SlideShare a Scribd company logo
1 of 6
Download to read offline
Scientific Journal Impact Factor (SJIF): 1.711
International Journal of Modern Trends in Engineering
and Research
www.ijmter.com
@IJMTER-2014, All rights Reserved 279
e-ISSN: 2349-9745
p-ISSN: 2393-8161
A Review Study on Shortest Path in WSN to detect the Abnormal
Packet for saving Energy and Efficient Data Collection using AODV
Rajan kakkar1
,Surender Singh2
1
M.Tech Student, 2
Asstt. Prof. in CSE Department,
Om Institutes of Tech & Mgt.
Abstract: The main motive of this research is to study energy-efficient data-gathering mechanisms to
abnormal packet data for saving the energy. To detect the abnormal packet irregularities is useful for
saving energy, as well as for management of network, because the patterns found can be used for
both decision making in applications and system performance tuning. Node distribution in WSNs is
either deterministic or self-organizing and application dependant. The sensor nodes in WSNs have
minimum energy and they use their energy for communication and sensing.
Keywords: AODV (Ad-hoc on demand distance vector), WSN (Wireless Sensor Network), DSDV
(Destination sequence distance vector), SPACO (Shortest Path Ant Colony Optimization)
I. INTRODUCTION
1.1. Wireless Sensor Network
A Wireless sensor network is composed of tens to thousands of sensor nodes which are densely
deployed in a sensor field and have the capability to collect data and route data back to its base
station. Wireless Sensor Network is used in different application now a day’s [1], such as detecting
and tanks on a battlefield, measuring traffic flow on roads, measuring humidity and other factors in
fields, tracking in buildings. Sensor nodes consist of sensing unit, processing unit, and power unit.
The “many - tiny” principle: wireless networks of thousands of inexpensive miniature devices
capable of computation, communication and sensing A WSN application there are two types of
nodes: source node – the node which actually sense and collect data – and sink node – the node to
which the collected data is sent. The sinks can be part of the network or outside the wireless sensor
networks. Usually, there is great number of source nodes than sink nodes. Therefore the two disciple
sensor network and data mining can be combined. Knowledge from sensor data (Sensor-KDD) is
important. Clustering of sensory data act as a nucleus job of data mining in KDD.
Challenges for WSN
The main aim of WSN is to transmit data by increasing the lifetime of the network and by employing
energy efficient routing protocols. WSN face rigorous resource constraints in communication
bandwidth, power supply, and storage and processor capacity. Again, the performance of a routing
protocol depends on the architecture and design of the network, so the architecture and design of the
network is very important features in WSNs. The pattern of the wireless sensor network is affect by
many factors which must be overcome before an effective network can be achieved in WSNs.
International Journal of Modern Trends in Engineering and Research (IJMTER)
Volume 01, Issue 05, [November - 2014] e-ISSN: 2349-9745, p-ISSN: 2393-8161
@IJMTER-2014, All rights Reserved 280
Node Distribution: Higher-capability mobile robots may be dispatched to gather more accurate
temperature or humidity readings Node distribution [12] in WSNs is either deterministic or self-
organizing and application based. The uniformity of the cluster head directly affects the performance
of the routing protocol used for this network. In case of deterministic node distribution, the sensor
nodes are differently placed and gathered data is transmitted through pre-defined areas. The sensor
nodes are distributed over the area of interest randomly thus creating an infrastructure in an ad hoc
manner. Each sensor node consists of four major components: sensor, processing unit, power unit
and transceiver.
Dynamicity: Since the nodes in WSNs may be fixed or variable, dynamicity of the network is a
challenging issue they are static, but in the case of dynamic BS or nodes routes from one node to
another must be reported periodically within the network so that all nodes can transmit data via the
reported route. Again depending on the application, the sensed event can be dynamic or static.
Energy efficiency: The sensor nodes in WSNs have minimum energy and they use their energy for
communication and sensing, so energy consumption is an important point in WSNs. According to
various routing protocols nodes take part in data fusion and expend more energy. In this regard,
direct communication is efficient. Since most of the times sensor nodes are distributed randomly,
multi-hop routing is preferable.
Scalability: A WSN consists many sensor nodes. Routing protocols must be workable with this large
number of nodes i.e., these protocols can be able to handle all of the functionalities of the sensor
nodes so that the lifetime of the network can be stable.
Data Fusion: Data fusion is a process of combining of data from different sources according to some
function. This is achieved by signal processing methods. This technique is used by some routing
protocols for energy efficiency and data transfer optimization.
II. RELATED WORK
Nowadays sensors are very essential for today life to monitor environment where human cannot get
involved very often. Wireless Sensor Networks (WSN) are used in many real world applications like
environmental monitoring, traffic control, trajectory monitoring. It is more challenging for sensor
network to sense and collect a large amount of data which are continuous over time, which in turn
need to be forwarded to sink for further decision making process [2]
.
In [3], B.Yuan, Maria Orlowska and Shazia Sadiq, in Sep 2007, proposed that given a set of sparsely
distributed sensors in the Euclidean plane, a mobile robot is required to visit all sensors to download
the data and finally return to its base. The effective range of each sensor is specified by a disk, and
the robot must at least reach the boundary to start communication. The primary goal of optimization
in this scenario is to minimize the travelling distance by the robot many research activities have been
carried out on the research issue. Since the fundamental task of WSN is to gather data efficiently
with less resource consumption, to address the problem, there are two threads of research to improve
the performance of data collecting: optimized data-gathering schemes and mobile collector assisted
data-gathering in WSNs. For the first thread, most data-gathering algorithms aim to prolong lifetime
with some optimized schemes. To balance load within each cluster, an even energy dissipation
International Journal of Modern Trends in Engineering and Research (IJMTER)
Volume 01, Issue 05, [November - 2014] e-ISSN: 2349-9745, p-ISSN: 2393-8161
@IJMTER-2014, All rights Reserved 281
protocol (EEDP) was proposed for efficient cluster-based data-gathering in WSNs. In [7] a new
proposal is to gathers data in high-density WSNs in real-time, which determines network topology
by hierarchical clustering to avoid radio collision and enables to gather data with minimum data
latency from numerous high-density sensor nodes. To address the problem of gathering information
in WSNs, the work in [4] took into account the fact that interference can occur at the reception of a
message at the receiver sensor. However it assumes the distribution of sources are known. Another
way to save energy is to decrease data transmitting with some schemes. A new distributed
framework to achieve minimum energy data-gathering was proposed in [4]. To minimize the total
energy for compressing and transporting information, the problem of constructing a data-gathering
tree over a WSN was studied. To some extent, all those schemes require the node has extra
computation to optimize the data transmission or compress and decompress data. For the second
thread, nodes in WSNs are in multi-hop and mobile environment in general. The characteristic of
each link will change timely. In the content of the WSNs where each node only has a partial view of
the network, it is very important for each node to estimate the system status by a simple and accurate
method. Especially for data transmission with less power consumption, a mobile data collector is
more perfectly suited to such applications, for the collector can be equipped with a powerful
transceiver and battery. Instead, it is effective to collect data by assisted mobile collector which can
achieve better power saving performance [11]. A new data-gathering mechanism called M-collector
for large-scale wireless sensor networks was proposed by introducing mobility into the network.
However, it just considers the single-hop data gathering problem. An adaptive data-gathering
protocol was proposed that employs multiple mobile collectors (instead of sinks) to help an existing
WSN achieve such requirements, which adopts a virtual elastic-force model to help mobile collectors
adjust their moving speed and direction while adapting to changes within the network. A novel data-
collecting algorithm using a mobile robot to acquire sensed data from a wireless sensor network
(WSN) that possesses partitioned/islanded WSNs is proposed in this paper. This algorithm permits
the improvement of data collecting performance by the base station of partitioned/islanded WSNs
and navigating a mobile robot to the desired location. However, the number of collectors cannot be
predefined, for the irregularity of the information generation rate as well as the cost of mobile
collectors. A well-planned adaptive moving strategy (AMS) for a mobile sink in large-scale,
hierarchical sensor networks was presented. The mobile sink traverses the entire network uploading
the sensed data from cluster heads in time-driven scenarios. However, it just tries to minimize the
whole tour length to save energy. An efficient hybrid method for message relaying and load
balancing was proposed in low-mobility wireless sensor networks. The system uses either a single
hop transmission to a nearby mobile sink or a multi-hop transmission to a far-away fixed node
depending on the predicted sink mobility pattern. Recently, many research efforts have appeared in
the literature to explore the mobility in wireless sensor networks for data collection, we only survey
the most related ones here [12]. The mobility-assisted data collection was classified into three
categories in [12]: with random mobility, predictable mobility, and controlled mobility respectively.
The mobile entities, referred to as Data Mobile Ubiquitous LAN Extensions (MULEs), lie in the
middle tier on top of the stationary sensor nodes, move around in the network to collect data from
sensor nodes, and ultimately upload the data to the sink. The term Data MULEs was widely used in
the literature since then. In [10], the data collection process with predictable mobility was modeled
as a queuing system, and the success of data collection was analyzed based on it. In [7], a mobile
International Journal of Modern Trends in Engineering and Research (IJMTER)
Volume 01, Issue 05, [November - 2014] e-ISSN: 2349-9745, p-ISSN: 2393-8161
@IJMTER-2014, All rights Reserved 282
data observer, called Sensor, was used as a mobile base-station in the network. It also showed that
the design of the travelling tour is critical for SenCar to accomplish data collection jobs successfully.
Observing the importance of the travelling tour, a lot of efforts were put into its optimal design,
[2].The tour selection problem can be modeled as a Travelling Salesman Problem with
Neighborhoods (TSPN), an NP-hard problem, if we do not consider the data rate constraints between
the mobile element (ME) and sensor nodes, where all the neighborhoods are possibly intersected
communication disks. It has been proven that approximating Euclidean TSPN within a factor of (2")
is also NP-hard [11].
III. CONCLUSION
Some distinct characteristics of WSNs such as large node density, unattended operation mode, high
dynamicity and severe resource constraints pose a number of design challenges on sensor data-
gathering schemes. Many research activities have been studied on the research issue. Since the
fundamental task of WSN is to gather data efficiently with less resource consumption, to address the
problem, there are two threads of research to improve the performance of data collecting: optimized
data-gathering schemes and mobile collector assisted data-gathering in WSNs. Most data-gathering
algorithms aim to prolong lifetime with some optimized schemes.
REFERENCES
[1].Yong Wang, Garhan Attebury and Byrav Ramamurthy, “A Survey of security issues in Wireless Sensor
Networks”, IEEE Communication Survey 2006.
[2]. Jang-Ping Sheu, “Design and Implementation of Mobile Robot for Nodes Replacement in Wireless
Sensor Networks”, Journal of Information Science and Engineering 24, 393-410 (2008).
[3] B. Yuan, M. Orlowska, and S. Sadiq (2007),“On the optimal robot routing problem in wireless sensor
networks,”IEEE Trans. on Knowledge and Data Engineering, vol. 19, no 9, pp. 1252-1261.
[4] M. A. Batalin and G. S. Sukhatme, “Efficient exploration without localization”, in Proceedings of the
IEEE International Conference on Robotics and Automation, Vol.2, 2003, pp. 2714-2719.
[5] K. F. Ssu, C. H. Ou, and H. C. Jiau, “Localization with mobile anchor points in wireless sensor networks”,
IEEE Transactions on Vehicular Technology, Vol. 54, 2005, pp. 1187-1197.
[6] A. Galstyan, B. Krishnamachari, K. Lerman, and S. Pattem, “Distributed online localization in sensor
networks using a moving target”, in Proceedings of the 3rd International Symposium on Information
Processing in Sensor Networks, 2004, pp. 61-70.
[7] G. Wang, G. Cao, and T. LaPorta, “A bidding protocol for deploying mobile sensors”, in Proceedings of
the 11th IEEE International Conference on Network Protocols,2003, pp. 315-324.
[8] TinyOS, http://www.tinyos.net.
[9] Liang He, “Reducing Data Collection Latency in Wireless Sensor Networks with Mobile Elements”.
[10] M. R. Garey and D.S. Johnson, “Computers and Intractability: A Guide to the Theory of NP-
Completeness. Freeman, San Francisco”, CA, 1979.
[11] M. Gorges-Schleuter. Asparagos96 and the Travelling Salesman Problem. In T. Baeck, Z. Michalewicz,
and X. Yao, editors, Proceedings of the IEEE International Conference on Evolutionary Computation
(ICEC'97), 1997.
[12] Bellare, M., Canetti, R., Krawczyk, H, “Keying hash functions for message authentication”, in
Proceedings of Advances in Cryptology (CRYPTO’96). Lecture Notes in Computer Science, vol. 1109,
Springer. 1–15.
A Review Study on Shortest Path in WSN to detect the Abnormal Packet for saving Energy and Efficient Data Collection using AODV
A Review Study on Shortest Path in WSN to detect the Abnormal Packet for saving Energy and Efficient Data Collection using AODV

More Related Content

What's hot

Ijarcet vol-2-issue-3-916-919
Ijarcet vol-2-issue-3-916-919Ijarcet vol-2-issue-3-916-919
Ijarcet vol-2-issue-3-916-919
Editor IJARCET
 
Application of Weighted Centroid Approach in Base Station Localization for Mi...
Application of Weighted Centroid Approach in Base Station Localization for Mi...Application of Weighted Centroid Approach in Base Station Localization for Mi...
Application of Weighted Centroid Approach in Base Station Localization for Mi...
IJMER
 
Performance Evaluation of Ant Colony Optimization Based Rendezvous Leach Usin...
Performance Evaluation of Ant Colony Optimization Based Rendezvous Leach Usin...Performance Evaluation of Ant Colony Optimization Based Rendezvous Leach Usin...
Performance Evaluation of Ant Colony Optimization Based Rendezvous Leach Usin...
IJERD Editor
 

What's hot (20)

Energy efficient routing in wireless sensor network based on mobile sink guid...
Energy efficient routing in wireless sensor network based on mobile sink guid...Energy efficient routing in wireless sensor network based on mobile sink guid...
Energy efficient routing in wireless sensor network based on mobile sink guid...
 
Ijarcet vol-2-issue-3-916-919
Ijarcet vol-2-issue-3-916-919Ijarcet vol-2-issue-3-916-919
Ijarcet vol-2-issue-3-916-919
 
Report
ReportReport
Report
 
Optimized Projected Strategy for Enhancement of WSN Using Genetic Algorithms
Optimized Projected Strategy for Enhancement of WSN Using  Genetic AlgorithmsOptimized Projected Strategy for Enhancement of WSN Using  Genetic Algorithms
Optimized Projected Strategy for Enhancement of WSN Using Genetic Algorithms
 
Ijetcas14 591
Ijetcas14 591Ijetcas14 591
Ijetcas14 591
 
International Journal of Advanced Smart Sensor Network Systems ( IJASSN )
International Journal of Advanced Smart Sensor Network Systems ( IJASSN )International Journal of Advanced Smart Sensor Network Systems ( IJASSN )
International Journal of Advanced Smart Sensor Network Systems ( IJASSN )
 
Ijetr021229
Ijetr021229Ijetr021229
Ijetr021229
 
Single Sink Repositioning Technique in Wireless Sensor Networks for Network L...
Single Sink Repositioning Technique in Wireless Sensor Networks for Network L...Single Sink Repositioning Technique in Wireless Sensor Networks for Network L...
Single Sink Repositioning Technique in Wireless Sensor Networks for Network L...
 
Application of Weighted Centroid Approach in Base Station Localization for Mi...
Application of Weighted Centroid Approach in Base Station Localization for Mi...Application of Weighted Centroid Approach in Base Station Localization for Mi...
Application of Weighted Centroid Approach in Base Station Localization for Mi...
 
Throughput analysis of energy aware routing protocol
Throughput analysis of energy aware routing protocolThroughput analysis of energy aware routing protocol
Throughput analysis of energy aware routing protocol
 
Throughput analysis of energy aware routing protocol for real time load distr...
Throughput analysis of energy aware routing protocol for real time load distr...Throughput analysis of energy aware routing protocol for real time load distr...
Throughput analysis of energy aware routing protocol for real time load distr...
 
Performance Evaluation of Ant Colony Optimization Based Rendezvous Leach Usin...
Performance Evaluation of Ant Colony Optimization Based Rendezvous Leach Usin...Performance Evaluation of Ant Colony Optimization Based Rendezvous Leach Usin...
Performance Evaluation of Ant Colony Optimization Based Rendezvous Leach Usin...
 
ENERGY EFFICIENT UNEQUAL CLUSTERING ALGORITHM FOR CLUSTERED WIRELESS SENSOR N...
ENERGY EFFICIENT UNEQUAL CLUSTERING ALGORITHM FOR CLUSTERED WIRELESS SENSOR N...ENERGY EFFICIENT UNEQUAL CLUSTERING ALGORITHM FOR CLUSTERED WIRELESS SENSOR N...
ENERGY EFFICIENT UNEQUAL CLUSTERING ALGORITHM FOR CLUSTERED WIRELESS SENSOR N...
 
Range-Based Data Gathering Algorithm With a Mobile Sink in Wireless Sensor Ne...
Range-Based Data Gathering Algorithm With a Mobile Sink in Wireless Sensor Ne...Range-Based Data Gathering Algorithm With a Mobile Sink in Wireless Sensor Ne...
Range-Based Data Gathering Algorithm With a Mobile Sink in Wireless Sensor Ne...
 
A Survey of Fuzzy Logic Based Congestion Estimation Techniques in Wireless S...
A Survey of Fuzzy Logic Based Congestion Estimation  Techniques in Wireless S...A Survey of Fuzzy Logic Based Congestion Estimation  Techniques in Wireless S...
A Survey of Fuzzy Logic Based Congestion Estimation Techniques in Wireless S...
 
An Improved Enhanced Real Time Routing Protocol (IERT) for Mobile Wireless Se...
An Improved Enhanced Real Time Routing Protocol (IERT) for Mobile Wireless Se...An Improved Enhanced Real Time Routing Protocol (IERT) for Mobile Wireless Se...
An Improved Enhanced Real Time Routing Protocol (IERT) for Mobile Wireless Se...
 
An Efficient Approach for Data Gathering and Sharing with Inter Node Communi...
 An Efficient Approach for Data Gathering and Sharing with Inter Node Communi... An Efficient Approach for Data Gathering and Sharing with Inter Node Communi...
An Efficient Approach for Data Gathering and Sharing with Inter Node Communi...
 
Multiagent based multipath routing in wireless sensor networks
Multiagent based multipath routing in wireless sensor networksMultiagent based multipath routing in wireless sensor networks
Multiagent based multipath routing in wireless sensor networks
 
COMPRESSIVE DATA GATHERING TECHNIQUE BY AVOIDING CORRELATED DATA IN WSN
COMPRESSIVE DATA GATHERING TECHNIQUE BY AVOIDING CORRELATED DATA IN WSNCOMPRESSIVE DATA GATHERING TECHNIQUE BY AVOIDING CORRELATED DATA IN WSN
COMPRESSIVE DATA GATHERING TECHNIQUE BY AVOIDING CORRELATED DATA IN WSN
 
Energy Efficient Data Aggregation in Wireless Sensor Networks: A Survey
Energy Efficient Data Aggregation in Wireless Sensor Networks: A SurveyEnergy Efficient Data Aggregation in Wireless Sensor Networks: A Survey
Energy Efficient Data Aggregation in Wireless Sensor Networks: A Survey
 

Viewers also liked

Building the IOT Platform as a Service
Building the IOT Platform as a ServiceBuilding the IOT Platform as a Service
Building the IOT Platform as a Service
Jesus Rodriguez
 
Security As A Service
Security As A ServiceSecurity As A Service
Security As A Service
guest536dd0e
 
Security in wireless sensor networks
Security in wireless sensor networksSecurity in wireless sensor networks
Security in wireless sensor networks
Piyush Mittal
 
Basics of Wireless sensor networks
Basics of Wireless sensor networksBasics of Wireless sensor networks
Basics of Wireless sensor networks
Rushin Shah
 
wireless sensor network my seminar ppt
wireless sensor network my seminar pptwireless sensor network my seminar ppt
wireless sensor network my seminar ppt
Eisha Madhwal
 

Viewers also liked (18)

Davra IOT Platform - Cisco OEM Pricing
Davra IOT Platform - Cisco OEM PricingDavra IOT Platform - Cisco OEM Pricing
Davra IOT Platform - Cisco OEM Pricing
 
Caterpillar 'CASE STUDY'
Caterpillar 'CASE STUDY'Caterpillar 'CASE STUDY'
Caterpillar 'CASE STUDY'
 
IOT Platform as a Service
IOT Platform as a ServiceIOT Platform as a Service
IOT Platform as a Service
 
Security in WSN
Security in WSNSecurity in WSN
Security in WSN
 
Building the IOT Platform as a Service
Building the IOT Platform as a ServiceBuilding the IOT Platform as a Service
Building the IOT Platform as a Service
 
Routing in Wireless Sensor Networks
Routing in Wireless Sensor NetworksRouting in Wireless Sensor Networks
Routing in Wireless Sensor Networks
 
Internet of Things application platforms
Internet of Things application platformsInternet of Things application platforms
Internet of Things application platforms
 
Security in wireless sensor network
Security in wireless sensor networkSecurity in wireless sensor network
Security in wireless sensor network
 
Security As A Service
Security As A ServiceSecurity As A Service
Security As A Service
 
Data Distribution Service Security and the Industrial Internet of Things
Data Distribution Service Security and the Industrial Internet of ThingsData Distribution Service Security and the Industrial Internet of Things
Data Distribution Service Security and the Industrial Internet of Things
 
IT Security As A Service
IT Security As A ServiceIT Security As A Service
IT Security As A Service
 
Security As A Service
Security As A ServiceSecurity As A Service
Security As A Service
 
Security As A Service In Cloud(SECaaS)
Security As A Service In Cloud(SECaaS)Security As A Service In Cloud(SECaaS)
Security As A Service In Cloud(SECaaS)
 
How the fusion of time sensitive networking, time-triggered ethernet and data...
How the fusion of time sensitive networking, time-triggered ethernet and data...How the fusion of time sensitive networking, time-triggered ethernet and data...
How the fusion of time sensitive networking, time-triggered ethernet and data...
 
Security in wireless sensor networks
Security in wireless sensor networksSecurity in wireless sensor networks
Security in wireless sensor networks
 
Basics of Wireless sensor networks
Basics of Wireless sensor networksBasics of Wireless sensor networks
Basics of Wireless sensor networks
 
wireless sensor network my seminar ppt
wireless sensor network my seminar pptwireless sensor network my seminar ppt
wireless sensor network my seminar ppt
 
The Future Of Work & The Work Of The Future
The Future Of Work & The Work Of The FutureThe Future Of Work & The Work Of The Future
The Future Of Work & The Work Of The Future
 

Similar to A Review Study on Shortest Path in WSN to detect the Abnormal Packet for saving Energy and Efficient Data Collection using AODV

design & implementation of energy effecient data collection in multiple mobil...
design & implementation of energy effecient data collection in multiple mobil...design & implementation of energy effecient data collection in multiple mobil...
design & implementation of energy effecient data collection in multiple mobil...
mamtha_praksh
 
Ijarcet vol-2-issue-2-576-581
Ijarcet vol-2-issue-2-576-581Ijarcet vol-2-issue-2-576-581
Ijarcet vol-2-issue-2-576-581
Editor IJARCET
 
DESIGN AND IMPLEMENTATION OF ADVANCED MULTILEVEL PRIORITY PACKET SCHEDULING S...
DESIGN AND IMPLEMENTATION OF ADVANCED MULTILEVEL PRIORITY PACKET SCHEDULING S...DESIGN AND IMPLEMENTATION OF ADVANCED MULTILEVEL PRIORITY PACKET SCHEDULING S...
DESIGN AND IMPLEMENTATION OF ADVANCED MULTILEVEL PRIORITY PACKET SCHEDULING S...
International Journal of Technical Research & Application
 
ENERGY EFFICIENT AGGREGATION WITH DIVERGENT SINK PLACEMENT FOR WIRELESS SENSO...
ENERGY EFFICIENT AGGREGATION WITH DIVERGENT SINK PLACEMENT FOR WIRELESS SENSO...ENERGY EFFICIENT AGGREGATION WITH DIVERGENT SINK PLACEMENT FOR WIRELESS SENSO...
ENERGY EFFICIENT AGGREGATION WITH DIVERGENT SINK PLACEMENT FOR WIRELESS SENSO...
ijasuc
 
CUTTING DOWN ENERGY USAGE IN WIRELESS SENSOR NETWORKS USING DUTY CYCLE TECHNI...
CUTTING DOWN ENERGY USAGE IN WIRELESS SENSOR NETWORKS USING DUTY CYCLE TECHNI...CUTTING DOWN ENERGY USAGE IN WIRELESS SENSOR NETWORKS USING DUTY CYCLE TECHNI...
CUTTING DOWN ENERGY USAGE IN WIRELESS SENSOR NETWORKS USING DUTY CYCLE TECHNI...
ijwmn
 
Proactive Data Reporting of Wireless sensor Network using Wake Up Scheduling ...
Proactive Data Reporting of Wireless sensor Network using Wake Up Scheduling ...Proactive Data Reporting of Wireless sensor Network using Wake Up Scheduling ...
Proactive Data Reporting of Wireless sensor Network using Wake Up Scheduling ...
ijsrd.com
 
Node Failure Prevention by Using Energy Efficient Routing In Wireless Sensor ...
Node Failure Prevention by Using Energy Efficient Routing In Wireless Sensor ...Node Failure Prevention by Using Energy Efficient Routing In Wireless Sensor ...
Node Failure Prevention by Using Energy Efficient Routing In Wireless Sensor ...
IJTET Journal
 
A Research on Cluster Based Routing Methodologies for Wireless Sensor Networks
A Research on Cluster Based Routing Methodologies for Wireless Sensor NetworksA Research on Cluster Based Routing Methodologies for Wireless Sensor Networks
A Research on Cluster Based Routing Methodologies for Wireless Sensor Networks
ijtsrd
 

Similar to A Review Study on Shortest Path in WSN to detect the Abnormal Packet for saving Energy and Efficient Data Collection using AODV (19)

Design Issues and Applications of Wireless Sensor Network
Design Issues and Applications of Wireless Sensor NetworkDesign Issues and Applications of Wireless Sensor Network
Design Issues and Applications of Wireless Sensor Network
 
Data Centric Approach Based Protocol using Evolutionary Approach in WSN
Data Centric Approach Based Protocol using Evolutionary Approach in WSNData Centric Approach Based Protocol using Evolutionary Approach in WSN
Data Centric Approach Based Protocol using Evolutionary Approach in WSN
 
Iisrt divya nagaraj (networks)
Iisrt divya nagaraj (networks)Iisrt divya nagaraj (networks)
Iisrt divya nagaraj (networks)
 
design & implementation of energy effecient data collection in multiple mobil...
design & implementation of energy effecient data collection in multiple mobil...design & implementation of energy effecient data collection in multiple mobil...
design & implementation of energy effecient data collection in multiple mobil...
 
Ijarcet vol-2-issue-2-576-581
Ijarcet vol-2-issue-2-576-581Ijarcet vol-2-issue-2-576-581
Ijarcet vol-2-issue-2-576-581
 
0512ijdps26
0512ijdps260512ijdps26
0512ijdps26
 
DESIGN AND IMPLEMENTATION OF ADVANCED MULTILEVEL PRIORITY PACKET SCHEDULING S...
DESIGN AND IMPLEMENTATION OF ADVANCED MULTILEVEL PRIORITY PACKET SCHEDULING S...DESIGN AND IMPLEMENTATION OF ADVANCED MULTILEVEL PRIORITY PACKET SCHEDULING S...
DESIGN AND IMPLEMENTATION OF ADVANCED MULTILEVEL PRIORITY PACKET SCHEDULING S...
 
G017344246
G017344246G017344246
G017344246
 
A review of Hierarchical energy Protocols in Wireless Sensor Network
A review of Hierarchical energy Protocols in Wireless Sensor NetworkA review of Hierarchical energy Protocols in Wireless Sensor Network
A review of Hierarchical energy Protocols in Wireless Sensor Network
 
ENERGY EFFICIENT AGGREGATION WITH DIVERGENT SINK PLACEMENT FOR WIRELESS SENSO...
ENERGY EFFICIENT AGGREGATION WITH DIVERGENT SINK PLACEMENT FOR WIRELESS SENSO...ENERGY EFFICIENT AGGREGATION WITH DIVERGENT SINK PLACEMENT FOR WIRELESS SENSO...
ENERGY EFFICIENT AGGREGATION WITH DIVERGENT SINK PLACEMENT FOR WIRELESS SENSO...
 
CUTTING DOWN ENERGY USAGE IN WIRELESS SENSOR NETWORKS USING DUTY CYCLE TECHNI...
CUTTING DOWN ENERGY USAGE IN WIRELESS SENSOR NETWORKS USING DUTY CYCLE TECHNI...CUTTING DOWN ENERGY USAGE IN WIRELESS SENSOR NETWORKS USING DUTY CYCLE TECHNI...
CUTTING DOWN ENERGY USAGE IN WIRELESS SENSOR NETWORKS USING DUTY CYCLE TECHNI...
 
CUTTING DOWN ENERGY USAGE IN WIRELESS SENSOR NETWORKS USING DUTY CYCLE TECHNI...
CUTTING DOWN ENERGY USAGE IN WIRELESS SENSOR NETWORKS USING DUTY CYCLE TECHNI...CUTTING DOWN ENERGY USAGE IN WIRELESS SENSOR NETWORKS USING DUTY CYCLE TECHNI...
CUTTING DOWN ENERGY USAGE IN WIRELESS SENSOR NETWORKS USING DUTY CYCLE TECHNI...
 
Ijetr021229
Ijetr021229Ijetr021229
Ijetr021229
 
Proactive Data Reporting of Wireless sensor Network using Wake Up Scheduling ...
Proactive Data Reporting of Wireless sensor Network using Wake Up Scheduling ...Proactive Data Reporting of Wireless sensor Network using Wake Up Scheduling ...
Proactive Data Reporting of Wireless sensor Network using Wake Up Scheduling ...
 
C018141418
C018141418C018141418
C018141418
 
Node Failure Prevention by Using Energy Efficient Routing In Wireless Sensor ...
Node Failure Prevention by Using Energy Efficient Routing In Wireless Sensor ...Node Failure Prevention by Using Energy Efficient Routing In Wireless Sensor ...
Node Failure Prevention by Using Energy Efficient Routing In Wireless Sensor ...
 
A Research on Cluster Based Routing Methodologies for Wireless Sensor Networks
A Research on Cluster Based Routing Methodologies for Wireless Sensor NetworksA Research on Cluster Based Routing Methodologies for Wireless Sensor Networks
A Research on Cluster Based Routing Methodologies for Wireless Sensor Networks
 
International Journal of Wireless & Mobile Networks (IJWMN)
International Journal of Wireless & Mobile Networks (IJWMN)International Journal of Wireless & Mobile Networks (IJWMN)
International Journal of Wireless & Mobile Networks (IJWMN)
 
Energy Efficient Multipath Data Fusion Technique for Wireless Sensor Networks
Energy Efficient Multipath Data Fusion Technique for Wireless Sensor NetworksEnergy Efficient Multipath Data Fusion Technique for Wireless Sensor Networks
Energy Efficient Multipath Data Fusion Technique for Wireless Sensor Networks
 

More from Editor IJMTER

A NEW DATA ENCODER AND DECODER SCHEME FOR NETWORK ON CHIP
A NEW DATA ENCODER AND DECODER SCHEME FOR  NETWORK ON CHIPA NEW DATA ENCODER AND DECODER SCHEME FOR  NETWORK ON CHIP
A NEW DATA ENCODER AND DECODER SCHEME FOR NETWORK ON CHIP
Editor IJMTER
 
A CAR POOLING MODEL WITH CMGV AND CMGNV STOCHASTIC VEHICLE TRAVEL TIMES
A CAR POOLING MODEL WITH CMGV AND CMGNV STOCHASTIC VEHICLE TRAVEL TIMESA CAR POOLING MODEL WITH CMGV AND CMGNV STOCHASTIC VEHICLE TRAVEL TIMES
A CAR POOLING MODEL WITH CMGV AND CMGNV STOCHASTIC VEHICLE TRAVEL TIMES
Editor IJMTER
 
Textual Data Partitioning with Relationship and Discriminative Analysis
Textual Data Partitioning with Relationship and Discriminative AnalysisTextual Data Partitioning with Relationship and Discriminative Analysis
Textual Data Partitioning with Relationship and Discriminative Analysis
Editor IJMTER
 
SURVEY OF TRUST BASED BLUETOOTH AUTHENTICATION FOR MOBILE DEVICE
SURVEY OF TRUST BASED BLUETOOTH AUTHENTICATION FOR MOBILE DEVICESURVEY OF TRUST BASED BLUETOOTH AUTHENTICATION FOR MOBILE DEVICE
SURVEY OF TRUST BASED BLUETOOTH AUTHENTICATION FOR MOBILE DEVICE
Editor IJMTER
 
Software Quality Analysis Using Mutation Testing Scheme
Software Quality Analysis Using Mutation Testing SchemeSoftware Quality Analysis Using Mutation Testing Scheme
Software Quality Analysis Using Mutation Testing Scheme
Editor IJMTER
 
Software Defect Prediction Using Local and Global Analysis
Software Defect Prediction Using Local and Global AnalysisSoftware Defect Prediction Using Local and Global Analysis
Software Defect Prediction Using Local and Global Analysis
Editor IJMTER
 

More from Editor IJMTER (20)

A NEW DATA ENCODER AND DECODER SCHEME FOR NETWORK ON CHIP
A NEW DATA ENCODER AND DECODER SCHEME FOR  NETWORK ON CHIPA NEW DATA ENCODER AND DECODER SCHEME FOR  NETWORK ON CHIP
A NEW DATA ENCODER AND DECODER SCHEME FOR NETWORK ON CHIP
 
A RESEARCH - DEVELOP AN EFFICIENT ALGORITHM TO RECOGNIZE, SEPARATE AND COUNT ...
A RESEARCH - DEVELOP AN EFFICIENT ALGORITHM TO RECOGNIZE, SEPARATE AND COUNT ...A RESEARCH - DEVELOP AN EFFICIENT ALGORITHM TO RECOGNIZE, SEPARATE AND COUNT ...
A RESEARCH - DEVELOP AN EFFICIENT ALGORITHM TO RECOGNIZE, SEPARATE AND COUNT ...
 
Analysis of VoIP Traffic in WiMAX Environment
Analysis of VoIP Traffic in WiMAX EnvironmentAnalysis of VoIP Traffic in WiMAX Environment
Analysis of VoIP Traffic in WiMAX Environment
 
A Hybrid Cloud Approach for Secure Authorized De-Duplication
A Hybrid Cloud Approach for Secure Authorized De-DuplicationA Hybrid Cloud Approach for Secure Authorized De-Duplication
A Hybrid Cloud Approach for Secure Authorized De-Duplication
 
Aging protocols that could incapacitate the Internet
Aging protocols that could incapacitate the InternetAging protocols that could incapacitate the Internet
Aging protocols that could incapacitate the Internet
 
A Cloud Computing design with Wireless Sensor Networks For Agricultural Appli...
A Cloud Computing design with Wireless Sensor Networks For Agricultural Appli...A Cloud Computing design with Wireless Sensor Networks For Agricultural Appli...
A Cloud Computing design with Wireless Sensor Networks For Agricultural Appli...
 
A CAR POOLING MODEL WITH CMGV AND CMGNV STOCHASTIC VEHICLE TRAVEL TIMES
A CAR POOLING MODEL WITH CMGV AND CMGNV STOCHASTIC VEHICLE TRAVEL TIMESA CAR POOLING MODEL WITH CMGV AND CMGNV STOCHASTIC VEHICLE TRAVEL TIMES
A CAR POOLING MODEL WITH CMGV AND CMGNV STOCHASTIC VEHICLE TRAVEL TIMES
 
Sustainable Construction With Foam Concrete As A Green Green Building Material
Sustainable Construction With Foam Concrete As A Green Green Building MaterialSustainable Construction With Foam Concrete As A Green Green Building Material
Sustainable Construction With Foam Concrete As A Green Green Building Material
 
USE OF ICT IN EDUCATION ONLINE COMPUTER BASED TEST
USE OF ICT IN EDUCATION ONLINE COMPUTER BASED TESTUSE OF ICT IN EDUCATION ONLINE COMPUTER BASED TEST
USE OF ICT IN EDUCATION ONLINE COMPUTER BASED TEST
 
Textual Data Partitioning with Relationship and Discriminative Analysis
Textual Data Partitioning with Relationship and Discriminative AnalysisTextual Data Partitioning with Relationship and Discriminative Analysis
Textual Data Partitioning with Relationship and Discriminative Analysis
 
Testing of Matrices Multiplication Methods on Different Processors
Testing of Matrices Multiplication Methods on Different ProcessorsTesting of Matrices Multiplication Methods on Different Processors
Testing of Matrices Multiplication Methods on Different Processors
 
Survey on Malware Detection Techniques
Survey on Malware Detection TechniquesSurvey on Malware Detection Techniques
Survey on Malware Detection Techniques
 
SURVEY OF TRUST BASED BLUETOOTH AUTHENTICATION FOR MOBILE DEVICE
SURVEY OF TRUST BASED BLUETOOTH AUTHENTICATION FOR MOBILE DEVICESURVEY OF TRUST BASED BLUETOOTH AUTHENTICATION FOR MOBILE DEVICE
SURVEY OF TRUST BASED BLUETOOTH AUTHENTICATION FOR MOBILE DEVICE
 
SURVEY OF GLAUCOMA DETECTION METHODS
SURVEY OF GLAUCOMA DETECTION METHODSSURVEY OF GLAUCOMA DETECTION METHODS
SURVEY OF GLAUCOMA DETECTION METHODS
 
Survey: Multipath routing for Wireless Sensor Network
Survey: Multipath routing for Wireless Sensor NetworkSurvey: Multipath routing for Wireless Sensor Network
Survey: Multipath routing for Wireless Sensor Network
 
Step up DC-DC Impedance source network based PMDC Motor Drive
Step up DC-DC Impedance source network based PMDC Motor DriveStep up DC-DC Impedance source network based PMDC Motor Drive
Step up DC-DC Impedance source network based PMDC Motor Drive
 
SPIRITUAL PERSPECTIVE OF AUROBINDO GHOSH’S PHILOSOPHY IN TODAY’S EDUCATION
SPIRITUAL PERSPECTIVE OF AUROBINDO GHOSH’S PHILOSOPHY IN TODAY’S EDUCATIONSPIRITUAL PERSPECTIVE OF AUROBINDO GHOSH’S PHILOSOPHY IN TODAY’S EDUCATION
SPIRITUAL PERSPECTIVE OF AUROBINDO GHOSH’S PHILOSOPHY IN TODAY’S EDUCATION
 
Software Quality Analysis Using Mutation Testing Scheme
Software Quality Analysis Using Mutation Testing SchemeSoftware Quality Analysis Using Mutation Testing Scheme
Software Quality Analysis Using Mutation Testing Scheme
 
Software Defect Prediction Using Local and Global Analysis
Software Defect Prediction Using Local and Global AnalysisSoftware Defect Prediction Using Local and Global Analysis
Software Defect Prediction Using Local and Global Analysis
 
Software Cost Estimation Using Clustering and Ranking Scheme
Software Cost Estimation Using Clustering and Ranking SchemeSoftware Cost Estimation Using Clustering and Ranking Scheme
Software Cost Estimation Using Clustering and Ranking Scheme
 

Recently uploaded

XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
ssuser89054b
 
1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf
1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf
1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf
AldoGarca30
 
Verification of thevenin's theorem for BEEE Lab (1).pptx
Verification of thevenin's theorem for BEEE Lab (1).pptxVerification of thevenin's theorem for BEEE Lab (1).pptx
Verification of thevenin's theorem for BEEE Lab (1).pptx
chumtiyababu
 
Hospital management system project report.pdf
Hospital management system project report.pdfHospital management system project report.pdf
Hospital management system project report.pdf
Kamal Acharya
 
Standard vs Custom Battery Packs - Decoding the Power Play
Standard vs Custom Battery Packs - Decoding the Power PlayStandard vs Custom Battery Packs - Decoding the Power Play
Standard vs Custom Battery Packs - Decoding the Power Play
Epec Engineered Technologies
 
Integrated Test Rig For HTFE-25 - Neometrix
Integrated Test Rig For HTFE-25 - NeometrixIntegrated Test Rig For HTFE-25 - Neometrix
Integrated Test Rig For HTFE-25 - Neometrix
Neometrix_Engineering_Pvt_Ltd
 
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak HamilCara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Kandungan 087776558899
 

Recently uploaded (20)

Unleashing the Power of the SORA AI lastest leap
Unleashing the Power of the SORA AI lastest leapUnleashing the Power of the SORA AI lastest leap
Unleashing the Power of the SORA AI lastest leap
 
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
 
Work-Permit-Receiver-in-Saudi-Aramco.pptx
Work-Permit-Receiver-in-Saudi-Aramco.pptxWork-Permit-Receiver-in-Saudi-Aramco.pptx
Work-Permit-Receiver-in-Saudi-Aramco.pptx
 
Hostel management system project report..pdf
Hostel management system project report..pdfHostel management system project report..pdf
Hostel management system project report..pdf
 
A CASE STUDY ON CERAMIC INDUSTRY OF BANGLADESH.pptx
A CASE STUDY ON CERAMIC INDUSTRY OF BANGLADESH.pptxA CASE STUDY ON CERAMIC INDUSTRY OF BANGLADESH.pptx
A CASE STUDY ON CERAMIC INDUSTRY OF BANGLADESH.pptx
 
1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf
1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf
1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf
 
HAND TOOLS USED AT ELECTRONICS WORK PRESENTED BY KOUSTAV SARKAR
HAND TOOLS USED AT ELECTRONICS WORK PRESENTED BY KOUSTAV SARKARHAND TOOLS USED AT ELECTRONICS WORK PRESENTED BY KOUSTAV SARKAR
HAND TOOLS USED AT ELECTRONICS WORK PRESENTED BY KOUSTAV SARKAR
 
Verification of thevenin's theorem for BEEE Lab (1).pptx
Verification of thevenin's theorem for BEEE Lab (1).pptxVerification of thevenin's theorem for BEEE Lab (1).pptx
Verification of thevenin's theorem for BEEE Lab (1).pptx
 
COST-EFFETIVE and Energy Efficient BUILDINGS ptx
COST-EFFETIVE  and Energy Efficient BUILDINGS ptxCOST-EFFETIVE  and Energy Efficient BUILDINGS ptx
COST-EFFETIVE and Energy Efficient BUILDINGS ptx
 
Hospital management system project report.pdf
Hospital management system project report.pdfHospital management system project report.pdf
Hospital management system project report.pdf
 
DC MACHINE-Motoring and generation, Armature circuit equation
DC MACHINE-Motoring and generation, Armature circuit equationDC MACHINE-Motoring and generation, Armature circuit equation
DC MACHINE-Motoring and generation, Armature circuit equation
 
Thermal Engineering -unit - III & IV.ppt
Thermal Engineering -unit - III & IV.pptThermal Engineering -unit - III & IV.ppt
Thermal Engineering -unit - III & IV.ppt
 
Standard vs Custom Battery Packs - Decoding the Power Play
Standard vs Custom Battery Packs - Decoding the Power PlayStandard vs Custom Battery Packs - Decoding the Power Play
Standard vs Custom Battery Packs - Decoding the Power Play
 
NO1 Top No1 Amil Baba In Azad Kashmir, Kashmir Black Magic Specialist Expert ...
NO1 Top No1 Amil Baba In Azad Kashmir, Kashmir Black Magic Specialist Expert ...NO1 Top No1 Amil Baba In Azad Kashmir, Kashmir Black Magic Specialist Expert ...
NO1 Top No1 Amil Baba In Azad Kashmir, Kashmir Black Magic Specialist Expert ...
 
A Study of Urban Area Plan for Pabna Municipality
A Study of Urban Area Plan for Pabna MunicipalityA Study of Urban Area Plan for Pabna Municipality
A Study of Urban Area Plan for Pabna Municipality
 
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...
 
Thermal Engineering Unit - I & II . ppt
Thermal Engineering  Unit - I & II . pptThermal Engineering  Unit - I & II . ppt
Thermal Engineering Unit - I & II . ppt
 
Integrated Test Rig For HTFE-25 - Neometrix
Integrated Test Rig For HTFE-25 - NeometrixIntegrated Test Rig For HTFE-25 - Neometrix
Integrated Test Rig For HTFE-25 - Neometrix
 
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak HamilCara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
 
Unit 4_Part 1 CSE2001 Exception Handling and Function Template and Class Temp...
Unit 4_Part 1 CSE2001 Exception Handling and Function Template and Class Temp...Unit 4_Part 1 CSE2001 Exception Handling and Function Template and Class Temp...
Unit 4_Part 1 CSE2001 Exception Handling and Function Template and Class Temp...
 

A Review Study on Shortest Path in WSN to detect the Abnormal Packet for saving Energy and Efficient Data Collection using AODV

  • 1. Scientific Journal Impact Factor (SJIF): 1.711 International Journal of Modern Trends in Engineering and Research www.ijmter.com @IJMTER-2014, All rights Reserved 279 e-ISSN: 2349-9745 p-ISSN: 2393-8161 A Review Study on Shortest Path in WSN to detect the Abnormal Packet for saving Energy and Efficient Data Collection using AODV Rajan kakkar1 ,Surender Singh2 1 M.Tech Student, 2 Asstt. Prof. in CSE Department, Om Institutes of Tech & Mgt. Abstract: The main motive of this research is to study energy-efficient data-gathering mechanisms to abnormal packet data for saving the energy. To detect the abnormal packet irregularities is useful for saving energy, as well as for management of network, because the patterns found can be used for both decision making in applications and system performance tuning. Node distribution in WSNs is either deterministic or self-organizing and application dependant. The sensor nodes in WSNs have minimum energy and they use their energy for communication and sensing. Keywords: AODV (Ad-hoc on demand distance vector), WSN (Wireless Sensor Network), DSDV (Destination sequence distance vector), SPACO (Shortest Path Ant Colony Optimization) I. INTRODUCTION 1.1. Wireless Sensor Network A Wireless sensor network is composed of tens to thousands of sensor nodes which are densely deployed in a sensor field and have the capability to collect data and route data back to its base station. Wireless Sensor Network is used in different application now a day’s [1], such as detecting and tanks on a battlefield, measuring traffic flow on roads, measuring humidity and other factors in fields, tracking in buildings. Sensor nodes consist of sensing unit, processing unit, and power unit. The “many - tiny” principle: wireless networks of thousands of inexpensive miniature devices capable of computation, communication and sensing A WSN application there are two types of nodes: source node – the node which actually sense and collect data – and sink node – the node to which the collected data is sent. The sinks can be part of the network or outside the wireless sensor networks. Usually, there is great number of source nodes than sink nodes. Therefore the two disciple sensor network and data mining can be combined. Knowledge from sensor data (Sensor-KDD) is important. Clustering of sensory data act as a nucleus job of data mining in KDD. Challenges for WSN The main aim of WSN is to transmit data by increasing the lifetime of the network and by employing energy efficient routing protocols. WSN face rigorous resource constraints in communication bandwidth, power supply, and storage and processor capacity. Again, the performance of a routing protocol depends on the architecture and design of the network, so the architecture and design of the network is very important features in WSNs. The pattern of the wireless sensor network is affect by many factors which must be overcome before an effective network can be achieved in WSNs.
  • 2. International Journal of Modern Trends in Engineering and Research (IJMTER) Volume 01, Issue 05, [November - 2014] e-ISSN: 2349-9745, p-ISSN: 2393-8161 @IJMTER-2014, All rights Reserved 280 Node Distribution: Higher-capability mobile robots may be dispatched to gather more accurate temperature or humidity readings Node distribution [12] in WSNs is either deterministic or self- organizing and application based. The uniformity of the cluster head directly affects the performance of the routing protocol used for this network. In case of deterministic node distribution, the sensor nodes are differently placed and gathered data is transmitted through pre-defined areas. The sensor nodes are distributed over the area of interest randomly thus creating an infrastructure in an ad hoc manner. Each sensor node consists of four major components: sensor, processing unit, power unit and transceiver. Dynamicity: Since the nodes in WSNs may be fixed or variable, dynamicity of the network is a challenging issue they are static, but in the case of dynamic BS or nodes routes from one node to another must be reported periodically within the network so that all nodes can transmit data via the reported route. Again depending on the application, the sensed event can be dynamic or static. Energy efficiency: The sensor nodes in WSNs have minimum energy and they use their energy for communication and sensing, so energy consumption is an important point in WSNs. According to various routing protocols nodes take part in data fusion and expend more energy. In this regard, direct communication is efficient. Since most of the times sensor nodes are distributed randomly, multi-hop routing is preferable. Scalability: A WSN consists many sensor nodes. Routing protocols must be workable with this large number of nodes i.e., these protocols can be able to handle all of the functionalities of the sensor nodes so that the lifetime of the network can be stable. Data Fusion: Data fusion is a process of combining of data from different sources according to some function. This is achieved by signal processing methods. This technique is used by some routing protocols for energy efficiency and data transfer optimization. II. RELATED WORK Nowadays sensors are very essential for today life to monitor environment where human cannot get involved very often. Wireless Sensor Networks (WSN) are used in many real world applications like environmental monitoring, traffic control, trajectory monitoring. It is more challenging for sensor network to sense and collect a large amount of data which are continuous over time, which in turn need to be forwarded to sink for further decision making process [2] . In [3], B.Yuan, Maria Orlowska and Shazia Sadiq, in Sep 2007, proposed that given a set of sparsely distributed sensors in the Euclidean plane, a mobile robot is required to visit all sensors to download the data and finally return to its base. The effective range of each sensor is specified by a disk, and the robot must at least reach the boundary to start communication. The primary goal of optimization in this scenario is to minimize the travelling distance by the robot many research activities have been carried out on the research issue. Since the fundamental task of WSN is to gather data efficiently with less resource consumption, to address the problem, there are two threads of research to improve the performance of data collecting: optimized data-gathering schemes and mobile collector assisted data-gathering in WSNs. For the first thread, most data-gathering algorithms aim to prolong lifetime with some optimized schemes. To balance load within each cluster, an even energy dissipation
  • 3. International Journal of Modern Trends in Engineering and Research (IJMTER) Volume 01, Issue 05, [November - 2014] e-ISSN: 2349-9745, p-ISSN: 2393-8161 @IJMTER-2014, All rights Reserved 281 protocol (EEDP) was proposed for efficient cluster-based data-gathering in WSNs. In [7] a new proposal is to gathers data in high-density WSNs in real-time, which determines network topology by hierarchical clustering to avoid radio collision and enables to gather data with minimum data latency from numerous high-density sensor nodes. To address the problem of gathering information in WSNs, the work in [4] took into account the fact that interference can occur at the reception of a message at the receiver sensor. However it assumes the distribution of sources are known. Another way to save energy is to decrease data transmitting with some schemes. A new distributed framework to achieve minimum energy data-gathering was proposed in [4]. To minimize the total energy for compressing and transporting information, the problem of constructing a data-gathering tree over a WSN was studied. To some extent, all those schemes require the node has extra computation to optimize the data transmission or compress and decompress data. For the second thread, nodes in WSNs are in multi-hop and mobile environment in general. The characteristic of each link will change timely. In the content of the WSNs where each node only has a partial view of the network, it is very important for each node to estimate the system status by a simple and accurate method. Especially for data transmission with less power consumption, a mobile data collector is more perfectly suited to such applications, for the collector can be equipped with a powerful transceiver and battery. Instead, it is effective to collect data by assisted mobile collector which can achieve better power saving performance [11]. A new data-gathering mechanism called M-collector for large-scale wireless sensor networks was proposed by introducing mobility into the network. However, it just considers the single-hop data gathering problem. An adaptive data-gathering protocol was proposed that employs multiple mobile collectors (instead of sinks) to help an existing WSN achieve such requirements, which adopts a virtual elastic-force model to help mobile collectors adjust their moving speed and direction while adapting to changes within the network. A novel data- collecting algorithm using a mobile robot to acquire sensed data from a wireless sensor network (WSN) that possesses partitioned/islanded WSNs is proposed in this paper. This algorithm permits the improvement of data collecting performance by the base station of partitioned/islanded WSNs and navigating a mobile robot to the desired location. However, the number of collectors cannot be predefined, for the irregularity of the information generation rate as well as the cost of mobile collectors. A well-planned adaptive moving strategy (AMS) for a mobile sink in large-scale, hierarchical sensor networks was presented. The mobile sink traverses the entire network uploading the sensed data from cluster heads in time-driven scenarios. However, it just tries to minimize the whole tour length to save energy. An efficient hybrid method for message relaying and load balancing was proposed in low-mobility wireless sensor networks. The system uses either a single hop transmission to a nearby mobile sink or a multi-hop transmission to a far-away fixed node depending on the predicted sink mobility pattern. Recently, many research efforts have appeared in the literature to explore the mobility in wireless sensor networks for data collection, we only survey the most related ones here [12]. The mobility-assisted data collection was classified into three categories in [12]: with random mobility, predictable mobility, and controlled mobility respectively. The mobile entities, referred to as Data Mobile Ubiquitous LAN Extensions (MULEs), lie in the middle tier on top of the stationary sensor nodes, move around in the network to collect data from sensor nodes, and ultimately upload the data to the sink. The term Data MULEs was widely used in the literature since then. In [10], the data collection process with predictable mobility was modeled as a queuing system, and the success of data collection was analyzed based on it. In [7], a mobile
  • 4. International Journal of Modern Trends in Engineering and Research (IJMTER) Volume 01, Issue 05, [November - 2014] e-ISSN: 2349-9745, p-ISSN: 2393-8161 @IJMTER-2014, All rights Reserved 282 data observer, called Sensor, was used as a mobile base-station in the network. It also showed that the design of the travelling tour is critical for SenCar to accomplish data collection jobs successfully. Observing the importance of the travelling tour, a lot of efforts were put into its optimal design, [2].The tour selection problem can be modeled as a Travelling Salesman Problem with Neighborhoods (TSPN), an NP-hard problem, if we do not consider the data rate constraints between the mobile element (ME) and sensor nodes, where all the neighborhoods are possibly intersected communication disks. It has been proven that approximating Euclidean TSPN within a factor of (2") is also NP-hard [11]. III. CONCLUSION Some distinct characteristics of WSNs such as large node density, unattended operation mode, high dynamicity and severe resource constraints pose a number of design challenges on sensor data- gathering schemes. Many research activities have been studied on the research issue. Since the fundamental task of WSN is to gather data efficiently with less resource consumption, to address the problem, there are two threads of research to improve the performance of data collecting: optimized data-gathering schemes and mobile collector assisted data-gathering in WSNs. Most data-gathering algorithms aim to prolong lifetime with some optimized schemes. REFERENCES [1].Yong Wang, Garhan Attebury and Byrav Ramamurthy, “A Survey of security issues in Wireless Sensor Networks”, IEEE Communication Survey 2006. [2]. Jang-Ping Sheu, “Design and Implementation of Mobile Robot for Nodes Replacement in Wireless Sensor Networks”, Journal of Information Science and Engineering 24, 393-410 (2008). [3] B. Yuan, M. Orlowska, and S. Sadiq (2007),“On the optimal robot routing problem in wireless sensor networks,”IEEE Trans. on Knowledge and Data Engineering, vol. 19, no 9, pp. 1252-1261. [4] M. A. Batalin and G. S. Sukhatme, “Efficient exploration without localization”, in Proceedings of the IEEE International Conference on Robotics and Automation, Vol.2, 2003, pp. 2714-2719. [5] K. F. Ssu, C. H. Ou, and H. C. Jiau, “Localization with mobile anchor points in wireless sensor networks”, IEEE Transactions on Vehicular Technology, Vol. 54, 2005, pp. 1187-1197. [6] A. Galstyan, B. Krishnamachari, K. Lerman, and S. Pattem, “Distributed online localization in sensor networks using a moving target”, in Proceedings of the 3rd International Symposium on Information Processing in Sensor Networks, 2004, pp. 61-70. [7] G. Wang, G. Cao, and T. LaPorta, “A bidding protocol for deploying mobile sensors”, in Proceedings of the 11th IEEE International Conference on Network Protocols,2003, pp. 315-324. [8] TinyOS, http://www.tinyos.net. [9] Liang He, “Reducing Data Collection Latency in Wireless Sensor Networks with Mobile Elements”. [10] M. R. Garey and D.S. Johnson, “Computers and Intractability: A Guide to the Theory of NP- Completeness. Freeman, San Francisco”, CA, 1979. [11] M. Gorges-Schleuter. Asparagos96 and the Travelling Salesman Problem. In T. Baeck, Z. Michalewicz, and X. Yao, editors, Proceedings of the IEEE International Conference on Evolutionary Computation (ICEC'97), 1997. [12] Bellare, M., Canetti, R., Krawczyk, H, “Keying hash functions for message authentication”, in Proceedings of Advances in Cryptology (CRYPTO’96). Lecture Notes in Computer Science, vol. 1109, Springer. 1–15.