACH FOR ENERGY EFFICIENT HIERARCHY BASED ROUTING IN SENSOR NETWO...
A NOVEL APPROACH FOR ENERGY EFFICIENT HIERARCHY BASED ROUTING IN SENSOR NETWO...A NOVEL APPROACH FOR ENERGY EFFICIENT HIERARCHY BASED ROUTING IN SENSOR NETWO...
A NOVEL APPROACH FOR ENERGY EFFICIENT HIERARCHY BASED ROUTING IN SENSOR NETWO...cscpconf
 
DESIGNING SECURE CLUSTERING PROTOCOL WITH THE APPROACH OF REDUCING ENERGY CON...
DESIGNING SECURE CLUSTERING PROTOCOL WITH THE APPROACH OF REDUCING ENERGY CON...DESIGNING SECURE CLUSTERING PROTOCOL WITH THE APPROACH OF REDUCING ENERGY CON...
DESIGNING SECURE CLUSTERING PROTOCOL WITH THE APPROACH OF REDUCING ENERGY CON...IJCNCJournal
 
ENERGY EFFICIENT, LIFETIME IMPROVING AND SECURE PERIODIC DATA COLLECTION PROT...
ENERGY EFFICIENT, LIFETIME IMPROVING AND SECURE PERIODIC DATA COLLECTION PROT...ENERGY EFFICIENT, LIFETIME IMPROVING AND SECURE PERIODIC DATA COLLECTION PROT...
ENERGY EFFICIENT, LIFETIME IMPROVING AND SECURE PERIODIC DATA COLLECTION PROT...ijcsa
 
A novel defence scheme against selfish Node attack in manet
A novel defence scheme against selfish Node attack in manetA novel defence scheme against selfish Node attack in manet
A novel defence scheme against selfish Node attack in manetijcsa
 
An Adaptive Mobility Based Attack Detection Mechanism to Detect Selective For...
An Adaptive Mobility Based Attack Detection Mechanism to Detect Selective For...An Adaptive Mobility Based Attack Detection Mechanism to Detect Selective For...
An Adaptive Mobility Based Attack Detection Mechanism to Detect Selective For...paperpublications3
 
Ensure Security and Scalable Performance in Multiple Relay Networks
Ensure Security and Scalable Performance in Multiple Relay NetworksEnsure Security and Scalable Performance in Multiple Relay Networks
Ensure Security and Scalable Performance in Multiple Relay NetworksEditor IJCATR
 
Characterization of directed diffusion protocol in wireless sensor network
Characterization of directed diffusion protocol in wireless sensor networkCharacterization of directed diffusion protocol in wireless sensor network
Characterization of directed diffusion protocol in wireless sensor networkijwmn
 
NOVEL HYBRID INTRUSION DETECTION SYSTEM FOR CLUSTERED WIRELESS SENSOR NETWORK
NOVEL HYBRID INTRUSION DETECTION SYSTEM FOR CLUSTERED WIRELESS SENSOR NETWORKNOVEL HYBRID INTRUSION DETECTION SYSTEM FOR CLUSTERED WIRELESS SENSOR NETWORK
NOVEL HYBRID INTRUSION DETECTION SYSTEM FOR CLUSTERED WIRELESS SENSOR NETWORKIJNSA Journal
 
Secure data aggregation technique for wireless sensor networks in the presenc...
Secure data aggregation technique for wireless sensor networks in the presenc...Secure data aggregation technique for wireless sensor networks in the presenc...
Secure data aggregation technique for wireless sensor networks in the presenc...LogicMindtech Nologies
 
DATA TRANSMISSION IN WIRELESS SENSOR NETWORKS FOR EFFECTIVE AND SECURE COMMUN...
DATA TRANSMISSION IN WIRELESS SENSOR NETWORKS FOR EFFECTIVE AND SECURE COMMUN...DATA TRANSMISSION IN WIRELESS SENSOR NETWORKS FOR EFFECTIVE AND SECURE COMMUN...
DATA TRANSMISSION IN WIRELESS SENSOR NETWORKS FOR EFFECTIVE AND SECURE COMMUN...IJEEE
 

What's hot (20)

Security based Clock Synchronization technique in Wireless Sensor Network for...
Security based Clock Synchronization technique in Wireless Sensor Network for...Security based Clock Synchronization technique in Wireless Sensor Network for...
Security based Clock Synchronization technique in Wireless Sensor Network for...
 
Efficient IOT Based Sensor Data Analysis in Wireless Sensor Networks with Cloud
Efficient IOT Based Sensor Data Analysis in Wireless Sensor Networks with CloudEfficient IOT Based Sensor Data Analysis in Wireless Sensor Networks with Cloud
Efficient IOT Based Sensor Data Analysis in Wireless Sensor Networks with Cloud
 
An Analytical Model of Latency and Data Aggregation Tradeoff in Cluster Based...
An Analytical Model of Latency and Data Aggregation Tradeoff in Cluster Based...An Analytical Model of Latency and Data Aggregation Tradeoff in Cluster Based...
An Analytical Model of Latency and Data Aggregation Tradeoff in Cluster Based...
 
Protected Data Collection In WSN by Filtering Attackers Influence (Published ...
Protected Data Collection In WSN by Filtering Attackers Influence (Published ...Protected Data Collection In WSN by Filtering Attackers Influence (Published ...
Protected Data Collection In WSN by Filtering Attackers Influence (Published ...
 
Iaetsd a survey on enroute filtering scheme in
Iaetsd a survey on enroute filtering scheme inIaetsd a survey on enroute filtering scheme in
Iaetsd a survey on enroute filtering scheme in
 
A Generic Open Source Framework for Auto Generation of Data Manipulation Comm...
A Generic Open Source Framework for Auto Generation of Data Manipulation Comm...A Generic Open Source Framework for Auto Generation of Data Manipulation Comm...
A Generic Open Source Framework for Auto Generation of Data Manipulation Comm...
 
Online stream mining approach for clustering network traffic
Online stream mining approach for clustering network trafficOnline stream mining approach for clustering network traffic
Online stream mining approach for clustering network traffic
 
Online stream mining approach for clustering network traffic
Online stream mining approach for clustering network trafficOnline stream mining approach for clustering network traffic
Online stream mining approach for clustering network traffic
 
A HYBRID FUZZY SYSTEM BASED COOPERATIVE SCALABLE AND SECURED LOCALIZATION SCH...
A HYBRID FUZZY SYSTEM BASED COOPERATIVE SCALABLE AND SECURED LOCALIZATION SCH...A HYBRID FUZZY SYSTEM BASED COOPERATIVE SCALABLE AND SECURED LOCALIZATION SCH...
A HYBRID FUZZY SYSTEM BASED COOPERATIVE SCALABLE AND SECURED LOCALIZATION SCH...
 
A NOVEL APPROACH FOR ENERGY EFFICIENT HIERARCHY BASED ROUTING IN SENSOR NETWO...
A NOVEL APPROACH FOR ENERGY EFFICIENT HIERARCHY BASED ROUTING IN SENSOR NETWO...A NOVEL APPROACH FOR ENERGY EFFICIENT HIERARCHY BASED ROUTING IN SENSOR NETWO...
A NOVEL APPROACH FOR ENERGY EFFICIENT HIERARCHY BASED ROUTING IN SENSOR NETWO...
 
DESIGNING SECURE CLUSTERING PROTOCOL WITH THE APPROACH OF REDUCING ENERGY CON...
DESIGNING SECURE CLUSTERING PROTOCOL WITH THE APPROACH OF REDUCING ENERGY CON...DESIGNING SECURE CLUSTERING PROTOCOL WITH THE APPROACH OF REDUCING ENERGY CON...
DESIGNING SECURE CLUSTERING PROTOCOL WITH THE APPROACH OF REDUCING ENERGY CON...
 
ENERGY EFFICIENT, LIFETIME IMPROVING AND SECURE PERIODIC DATA COLLECTION PROT...
ENERGY EFFICIENT, LIFETIME IMPROVING AND SECURE PERIODIC DATA COLLECTION PROT...ENERGY EFFICIENT, LIFETIME IMPROVING AND SECURE PERIODIC DATA COLLECTION PROT...
ENERGY EFFICIENT, LIFETIME IMPROVING AND SECURE PERIODIC DATA COLLECTION PROT...
 
A novel defence scheme against selfish Node attack in manet
A novel defence scheme against selfish Node attack in manetA novel defence scheme against selfish Node attack in manet
A novel defence scheme against selfish Node attack in manet
 
An Adaptive Mobility Based Attack Detection Mechanism to Detect Selective For...
An Adaptive Mobility Based Attack Detection Mechanism to Detect Selective For...An Adaptive Mobility Based Attack Detection Mechanism to Detect Selective For...
An Adaptive Mobility Based Attack Detection Mechanism to Detect Selective For...
 
Ensure Security and Scalable Performance in Multiple Relay Networks
Ensure Security and Scalable Performance in Multiple Relay NetworksEnsure Security and Scalable Performance in Multiple Relay Networks
Ensure Security and Scalable Performance in Multiple Relay Networks
 
Characterization of directed diffusion protocol in wireless sensor network
Characterization of directed diffusion protocol in wireless sensor networkCharacterization of directed diffusion protocol in wireless sensor network
Characterization of directed diffusion protocol in wireless sensor network
 
NOVEL HYBRID INTRUSION DETECTION SYSTEM FOR CLUSTERED WIRELESS SENSOR NETWORK
NOVEL HYBRID INTRUSION DETECTION SYSTEM FOR CLUSTERED WIRELESS SENSOR NETWORKNOVEL HYBRID INTRUSION DETECTION SYSTEM FOR CLUSTERED WIRELESS SENSOR NETWORK
NOVEL HYBRID INTRUSION DETECTION SYSTEM FOR CLUSTERED WIRELESS SENSOR NETWORK
 
Secure data aggregation technique for wireless sensor networks in the presenc...
Secure data aggregation technique for wireless sensor networks in the presenc...Secure data aggregation technique for wireless sensor networks in the presenc...
Secure data aggregation technique for wireless sensor networks in the presenc...
 
F33022028
F33022028F33022028
F33022028
 
DATA TRANSMISSION IN WIRELESS SENSOR NETWORKS FOR EFFECTIVE AND SECURE COMMUN...
DATA TRANSMISSION IN WIRELESS SENSOR NETWORKS FOR EFFECTIVE AND SECURE COMMUN...DATA TRANSMISSION IN WIRELESS SENSOR NETWORKS FOR EFFECTIVE AND SECURE COMMUN...
DATA TRANSMISSION IN WIRELESS SENSOR NETWORKS FOR EFFECTIVE AND SECURE COMMUN...
 

Viewers also liked (20)

F1102024349
F1102024349F1102024349
F1102024349
 
J010316368
J010316368J010316368
J010316368
 
G1103034042
G1103034042G1103034042
G1103034042
 
F010232834
F010232834F010232834
F010232834
 
A010210106
A010210106A010210106
A010210106
 
L1303068693
L1303068693L1303068693
L1303068693
 
I1103016569
I1103016569I1103016569
I1103016569
 
B010611015
B010611015B010611015
B010611015
 
F012334045
F012334045F012334045
F012334045
 
F012142530
F012142530F012142530
F012142530
 
P01226101106
P01226101106P01226101106
P01226101106
 
E1803053238
E1803053238E1803053238
E1803053238
 
F018113743
F018113743F018113743
F018113743
 
Toxicological Effect of Effluents from Indomie Plc on Some Biochemical Parame...
Toxicological Effect of Effluents from Indomie Plc on Some Biochemical Parame...Toxicological Effect of Effluents from Indomie Plc on Some Biochemical Parame...
Toxicological Effect of Effluents from Indomie Plc on Some Biochemical Parame...
 
G010633439
G010633439G010633439
G010633439
 
K010416167
K010416167K010416167
K010416167
 
Effective Waste Management and Environmental Control
Effective Waste Management and Environmental ControlEffective Waste Management and Environmental Control
Effective Waste Management and Environmental Control
 
G017154852
G017154852G017154852
G017154852
 
T01761138146
T01761138146T01761138146
T01761138146
 
M017619194
M017619194M017619194
M017619194
 

Similar to N017318992

An Energy-Efficient Min-Max Optimization with RSA Security in Wireless Sensor...
An Energy-Efficient Min-Max Optimization with RSA Security in Wireless Sensor...An Energy-Efficient Min-Max Optimization with RSA Security in Wireless Sensor...
An Energy-Efficient Min-Max Optimization with RSA Security in Wireless Sensor...IJMTST Journal
 
AN IMPROVED DECENTRALIZED APPROACH FOR TRACKING MULTIPLE MOBILE TARGETS THROU...
AN IMPROVED DECENTRALIZED APPROACH FOR TRACKING MULTIPLE MOBILE TARGETS THROU...AN IMPROVED DECENTRALIZED APPROACH FOR TRACKING MULTIPLE MOBILE TARGETS THROU...
AN IMPROVED DECENTRALIZED APPROACH FOR TRACKING MULTIPLE MOBILE TARGETS THROU...ijwmn
 
Node Deployment in Homogeneous and Heterogeneous Wireless Sensor Network
Node Deployment in Homogeneous and Heterogeneous Wireless Sensor NetworkNode Deployment in Homogeneous and Heterogeneous Wireless Sensor Network
Node Deployment in Homogeneous and Heterogeneous Wireless Sensor NetworkIJMTST Journal
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)IJERD Editor
 
Wireless Micro-Sensor Network Models
Wireless Micro-Sensor Network ModelsWireless Micro-Sensor Network Models
Wireless Micro-Sensor Network ModelsIOSR Journals
 
International journal of computer science and innovation vol 2015-n1-paper5
International journal of computer science and innovation  vol 2015-n1-paper5International journal of computer science and innovation  vol 2015-n1-paper5
International journal of computer science and innovation vol 2015-n1-paper5sophiabelthome
 
A Survey of Fuzzy Logic Based Congestion Estimation Techniques in Wireless S...
A Survey of Fuzzy Logic Based Congestion Estimation  Techniques in Wireless S...A Survey of Fuzzy Logic Based Congestion Estimation  Techniques in Wireless S...
A Survey of Fuzzy Logic Based Congestion Estimation Techniques in Wireless S...IOSR Journals
 
Spatial Correlation Based Medium Access Control Protocol Using DSR & AODV Rou...
Spatial Correlation Based Medium Access Control Protocol Using DSR & AODV Rou...Spatial Correlation Based Medium Access Control Protocol Using DSR & AODV Rou...
Spatial Correlation Based Medium Access Control Protocol Using DSR & AODV Rou...IOSR Journals
 
Data Centric Approach Based Protocol using Evolutionary Approach in WSN
Data Centric Approach Based Protocol using Evolutionary Approach in WSNData Centric Approach Based Protocol using Evolutionary Approach in WSN
Data Centric Approach Based Protocol using Evolutionary Approach in WSNijsrd.com
 
Improvising Network life time of Wireless sensor networks using mobile data a...
Improvising Network life time of Wireless sensor networks using mobile data a...Improvising Network life time of Wireless sensor networks using mobile data a...
Improvising Network life time of Wireless sensor networks using mobile data a...Editor IJCATR
 
Volume 2-issue-6-2102-2107
Volume 2-issue-6-2102-2107Volume 2-issue-6-2102-2107
Volume 2-issue-6-2102-2107Editor IJARCET
 
Volume 2-issue-6-2102-2107
Volume 2-issue-6-2102-2107Volume 2-issue-6-2102-2107
Volume 2-issue-6-2102-2107Editor IJARCET
 
EFFECTIVE AND SECURE DATA COMMUNICATION IN WSNs CONSIDERING TRANSFER MODULE O...
EFFECTIVE AND SECURE DATA COMMUNICATION IN WSNs CONSIDERING TRANSFER MODULE O...EFFECTIVE AND SECURE DATA COMMUNICATION IN WSNs CONSIDERING TRANSFER MODULE O...
EFFECTIVE AND SECURE DATA COMMUNICATION IN WSNs CONSIDERING TRANSFER MODULE O...IJEEE
 
Fault Diagonosis Approach for WSN using Normal Bias Technique
Fault Diagonosis Approach for WSN using Normal Bias TechniqueFault Diagonosis Approach for WSN using Normal Bias Technique
Fault Diagonosis Approach for WSN using Normal Bias TechniqueIDES Editor
 
Proactive Data Reporting of Wireless sensor Network using Wake Up Scheduling ...
Proactive Data Reporting of Wireless sensor Network using Wake Up Scheduling ...Proactive Data Reporting of Wireless sensor Network using Wake Up Scheduling ...
Proactive Data Reporting of Wireless sensor Network using Wake Up Scheduling ...ijsrd.com
 

Similar to N017318992 (20)

An Energy-Efficient Min-Max Optimization with RSA Security in Wireless Sensor...
An Energy-Efficient Min-Max Optimization with RSA Security in Wireless Sensor...An Energy-Efficient Min-Max Optimization with RSA Security in Wireless Sensor...
An Energy-Efficient Min-Max Optimization with RSA Security in Wireless Sensor...
 
AN IMPROVED DECENTRALIZED APPROACH FOR TRACKING MULTIPLE MOBILE TARGETS THROU...
AN IMPROVED DECENTRALIZED APPROACH FOR TRACKING MULTIPLE MOBILE TARGETS THROU...AN IMPROVED DECENTRALIZED APPROACH FOR TRACKING MULTIPLE MOBILE TARGETS THROU...
AN IMPROVED DECENTRALIZED APPROACH FOR TRACKING MULTIPLE MOBILE TARGETS THROU...
 
Node Deployment in Homogeneous and Heterogeneous Wireless Sensor Network
Node Deployment in Homogeneous and Heterogeneous Wireless Sensor NetworkNode Deployment in Homogeneous and Heterogeneous Wireless Sensor Network
Node Deployment in Homogeneous and Heterogeneous Wireless Sensor Network
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)
 
F0361026033
F0361026033F0361026033
F0361026033
 
Wireless Micro-Sensor Network Models
Wireless Micro-Sensor Network ModelsWireless Micro-Sensor Network Models
Wireless Micro-Sensor Network Models
 
International journal of computer science and innovation vol 2015-n1-paper5
International journal of computer science and innovation  vol 2015-n1-paper5International journal of computer science and innovation  vol 2015-n1-paper5
International journal of computer science and innovation vol 2015-n1-paper5
 
A Survey of Fuzzy Logic Based Congestion Estimation Techniques in Wireless S...
A Survey of Fuzzy Logic Based Congestion Estimation  Techniques in Wireless S...A Survey of Fuzzy Logic Based Congestion Estimation  Techniques in Wireless S...
A Survey of Fuzzy Logic Based Congestion Estimation Techniques in Wireless S...
 
Spatial Correlation Based Medium Access Control Protocol Using DSR & AODV Rou...
Spatial Correlation Based Medium Access Control Protocol Using DSR & AODV Rou...Spatial Correlation Based Medium Access Control Protocol Using DSR & AODV Rou...
Spatial Correlation Based Medium Access Control Protocol Using DSR & AODV Rou...
 
Data Centric Approach Based Protocol using Evolutionary Approach in WSN
Data Centric Approach Based Protocol using Evolutionary Approach in WSNData Centric Approach Based Protocol using Evolutionary Approach in WSN
Data Centric Approach Based Protocol using Evolutionary Approach in WSN
 
wireless sensor network
wireless sensor networkwireless sensor network
wireless sensor network
 
C1804011117
C1804011117C1804011117
C1804011117
 
Improvising Network life time of Wireless sensor networks using mobile data a...
Improvising Network life time of Wireless sensor networks using mobile data a...Improvising Network life time of Wireless sensor networks using mobile data a...
Improvising Network life time of Wireless sensor networks using mobile data a...
 
Volume 2-issue-6-2102-2107
Volume 2-issue-6-2102-2107Volume 2-issue-6-2102-2107
Volume 2-issue-6-2102-2107
 
Volume 2-issue-6-2102-2107
Volume 2-issue-6-2102-2107Volume 2-issue-6-2102-2107
Volume 2-issue-6-2102-2107
 
EFFECTIVE AND SECURE DATA COMMUNICATION IN WSNs CONSIDERING TRANSFER MODULE O...
EFFECTIVE AND SECURE DATA COMMUNICATION IN WSNs CONSIDERING TRANSFER MODULE O...EFFECTIVE AND SECURE DATA COMMUNICATION IN WSNs CONSIDERING TRANSFER MODULE O...
EFFECTIVE AND SECURE DATA COMMUNICATION IN WSNs CONSIDERING TRANSFER MODULE O...
 
Fault Diagonosis Approach for WSN using Normal Bias Technique
Fault Diagonosis Approach for WSN using Normal Bias TechniqueFault Diagonosis Approach for WSN using Normal Bias Technique
Fault Diagonosis Approach for WSN using Normal Bias Technique
 
E010412433
E010412433E010412433
E010412433
 
Energy aware routing for wireless sensor networks
Energy aware routing for wireless sensor networksEnergy aware routing for wireless sensor networks
Energy aware routing for wireless sensor networks
 
Proactive Data Reporting of Wireless sensor Network using Wake Up Scheduling ...
Proactive Data Reporting of Wireless sensor Network using Wake Up Scheduling ...Proactive Data Reporting of Wireless sensor Network using Wake Up Scheduling ...
Proactive Data Reporting of Wireless sensor Network using Wake Up Scheduling ...
 

More from IOSR Journals (20)

A011140104
A011140104A011140104
A011140104
 
M0111397100
M0111397100M0111397100
M0111397100
 
L011138596
L011138596L011138596
L011138596
 
K011138084
K011138084K011138084
K011138084
 
J011137479
J011137479J011137479
J011137479
 
I011136673
I011136673I011136673
I011136673
 
G011134454
G011134454G011134454
G011134454
 
H011135565
H011135565H011135565
H011135565
 
F011134043
F011134043F011134043
F011134043
 
E011133639
E011133639E011133639
E011133639
 
D011132635
D011132635D011132635
D011132635
 
C011131925
C011131925C011131925
C011131925
 
B011130918
B011130918B011130918
B011130918
 
A011130108
A011130108A011130108
A011130108
 
I011125160
I011125160I011125160
I011125160
 
H011124050
H011124050H011124050
H011124050
 
G011123539
G011123539G011123539
G011123539
 
F011123134
F011123134F011123134
F011123134
 
E011122530
E011122530E011122530
E011122530
 
D011121524
D011121524D011121524
D011121524
 

Recently uploaded

The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
APIForce Zurich 5 April Automation LPDG
APIForce Zurich 5 April  Automation LPDGAPIForce Zurich 5 April  Automation LPDG
APIForce Zurich 5 April Automation LPDGMarianaLemus7
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr LapshynFwdays
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Enterprise Knowledge
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxOnBoard
 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxnull - The Open Security Community
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions
 
Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Neo4j
 

Recently uploaded (20)

The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
APIForce Zurich 5 April Automation LPDG
APIForce Zurich 5 April  Automation LPDGAPIForce Zurich 5 April  Automation LPDG
APIForce Zurich 5 April Automation LPDG
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptxVulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping Elbows
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024
 

N017318992

  • 1. IOSR Journal of Computer Engineering (IOSR-JCE) e-ISSN: 2278-0661,p-ISSN: 2278-8727, Volume 17, Issue 3, Ver. 1 (May – Jun. 2015), PP 89-92 www.iosrjournals.org DOI: 10.9790/0661-17318992 www.iosrjournals.org 89 | Page Ant Colony Optimization for Wireless Sensor Network: A Review Benu1 , Chakshu Goel2 , Sheenam3 1 (Lecturer, Department of ECE, SBSSTC Poly wing, Ferozepur (Pb.), India) 2 (Assistant Professor, Department of ECE, SBSSTC, Ferozepur (Pb.), India) 3 (M.Tech Scholar, Department of ECE, SBSSTC, Ferozepur (Pb.),India) Abstract: A wireless sensor network is a gathering of specific transducers with a correspondences foundation for observing and recording conditions at diverse areas. Ant colony optimization algorithm (ACO) is a probabilistic procedure for tackling computational issues which can be lessened to discovering great ways through diagrams. Clustering is the undertaking of collection a set of items in such a route, to the point that questions in the same gathering are more comparative (in some way or an alternate) to one another than to those in dissimilar gatherings (clusters).We will execute this by utilizing NS-2 Simulator. Keywords: Ant Colony Optimization, clustering, energy efficiency, WSN I. Introduction A wireless sensor network is a gathering of specific transducers with a correspondences foundation for observing and recording conditions at diverse areas. Generally checked parameters are temperature, humidity, weight, wind direction and velocity, enlightenment force, vibration power, sound force, force line voltage, substance focuses, pollutant and basic body capacities. A sensor system comprises of various detection stations called sensor hubs, each of which is little, lightweight and versatile. Each sensor hub is outfitted with a transducer, microcomputer, handset and force source. The transducer produces electrical signs focused around sensed physical impacts and phenomena. The microcomputer courses of action and stores the sensor yield. The handset gets charges from a focal PC and transmits information to that PC. The power for every sensor hub is gotten from a battery. A Wireless Sensor Network Mobile communications and wireless networking technology has seen a third time advancement. In technological advancements and also in application demands various classes of communication networks have combined like Cellular networks, Ad hoc Networks, Sensor Networks and Mesh Networks. Cellular network depend upon infrastructure. Ad hoc networks are comes in the category of wireless networks that organize multi hop radio relaying when the nodes are dynamically and arbitrarily located. Ad-hoc network are does not depend upon network. Nodes measure the ambient conditions in the environment surrounding them. These measurements include signal transformation that can be processed to show some characteristics about the phenomenon. The data collected is routed to sink node which is very special node .Then by using internet or satellite the sink node send data to user, through a gateway. II. Important Terms In WSN 2.1 Sensor Node A sensor node is the center part of a WSN. Sensor nodes can tackle numerous parts in a system, for example, simple sensing; data storage; routing; and data processing. 2.2 Clusters Clusters are the hierarchical unit for WSNs. The thick way of these net- works obliges the requirement for them to be separated into clusters to simplify tasks such a Communication. 2.3 Cluster Heads Clusters heads are the association pioneer of a cluster. They frequently are obliged to arrange exercises in the cluster. These tasks incorporate yet are not restricted to data-aggregation and sorting out the communication schedule of a cluster. 2.4 Base Station Base station is at the upper level of the progressive WSN. It gives the communication interface between the sensor network and the end-client.
  • 2. Ant Colony Optimization for Wireless Sensor Network: A Review DOI: 10.9790/0661-17318992 www.iosrjournals.org 90 | Page 2.5 End User The information in a sensor network can be utilized for an extensive variety of uses. Hence, a specific application may make utilization of the system information over the web, utilizing a PDA, or even a desktop PC. III. Routing Protocols in WSN 3.1 Location-based Protocols In area based conventions, sensor hubs are tended to by method for their areas. Area data for sensor hubs is needed for sensor organizes by the greater part of the steering conventions to compute the separation between two specific hubs so that vitality utilization can be evaluated. In this segment, we display a specimen of area mind full routing protocols proposed for WSNs. 3.2 Data Centric Protocols Data-centric protocols contrast from traditional address-centric protocols in the way that the information is sent from source sensors to the sink. In address-centric protocol each one source sensor that has the proper information reacts by sending its information to the sink freely of all different sensors. Be that as it may, in data-centric protocols, when the source sensors send their information to the sink, halfway sensors can perform some manifestation of collection on the information starting from different source sensors and send the totaled information around the sink. This procedure can bring about vitality funds due to less transmission needed to send the information from the sources to the sink. 3.3 Mobility-based Protocols Mobility brings new difficulties to routing protocols in WSNs. Sink versatility requires energy efficient protocols to ensure information conveyance started from source sensors to portable sinks. 3.4 Multipath-based Protocols Considering information transmission between source sensors and the sink, there are two routing paradigms: single-way routing and multipath routing. In single-way routing, each one source sensor sends its information to the sink by means of the briefest way. In multipath routing, each one source sensor finds to start with k shortest ways to the sink and partitions its heap evenly among these ways. IV. Ant Colony Optimization Algorithm This algorithm is an individual of the ant colony algorithm family, in swarm intelligence method, and it constitutes some met heuristic improvements. At first proposed by Marco Dorigo in 1992 in his PhD thesis, the first algorithm was expecting to hunt down an ideal way in a graph, in light of the conduct of ants looking for a way between their colony and a source of food. The first thought has since differentiated to understand a more extensive class of numerical issues, and accordingly, a few issues have developed, drawing on different parts of the conduct of ants. 4.1 Related work Yan Liang et al [1] “A Biologically Inspired Sensor Wakeup Control Method for Wireless Sensor Networks” This paper displays an artificial ant colony approachto distributed sensor wakeup control (SWC) in wireless sensor networks(WSN) to finish the joint errand of surveillance and target following. Every sensor hub is displayed as a ground dwelling insect, and the issue of target discovery is demonstrated as the sustenance finding by ants. Once the sustenance is found, the ground dwelling insect will discharge pheromone. The correspondence, nullification, and combination of target data are demonstrated as the methods of pheromone dispersion, misfortune, and collection. Since the collected pheromone can gauge the presence of a target, it is utilized to focus the likelihood of ground dwelling insect seeking action in the following round. To the best of our insight, this is the primary organically motivated SWC technique in the WSN. Such a organically motivated strategy has different alluring points of interest. First and foremost, it is distributive and does not oblige an unified control alternately group pioneers. In this way, it is free of the issues created by pioneer disappointments and can spare the correspondence cost for pioneer choice. Second, it is strong to false cautions on the grounds that the performance is gathered transiently and spatially and hence is more solid for wakeup control. Third, the proposed system does not require the information of hub position. Two hypotheses are displayed to diagnostically focus the key parameters in the system: the base what's more greatest performance. Recreations are completed to assess the execution of the proposed system in examination with agent techniques. Liu Yanfei et al [2] “An improved design of ZigBee Wireless Sensor Network” ZigBee is a low rate, low power utilization remote correspondence innovation, which can be generally utilized as a part of the remote sensor system (WSN). WSN is made out of many hubs, the majority of the sensor hubs data in the system will be sent to the facilitator, so the organizer typically attempt the undertaking to gather sensor information data,
  • 3. Ant Colony Optimization for Wireless Sensor Network: A Review DOI: 10.9790/0661-17318992 www.iosrjournals.org 91 | Page moderate the data, prepare the data, furthermore as the interface of the system with the client. The facilitator ought to speak with the host PC by the upper convention, so the organizer conveys an excess of burden, particularly in the expansive scale remote sensor system, which will have a terrible impact on the system correspondence. The impact demonstrated terrible ongoing, information bundle misfortune, and steadiness diminish. The paper introduces an enhanced configuration of ZigBee Wireless Sensor Network. In the system the facilitator just manages the undertaking on the ZigBee system, the rest undertakings will be prepared by an alternate processor. The processor joined with the Coordinator by RS-232 interface. All information data will be sent to the processor however the serial port. So the processor embraces the errand to manage information, preserve the system data, and speak with the host PC. Finally we tried the enhanced ZigBee remote system and check the impact. Modares, H et al [3] “Overview of Security Issues in Wireless Sensor Networks” Wireless sensor networks (WSN) are for the most part set up for social affair records from insecure environment. Almost all security protocols’ for WSN accept that the adversary can attain to completely control over a sensor hub by method for direct physical access. The presence of sensor systems as one of the primary innovation later on has postured different difficulties to specialists. Remote sensor systems are made out of expansive number of small sensor hubs, running independently, and in different cases, with none get to renewable vitality assets. Likewise, security being major to the acknowledgement and utilize of sensor systems for various applications, additionally diverse set of difficulties in sensor systems are existed. In this paper we will concentrate on security of Wireless Sensor Network. Marriwala, N et al [4] “An approach to increase the wireless sensor network lifetime” A wireless sensor network comprise of little gadgets, called sensor hubs that are outfitted with sensors to screen the physical and natural conditions, for example, weight, temperature, stickiness, movement, speed and so on. The hubs in the remote sensor system were battery fueled, so one of the vital issues in remote sensor system is the intrinsic constrained battery control inside system sensor hubs. Minimizing vitality dispersal and amplifying system lifetime are imperative issues in the configuration of sensor systems so if the force depleted hub would stop from the system, and it general influence the system lifetime. Minimizing vitality dissemination and boosting system lifetime are imperative issues in the outline of uses and conventions for sensor systems. In this paper there is change of lifetime of remote sensor arrange in wording expanding alive hubs in system by utilizing an alternate methodology to choose group head. The bunch head determination is focused around the premise of greatest leftover vitality and least separation and picks an ideal congratulatory gesture between the group heads to transmit to the base station. Mittal, R. et al [5] “Wireless sensor networks for monitoring the environmental activities” The region of sensor system has a long history and numerous sort of sensor gadgets are utilized as a part of different genuine applications. Here, we present Wireless sensor system which when consolidate with different zones then assumes an imperative part in investigating the information of backwoods temperature, bioinformatics, water pollution, activity control, telecom and so forth. Because of the progression in the territory of remote sensor system and their capacity to create huge measure of spatial/transient information, dependably pull in specialists for applying information mining systems and getting intriguing results. Remote sensor arranges in checking the ecological exercises develops and this pull in more prominent investment and test for discovering the examples from substantial measure of spatial/transient datasets. These datasets are produced by sensor hubs which are conveyed in some tropical locales or from some wearable sensor hubs which are joined with wild creatures in natural life hundreds of years. Sensor systems create constant stream of information over the long haul. Thus, Data mining procedures dependably assumes an imperative part for extricating the learning structure huge remote sensor system information. In this paper, we show the recognition of sensor information abnormalities, Sensor information grouping, Pattern matching and their intriguing results and with these results we can investigate the sensor hub information in distinctive ways. Sobralet al [6] “Automated design of fuzzy rule base using ant colony optimization for improving the performance in Wireless Sensor Networks “In this paper author displays a proposition for evaluating the nature of courses utilizing fuzzy system to help the Directed Diffusion directing protocol. The fuzzy system is utilized to gauge the level of the course quality, in view of the number of hops and the least vitality level among the nodes that structure the route. An Ant Colony Optimization (ACO) algorithm is utilized to change in a programmed way the standard base of the fuzzy system with a specific end goal to enhance the order method of courses, subsequently expanding the vitality proficiency of the system. The simulations demonstrated that the proposition is successful from the perspective of the packet loss rate, the important time to send a particular number of messages to the sink node and the lifetime of the first sensor node, which is characterized as the period that the first sensor node die due to the battery exhaustion.
  • 4. Ant Colony Optimization for Wireless Sensor Network: A Review DOI: 10.9790/0661-17318992 www.iosrjournals.org 92 | Page V. Techniques Used 5.1 Data Mining Data mining is the computational methodology of finding patterns in large information sets including systems at the crossing point of artificial consciousness, machine learning, insights, and database systems. The general objective of the information mining procedure is to concentrate data from an information set and change it into a reasonable structure for further use. Aside from the crude examination step, it includes database and information administration perspectives, information preprocessing, model and derivation contemplations, interestingness measurements, complexity contemplations, post-handling of found structures, visualization, and online updating. 5.2 Ant Colony Optimization algorithm The ant colony optimization algorithm (ACO) is a probabilistic system for tackling computational issues which can be diminished to discovering great ways through diagrams. This algorithm is a part of the ant colony algorithms family, in swarm insights routines, and it constitutes some Meta heuristic advancements. VI. Conclusion Previous work presents an artificial ant colony approach to distributed sensor wakeup control (SWC) in wireless sensor networks (WSN) to accomplish the joint task of surveillance and target tracking. Once the food is found, the ant will release pheromone. The communication, nullification, and combination of target data are displayed as the techniques of pheromone dissemination, misfortune, and aggregation. Since the aggregated pheromone can measure the presence of a target, it is utilized to focus the likelihood of ant-searching activity movement in the following round. This method has multiple advantages but still it lacks by various ways like there is a lack of criteria for selection of clusters that which one are affected or not and also affected area node wake up all other nodes, this need to be improve. In our work we introduce new probability function for routing, introduce Intensity based wake up selection in the cluster, find effected area in the cluster & find efficiency routing for affected clusters. References [1]. Y. Liang and R. Wang, A Biologically Inspired Sensor Wakeup Control Method for Wireless Sensor Networks, IEEE Transactions On Systems, Man and Cybernetics, pp. 525-538, 2010. [2]. L.Yanfei, Q. Xiaojun and Z. Yunhe , An improved design of ZigBee Wireless Sensor Network, 2nd IEEE International Conference onComputer Science and Information Technology, pp. 515-518, 2009. [3]. H.Modares and A,Moravejosharieh, “Overview of Security Issues in Wireless Sensor Networks, IEEE Third International Conference onComputational Intelligence, Modelling and Simulation, pp. 308-311, 2011. [4]. N.Marriwala and P.Rathee, An approach to increase the wireless sensor network lifetime, IEEE World Congress on Information and Communication Technologies, pp. 495-499, 2012. [5]. R.Mittal and M.P.S Bhatia, Wireless sensor networks for monitoring the environmental activities, IEEE International Conference onComputational Intelligence and Computing Research, pp. 1-5, 2010. [6]. J.V.V Sobral, Automated design of fuzzy rule base using ant colony optimization for improving the performance in Wireless Sensor Networks, pp. 1 – 8, IEEE, 2013. [7]. U. Ahmed and F.B. Hussain, Energy efficient routing protocol for zone based mobile sensor networks, IEEE 7th international Wireless Communications and Mobile Computing conference, pp. 1081-1086, 2011. [8]. Y. Han and Z. Lin, A geographically opportunistic routing protocol used in mobile wireless sensor networks, 9th IEEE international conference on Networking, Sensing and Control, pp. 216-221, 2012. [9]. A. Kuamr and N.V. energy efficiency and network lifetime maximization in wireless sensor networks using Improved Ant Colony Optimization, pp 1-5, IEEE, 2012.