SlideShare a Scribd company logo
1 of 4
Download to read offline
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 06 Issue: 03 | Mar 2019 www.irjet.net p-ISSN: 2395-0072
© 2018, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 2063
SECURITY EFFICIENCY OF TRANSFERING THE DATA FOR WIRELESS
SENSOR NETWORKS
R. Kavitha 1, Mrs. V. Vimala2
1,2Assistant Professor, Dept. of computer science Engineering, S.K.R Engineering College, chennai-600 123
---------------------------------------------------------------------***----------------------------------------------------------------------
Abstract - Remote sensor organize (WSN) is the promising
innovation that is being utilized for a few applications in
various fields. Progressions of WSN have made it conceivable
to convey the sensors in WKH a few fields. These security
dangers are seen at the all layers. Be that as it may, Medium
Access Control (Macintosh) sub-layer facesmoredifficultiesas
contrasted and different layers on account of radio that
expends more vitality assets. In this manner, any conceivable
assault over the Macintosh makes the back off working
procedure of WBANs. There are a few surely understood
assaults that reason the extra vitality utilization saw at the
Macintosh layer in WBANs. These assaults include the crash,
refusal of rest, and childish assault. The crash assault and
forswearing of rest assaults are looked into and dealt with for
Macintosh over the WBANs. In any case, narrow minded
assault isn't legitimately tended to. In this paper, weproposea
narrow-minded discovery medium access control (SDMAC)
calculation against childish assault in WBAN. Here the foe
hubs have advantage over genuine hubs on Macintosh
conventions that utilizationtheassetswrongly, whichprompts
vitality utilization in sensor hubs, proposed calculation
recognizes the phony hub and hinders the uncommon
exercises. For this situation, arrange execution is enhanced in
the wake of applying this proposedcalculation. Toapprovethe
execution of the proposed calculation, the reenactment is led
utilizing NS3. In light of the reenactment results, we exhibit
that our proposed SDMAC beats other known existing
conventions from vitality effectiveness and transfer speed
decrease point of view.
Key Words: WBAN, SDMAC
1. INTRODUCTION
Remote sensor arranges (WSN) is the promising
innovation that is being utilized for a few applications in
numerous fields. Progressions of WSN have made it
conceivable to convey the sensors in WKH a few fields (e.g.
fight, condition checking, reconnaissance, industry,
wellbeing and so on.) In any case, existing methodologies
encounter the serious security dangers in the field of WSNs
especially in the remote body territory systems (WBANs).
These security dangers are seen at all the layers. The fast
developmentofremotecorrespondenceshasmadetherange
asset winding up increasingly more shortage. The idea of
psychological radio was proposed to address the issue of
range productivity and had been getting an expanding
consideration as of late. In the subjective systems, the
optional clients (SUs) are permitted to detect, identify and
get to the recurrence groups that are not right now being
used by essential clients (Discharge). SUs must furnish with
the range detecting and access innovation to use the range
asset and assurance Discharge's correspondence nature of
administration. These assaultsincludetheimpact,disavowal
of rest, and narrow-minded assault.
2. Network formation
Versatile Hub is the essential ns Hub protest with
included functionalities like development, capacity to
transmit and get on a channel that enables it to be utilized to
make portable, remote recreation situations. The class
Portable Hub is gotten from the base classHub.VersatileHub
is a part question. The portability highlights including hub
development, intermittent position refreshes, keeping up
topology limit and so forth are actualized in C++ while pipes
of system parts inside Versatile Hub itself (like classifiers,
dmux , LL, Macintosh, Channel and so on.) have been
executed in Otcl. The systemcomprisesofastartinghub(n1),
an end hub (n2), a Basic Connection associating n1– n2, a
source transport layer specialist (UDP), and a sink transport
layer operator (invalid). This system can be made utilizing
the accompanying TCL reproduction content:
Set ns [new Simulator]
Set n1 [$ns node]
Set n2 [$ns node]
$ns simplex-link $n1 $n2 Drop Tail
Set udp [new Agent/UDP]
Set null [new Agent/Null]
$ns attach-agent $n1 $udp
$ns attach-agent $n2 $null
Here, command $ns node creates a Node object. The internal
mechanism of the node construction process was described.
The statement $ns simplex-link $n1 $n2 Drop Tail creates a
unidirectional Simple Link object, whichconnects noden1to
node n2.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 06 Issue: 03 | Mar 2019 www.irjet.net p-ISSN: 2395-0072
© 2018, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 2064
2.1 Data transmission
Looking at the system with the utilization of parcel
sniffing programming in versatile remote system is a viable
answer for distinguish the wellspring of assault. Existing
conventions need inseparatingtheavailabilitymisfortuneor
closing down of hubs because of malignant exercises and
other system issues like vitality misfortune and portability.
The proposed bundle sniffers can be to a great degree
valuable to identify and break down movement to separate
the malignant exercises from ordinary steering
disappointments and to restrain their destructiveoutcomes.
2.2 Feasible path selection
Where the QOS metrics are independent to each other a
new composite function p isderived. The compositefunction
p applies the additive and non-additive QOS parameters in
Euclidean space with some modifications. The path is out of
constraint values with minimum resources and hencewillbe
the more suitable one. If there are multiplefeasibleroutesfor
the same destination, then the proposed composite function
will be selected.
Quality of Service in MANET is defined as a set of service
requirements to be met by the network while transmitting
the packets between the source and destination. The
measurable specified service attributesareend-to-enddelay,
bandwidth, packet loss, energy and delay.
2.3 Optimal path selection
Optimized Link State Routing (OLSR) protocol will
choose the nodes with stronger coverability that creates the
overlap of nodes in the MultiPoint Relay (MPR) selection,
which will reduce the performance of the network.
Optimized Multicast Routing (OMR) protocol is able to
change behavior in different situations in order to improve
the metric like delivery ratio of the packet and throughput.
2.4 Energy Efficiency
The vitality show speakstothevitalitydimensionofhubs
in the system. The vitality display characterized in a hub has
an underlying worth that is the dimension of vitality thehub
has toward the start of the reenactment. This vitality is
named as beginning Vitality. In reproduction, the variable
"vitality" speaks to the vitality level in a hub at any
predefined time. The estimation of starting Vitalityispassed
as an info contention. A hub looses a specific measure of
vitality for each parcel transmitted and each bundle got.
Subsequently, the estimation of introductory Energy_ in a
hub gets diminished. The vitality utilization dimension of a
hub whenever of the reproduction can bedictated byfinding
the contrast between thepresentvitalityesteemandstarting
Vitality esteem. On the off chance that a vitalitydimensionof
a hub achieves zero, it can't get or transmit any longer
parcels.
3. EFFICIENCY OF TRANSFERING ALGORITHM
3.1 LEACH ALGORITHM FOR CLUSTER HEAD
FORMATION
In this project we proposed an improvement in LEACH
protocol which is optimized for the mobile nodes considered
as primaryand secondary nodes.Thisproposedmodification
is made on the basis of CH selection algorithm to ensure that
power resource is equally distributed among the sensor
nodes and every sensor nodehas an ability tobecomecluster
head.Random way pointmobility(RWP)modelisadaptedby
all the mobile sensor nodes.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 06 Issue: 03 | Mar 2019 www.irjet.net p-ISSN: 2395-0072
© 2018, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 2065
The rest of the project is organized as follows: CH describes
the working for basic leach and Mobile WSNs, discusses the
simulation of proposed algorithm and comparison of both
routing algorithms defining some performance metrics and
finally CHcompares the performanceandbehaviorofrouting
algorithms with various parameters.
3.2 SPECTRUM ALLOCATION ALGORITHM IN CRNS:
In CRNs, SUs can obtain large amount of wireless frequency
band for data transmission, and the spectrum utilizationcan
be improved dramatically. Recently, more and more work
focus on spectrum allocations in CRNs. The most commonly
used methods in spectrum allocations are queuing theory,
game theory, and information theory, etc. Here we mainly
make some discussions on the queuing theory. We can
classify the queuing-based spectrum allocations into two
types:
(1) The PUs accesses the licensed channels with a ON/OFF
model, which describes the PU occupying the licensed
channel or not. In this model, SUs is allowed to
opportunistically access licensed channel after confirming
that PU is idle using spectrum sensing algorithm;
(2) PUs and SUs are allowed to transmit their packets
simultaneously on the same channel. Such schemes assume
that successful interference cancellingtechniqueadopted, in
order to minimize the SU’s inference to PUs.
3.3 QUEUING MODEL ANALYSIS
Recently, most work on queuing-basedspectrumallocations
in CRNs are mainly considering M/G/1 model which
assumes that each channel forms a transmission queue with
the arriving packets from PUs and SUs. The transmission
delay of the packets will be caused when they are allocated
to one licensed channel. In this scenario, we can derive the
performance achievable in each channel. Based on above
analysis, we propose a spectrum allocation strategy using
M/M/c model in which all packets from SUs can be treated
as one virtual queue, and dynamically allocate these packets
to the licensed channels. As follow, we simply present the
M/G/1 model and introduce the M/M/c model in detail.
Three parameters are considered to describe the M/G/1
model, where ‘M’ means that the users packets arriving
obeys a Poisson process, and thus the interval of packets
arrival obeys to a negative exponential distribution; ‘G’
means the service time of every packet obeys to a general
distribution; and ‘1’ means only one server in the system. In
this queue model, the packet who comes first will be served
immediately, and the other users will wait in a virtual queue
and continue be served when the server is idle.
Several parameters are considered to describe the
performance of the queue system:
(1) Average queue length of system, which is defined as the
number of waiting packets in system;
(2) Average length of system, whichisdefinedasthenumber
of systems with the serving included;
(3) Average waiting time in the system, which refers to the
average time waiting for serving;
(4) Average sojourn time in system, which means the time
interval between the packet arrival at system and departure
from system. In general, most related research on spectrum
allocation in cognitive radio networks achieve a better QoS
and allocation strategies combined with M/G/1 model.
In traditional CRNs, SUs’ packets will be allocated to the
available channels which regarded as servers in M/G/1
model and every packet queue up atthesamechannel canbe
seen as the customers. With the help of above parameters
defined, we can derive the average transmission delay of
SUs’ packets.
EXPERIMENTAL RESULTS
4.1 NODE FORMATION
Network is initialised with the wireless node with their
specifiedlocation. In this number of nodes created has been
12.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 06 Issue: 03 | Mar 2019 www.irjet.net p-ISSN: 2395-0072
© 2018, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 2066
4.2 DATA TRANSMISSION
Initially packets select random nodes, after which
Pheromone value will get updated by all the packets as it
reaches the destination. After the particular process, all
packets move in the resulted shortest path. PN and SN in
which the data or packets can transmitted between the
nodes.
5. CONCLUSION
In this paper, we center around the lining-based range
distribution plot. We reason that the line hypothesis has
advantage for the range sharing. In CRNs, the SUs gets to the
authorized range band shrewdly, when it isn't possessed by
the Discharge. With the assistance of lining hypothesis, we
can determine the normal time postponementofSUs'parcel,
joining with data hypothesis, diversion hypothesis, and so
on. An appropriate system of range portion/sharing can be
determined considering transmission deferral and
throughput capacities. Aspersuchcapacities,theframework
can make full utilization of range openings which are
recognized by SUs. Ordinary deals with range
allotment/sharing based basically show a solitary channel.
The model-based range distribution is show for the CRNs in
which all parcels frame into a virtual line and allotted to the
accessible channels. We determine the normal transmission
postponement of every bundle with the examination of the
virtual line, and after that distribute a range gap for every
parcel in the entire framework.
REFERENCES
[1] Implementation of Dynamic Generation Size Adjustment
algorithm for cognitive Radio Ad-Hoc Network.
[2] Mitigating the impact of malicious behavior via utilizing
multiple routes in a cooperative sensing cognitive Radio
Network
[3] Cooperatively learning footprints of multiple incumbent
transmitters by using cognitive radio networks.
[4] Design and implementation of credit-based resource
allocation protocol for DSA systems

More Related Content

What's hot

Dead node detection in teen protocol survey
Dead node detection in teen protocol surveyDead node detection in teen protocol survey
Dead node detection in teen protocol surveyeSAT Publishing House
 
Dead node detection in teen protocol
Dead node detection in teen protocolDead node detection in teen protocol
Dead node detection in teen protocoleSAT Journals
 
Node Failure Prevention by Using Energy Efficient Routing In Wireless Sensor ...
Node Failure Prevention by Using Energy Efficient Routing In Wireless Sensor ...Node Failure Prevention by Using Energy Efficient Routing In Wireless Sensor ...
Node Failure Prevention by Using Energy Efficient Routing In Wireless Sensor ...IJTET Journal
 
A Fault Tolerant Approach to Enhances Wsn Lifetime in Star Topology
A Fault Tolerant Approach to Enhances Wsn Lifetime in Star TopologyA Fault Tolerant Approach to Enhances Wsn Lifetime in Star Topology
A Fault Tolerant Approach to Enhances Wsn Lifetime in Star TopologyIRJET Journal
 
Optimizing the Performance of I-mod Leach-PD Protocol in Wireless Sensor Netw...
Optimizing the Performance of I-mod Leach-PD Protocol in Wireless Sensor Netw...Optimizing the Performance of I-mod Leach-PD Protocol in Wireless Sensor Netw...
Optimizing the Performance of I-mod Leach-PD Protocol in Wireless Sensor Netw...ijsrd.com
 
LOAD BALANCED CLUSTERING WITH MIMO UPLOADING TECHNIQUE FOR MOBILE DATA GATHER...
LOAD BALANCED CLUSTERING WITH MIMO UPLOADING TECHNIQUE FOR MOBILE DATA GATHER...LOAD BALANCED CLUSTERING WITH MIMO UPLOADING TECHNIQUE FOR MOBILE DATA GATHER...
LOAD BALANCED CLUSTERING WITH MIMO UPLOADING TECHNIQUE FOR MOBILE DATA GATHER...Munisekhar Gunapati
 
Real-Time, Fault Tolerance and Energy-Efficiency (REFER) Enhancement in Wirel...
Real-Time, Fault Tolerance and Energy-Efficiency (REFER) Enhancement in Wirel...Real-Time, Fault Tolerance and Energy-Efficiency (REFER) Enhancement in Wirel...
Real-Time, Fault Tolerance and Energy-Efficiency (REFER) Enhancement in Wirel...IRJET Journal
 
Report on I-LEACH: An Energy Efficient Routing Protocol in Wireless Sensor Ne...
Report on I-LEACH: An Energy Efficient Routing Protocol in Wireless Sensor Ne...Report on I-LEACH: An Energy Efficient Routing Protocol in Wireless Sensor Ne...
Report on I-LEACH: An Energy Efficient Routing Protocol in Wireless Sensor Ne...divya_prabha
 
IRJET- Load Optimization with Coverage and Connectivity for Wireless Sensor N...
IRJET- Load Optimization with Coverage and Connectivity for Wireless Sensor N...IRJET- Load Optimization with Coverage and Connectivity for Wireless Sensor N...
IRJET- Load Optimization with Coverage and Connectivity for Wireless Sensor N...IRJET Journal
 
Energy efficient routing in wireless sensor networks
Energy efficient routing in wireless sensor networksEnergy efficient routing in wireless sensor networks
Energy efficient routing in wireless sensor networksSpandan Spandy
 
A Novel Handoff Necessity Estimation Approach Based on Travelling Distance
A Novel Handoff Necessity Estimation Approach Based on Travelling DistanceA Novel Handoff Necessity Estimation Approach Based on Travelling Distance
A Novel Handoff Necessity Estimation Approach Based on Travelling DistanceIJAAS Team
 
Faulty node recovery and replacement algorithm for wireless sensor network
Faulty node recovery and replacement algorithm for wireless sensor networkFaulty node recovery and replacement algorithm for wireless sensor network
Faulty node recovery and replacement algorithm for wireless sensor networkprjpublications
 
Comparison of Energy Efficient WSN in Coverage and Connectivity
Comparison of Energy Efficient WSN in Coverage and ConnectivityComparison of Energy Efficient WSN in Coverage and Connectivity
Comparison of Energy Efficient WSN in Coverage and ConnectivityIRJET Journal
 
FINAL PROJECT REPORT
FINAL PROJECT REPORTFINAL PROJECT REPORT
FINAL PROJECT REPORTSoham Wadekar
 
IRJET- Securing the Reliable Connectivity among Wireless Body Area Networks w...
IRJET- Securing the Reliable Connectivity among Wireless Body Area Networks w...IRJET- Securing the Reliable Connectivity among Wireless Body Area Networks w...
IRJET- Securing the Reliable Connectivity among Wireless Body Area Networks w...IRJET Journal
 
Project report on An Energy Efficient Routing Protocol in Wireless Sensor Net...
Project report on An Energy Efficient Routing Protocol in Wireless Sensor Net...Project report on An Energy Efficient Routing Protocol in Wireless Sensor Net...
Project report on An Energy Efficient Routing Protocol in Wireless Sensor Net...divya_prabha
 
Study of Leach Protocol- A Review
Study of Leach Protocol- A ReviewStudy of Leach Protocol- A Review
Study of Leach Protocol- A ReviewEditor IJMTER
 
Comparative Study of Routing Protocols in Wireless Sensor Networks by Abid Af...
Comparative Study of Routing Protocols in Wireless Sensor Networks by Abid Af...Comparative Study of Routing Protocols in Wireless Sensor Networks by Abid Af...
Comparative Study of Routing Protocols in Wireless Sensor Networks by Abid Af...Abid Afsar Khan Malang Falsafi
 

What's hot (20)

Dead node detection in teen protocol survey
Dead node detection in teen protocol surveyDead node detection in teen protocol survey
Dead node detection in teen protocol survey
 
Dead node detection in teen protocol
Dead node detection in teen protocolDead node detection in teen protocol
Dead node detection in teen protocol
 
Node Failure Prevention by Using Energy Efficient Routing In Wireless Sensor ...
Node Failure Prevention by Using Energy Efficient Routing In Wireless Sensor ...Node Failure Prevention by Using Energy Efficient Routing In Wireless Sensor ...
Node Failure Prevention by Using Energy Efficient Routing In Wireless Sensor ...
 
A Fault Tolerant Approach to Enhances Wsn Lifetime in Star Topology
A Fault Tolerant Approach to Enhances Wsn Lifetime in Star TopologyA Fault Tolerant Approach to Enhances Wsn Lifetime in Star Topology
A Fault Tolerant Approach to Enhances Wsn Lifetime in Star Topology
 
Optimizing the Performance of I-mod Leach-PD Protocol in Wireless Sensor Netw...
Optimizing the Performance of I-mod Leach-PD Protocol in Wireless Sensor Netw...Optimizing the Performance of I-mod Leach-PD Protocol in Wireless Sensor Netw...
Optimizing the Performance of I-mod Leach-PD Protocol in Wireless Sensor Netw...
 
LOAD BALANCED CLUSTERING WITH MIMO UPLOADING TECHNIQUE FOR MOBILE DATA GATHER...
LOAD BALANCED CLUSTERING WITH MIMO UPLOADING TECHNIQUE FOR MOBILE DATA GATHER...LOAD BALANCED CLUSTERING WITH MIMO UPLOADING TECHNIQUE FOR MOBILE DATA GATHER...
LOAD BALANCED CLUSTERING WITH MIMO UPLOADING TECHNIQUE FOR MOBILE DATA GATHER...
 
Real-Time, Fault Tolerance and Energy-Efficiency (REFER) Enhancement in Wirel...
Real-Time, Fault Tolerance and Energy-Efficiency (REFER) Enhancement in Wirel...Real-Time, Fault Tolerance and Energy-Efficiency (REFER) Enhancement in Wirel...
Real-Time, Fault Tolerance and Energy-Efficiency (REFER) Enhancement in Wirel...
 
Report on I-LEACH: An Energy Efficient Routing Protocol in Wireless Sensor Ne...
Report on I-LEACH: An Energy Efficient Routing Protocol in Wireless Sensor Ne...Report on I-LEACH: An Energy Efficient Routing Protocol in Wireless Sensor Ne...
Report on I-LEACH: An Energy Efficient Routing Protocol in Wireless Sensor Ne...
 
IRJET- Load Optimization with Coverage and Connectivity for Wireless Sensor N...
IRJET- Load Optimization with Coverage and Connectivity for Wireless Sensor N...IRJET- Load Optimization with Coverage and Connectivity for Wireless Sensor N...
IRJET- Load Optimization with Coverage and Connectivity for Wireless Sensor N...
 
Cognitive Radio Networks
Cognitive Radio NetworksCognitive Radio Networks
Cognitive Radio Networks
 
Energy efficient routing in wireless sensor networks
Energy efficient routing in wireless sensor networksEnergy efficient routing in wireless sensor networks
Energy efficient routing in wireless sensor networks
 
A Novel Handoff Necessity Estimation Approach Based on Travelling Distance
A Novel Handoff Necessity Estimation Approach Based on Travelling DistanceA Novel Handoff Necessity Estimation Approach Based on Travelling Distance
A Novel Handoff Necessity Estimation Approach Based on Travelling Distance
 
Faulty node recovery and replacement algorithm for wireless sensor network
Faulty node recovery and replacement algorithm for wireless sensor networkFaulty node recovery and replacement algorithm for wireless sensor network
Faulty node recovery and replacement algorithm for wireless sensor network
 
Comparison of Energy Efficient WSN in Coverage and Connectivity
Comparison of Energy Efficient WSN in Coverage and ConnectivityComparison of Energy Efficient WSN in Coverage and Connectivity
Comparison of Energy Efficient WSN in Coverage and Connectivity
 
FINAL PROJECT REPORT
FINAL PROJECT REPORTFINAL PROJECT REPORT
FINAL PROJECT REPORT
 
IRJET- Securing the Reliable Connectivity among Wireless Body Area Networks w...
IRJET- Securing the Reliable Connectivity among Wireless Body Area Networks w...IRJET- Securing the Reliable Connectivity among Wireless Body Area Networks w...
IRJET- Securing the Reliable Connectivity among Wireless Body Area Networks w...
 
Project report on An Energy Efficient Routing Protocol in Wireless Sensor Net...
Project report on An Energy Efficient Routing Protocol in Wireless Sensor Net...Project report on An Energy Efficient Routing Protocol in Wireless Sensor Net...
Project report on An Energy Efficient Routing Protocol in Wireless Sensor Net...
 
Leach wireless sensor ntwrk aa1
Leach wireless sensor ntwrk aa1Leach wireless sensor ntwrk aa1
Leach wireless sensor ntwrk aa1
 
Study of Leach Protocol- A Review
Study of Leach Protocol- A ReviewStudy of Leach Protocol- A Review
Study of Leach Protocol- A Review
 
Comparative Study of Routing Protocols in Wireless Sensor Networks by Abid Af...
Comparative Study of Routing Protocols in Wireless Sensor Networks by Abid Af...Comparative Study of Routing Protocols in Wireless Sensor Networks by Abid Af...
Comparative Study of Routing Protocols in Wireless Sensor Networks by Abid Af...
 

Similar to Efficient data transfer for WSNs

IRJET- A Study on Hierarchical Cluster based Routing Techniques in Wireless S...
IRJET- A Study on Hierarchical Cluster based Routing Techniques in Wireless S...IRJET- A Study on Hierarchical Cluster based Routing Techniques in Wireless S...
IRJET- A Study on Hierarchical Cluster based Routing Techniques in Wireless S...IRJET Journal
 
Computational Analysis of Routing Algorithm for Wireless Sensor Network
Computational Analysis of Routing Algorithm for Wireless Sensor NetworkComputational Analysis of Routing Algorithm for Wireless Sensor Network
Computational Analysis of Routing Algorithm for Wireless Sensor NetworkIRJET Journal
 
IRJET- Energy Efficiency and Security based Multihop Heterogeneous Trusted Th...
IRJET- Energy Efficiency and Security based Multihop Heterogeneous Trusted Th...IRJET- Energy Efficiency and Security based Multihop Heterogeneous Trusted Th...
IRJET- Energy Efficiency and Security based Multihop Heterogeneous Trusted Th...IRJET Journal
 
A Virtual Grid-Based Dynamic Routes Adjustment (VGDRA) Scheme for Wireless ...
A Virtual Grid-Based Dynamic Routes Adjustment (VGDRA) Scheme for   Wireless ...A Virtual Grid-Based Dynamic Routes Adjustment (VGDRA) Scheme for   Wireless ...
A Virtual Grid-Based Dynamic Routes Adjustment (VGDRA) Scheme for Wireless ...IRJET Journal
 
IRJET-A Virtual Grid-Based Dynamic Routes Adjustment (VGDRA) Scheme for Wir...
IRJET-A Virtual Grid-Based Dynamic Routes Adjustment (VGDRA) Scheme for   Wir...IRJET-A Virtual Grid-Based Dynamic Routes Adjustment (VGDRA) Scheme for   Wir...
IRJET-A Virtual Grid-Based Dynamic Routes Adjustment (VGDRA) Scheme for Wir...IRJET Journal
 
IRJET- Sink Mobility based Energy Efficient Routing Protocol for Wireless Sen...
IRJET- Sink Mobility based Energy Efficient Routing Protocol for Wireless Sen...IRJET- Sink Mobility based Energy Efficient Routing Protocol for Wireless Sen...
IRJET- Sink Mobility based Energy Efficient Routing Protocol for Wireless Sen...IRJET Journal
 
IRJET- Congestion Avoidance and Qos Improvement in Base Station with Femt...
IRJET-  	  Congestion Avoidance and Qos Improvement in Base Station with Femt...IRJET-  	  Congestion Avoidance and Qos Improvement in Base Station with Femt...
IRJET- Congestion Avoidance and Qos Improvement in Base Station with Femt...IRJET Journal
 
IRJET- Energy Efficient Protocol in Wireless Sensor Network
IRJET- Energy Efficient Protocol in Wireless Sensor NetworkIRJET- Energy Efficient Protocol in Wireless Sensor Network
IRJET- Energy Efficient Protocol in Wireless Sensor NetworkIRJET Journal
 
Improved Development of Energy Efficient Routing Algorithm for Privacy Preser...
Improved Development of Energy Efficient Routing Algorithm for Privacy Preser...Improved Development of Energy Efficient Routing Algorithm for Privacy Preser...
Improved Development of Energy Efficient Routing Algorithm for Privacy Preser...IRJET Journal
 
IRJET - Analytical Study of Hierarchical Routing Protocols for Virtual Wi...
IRJET -  	  Analytical Study of Hierarchical Routing Protocols for Virtual Wi...IRJET -  	  Analytical Study of Hierarchical Routing Protocols for Virtual Wi...
IRJET - Analytical Study of Hierarchical Routing Protocols for Virtual Wi...IRJET Journal
 
An Improved Enhanced Real Time Routing Protocol (IERT) for Mobile Wireless Se...
An Improved Enhanced Real Time Routing Protocol (IERT) for Mobile Wireless Se...An Improved Enhanced Real Time Routing Protocol (IERT) for Mobile Wireless Se...
An Improved Enhanced Real Time Routing Protocol (IERT) for Mobile Wireless Se...IRJET Journal
 
IRJET- Chaos based Secured Communication in Energy Efficient Wireless Sensor...
IRJET-	 Chaos based Secured Communication in Energy Efficient Wireless Sensor...IRJET-	 Chaos based Secured Communication in Energy Efficient Wireless Sensor...
IRJET- Chaos based Secured Communication in Energy Efficient Wireless Sensor...IRJET Journal
 
Dynamic Slot Allocation for Improving Traffic Performance in Wireless Sensor ...
Dynamic Slot Allocation for Improving Traffic Performance in Wireless Sensor ...Dynamic Slot Allocation for Improving Traffic Performance in Wireless Sensor ...
Dynamic Slot Allocation for Improving Traffic Performance in Wireless Sensor ...IRJET Journal
 
IRJET-A Brief Study of Leach based Routing Protocol in Wireless Sensor Networks
IRJET-A Brief Study of Leach based Routing Protocol in Wireless Sensor NetworksIRJET-A Brief Study of Leach based Routing Protocol in Wireless Sensor Networks
IRJET-A Brief Study of Leach based Routing Protocol in Wireless Sensor NetworksIRJET Journal
 
Analysis of MAC protocol for Cognitive Radio Wireless Sensor Network (CR-WSN)
Analysis of MAC protocol for Cognitive Radio Wireless Sensor Network (CR-WSN)Analysis of MAC protocol for Cognitive Radio Wireless Sensor Network (CR-WSN)
Analysis of MAC protocol for Cognitive Radio Wireless Sensor Network (CR-WSN)IRJET Journal
 
Performance Analysis of DSR, STAR, ZRP Routing Protocols for a Dynamic Ad-Hoc...
Performance Analysis of DSR, STAR, ZRP Routing Protocols for a Dynamic Ad-Hoc...Performance Analysis of DSR, STAR, ZRP Routing Protocols for a Dynamic Ad-Hoc...
Performance Analysis of DSR, STAR, ZRP Routing Protocols for a Dynamic Ad-Hoc...IRJET Journal
 
IRJET- Security and QoS Aware Dynamic Clustering (SQADC) Routing Protocol for...
IRJET- Security and QoS Aware Dynamic Clustering (SQADC) Routing Protocol for...IRJET- Security and QoS Aware Dynamic Clustering (SQADC) Routing Protocol for...
IRJET- Security and QoS Aware Dynamic Clustering (SQADC) Routing Protocol for...IRJET Journal
 
IRJET- Energy Efficient Reactive Routing to Enhance QOS of Manets
IRJET- Energy Efficient Reactive Routing to Enhance QOS of ManetsIRJET- Energy Efficient Reactive Routing to Enhance QOS of Manets
IRJET- Energy Efficient Reactive Routing to Enhance QOS of ManetsIRJET Journal
 
IRJET- An Introduction to Wireless Sensor Networks, its Challenges and Security
IRJET- An Introduction to Wireless Sensor Networks, its Challenges and SecurityIRJET- An Introduction to Wireless Sensor Networks, its Challenges and Security
IRJET- An Introduction to Wireless Sensor Networks, its Challenges and SecurityIRJET Journal
 
IRJET- Energy Efficient Secure Communication in Wireless Sensor Networks: A S...
IRJET- Energy Efficient Secure Communication in Wireless Sensor Networks: A S...IRJET- Energy Efficient Secure Communication in Wireless Sensor Networks: A S...
IRJET- Energy Efficient Secure Communication in Wireless Sensor Networks: A S...IRJET Journal
 

Similar to Efficient data transfer for WSNs (20)

IRJET- A Study on Hierarchical Cluster based Routing Techniques in Wireless S...
IRJET- A Study on Hierarchical Cluster based Routing Techniques in Wireless S...IRJET- A Study on Hierarchical Cluster based Routing Techniques in Wireless S...
IRJET- A Study on Hierarchical Cluster based Routing Techniques in Wireless S...
 
Computational Analysis of Routing Algorithm for Wireless Sensor Network
Computational Analysis of Routing Algorithm for Wireless Sensor NetworkComputational Analysis of Routing Algorithm for Wireless Sensor Network
Computational Analysis of Routing Algorithm for Wireless Sensor Network
 
IRJET- Energy Efficiency and Security based Multihop Heterogeneous Trusted Th...
IRJET- Energy Efficiency and Security based Multihop Heterogeneous Trusted Th...IRJET- Energy Efficiency and Security based Multihop Heterogeneous Trusted Th...
IRJET- Energy Efficiency and Security based Multihop Heterogeneous Trusted Th...
 
A Virtual Grid-Based Dynamic Routes Adjustment (VGDRA) Scheme for Wireless ...
A Virtual Grid-Based Dynamic Routes Adjustment (VGDRA) Scheme for   Wireless ...A Virtual Grid-Based Dynamic Routes Adjustment (VGDRA) Scheme for   Wireless ...
A Virtual Grid-Based Dynamic Routes Adjustment (VGDRA) Scheme for Wireless ...
 
IRJET-A Virtual Grid-Based Dynamic Routes Adjustment (VGDRA) Scheme for Wir...
IRJET-A Virtual Grid-Based Dynamic Routes Adjustment (VGDRA) Scheme for   Wir...IRJET-A Virtual Grid-Based Dynamic Routes Adjustment (VGDRA) Scheme for   Wir...
IRJET-A Virtual Grid-Based Dynamic Routes Adjustment (VGDRA) Scheme for Wir...
 
IRJET- Sink Mobility based Energy Efficient Routing Protocol for Wireless Sen...
IRJET- Sink Mobility based Energy Efficient Routing Protocol for Wireless Sen...IRJET- Sink Mobility based Energy Efficient Routing Protocol for Wireless Sen...
IRJET- Sink Mobility based Energy Efficient Routing Protocol for Wireless Sen...
 
IRJET- Congestion Avoidance and Qos Improvement in Base Station with Femt...
IRJET-  	  Congestion Avoidance and Qos Improvement in Base Station with Femt...IRJET-  	  Congestion Avoidance and Qos Improvement in Base Station with Femt...
IRJET- Congestion Avoidance and Qos Improvement in Base Station with Femt...
 
IRJET- Energy Efficient Protocol in Wireless Sensor Network
IRJET- Energy Efficient Protocol in Wireless Sensor NetworkIRJET- Energy Efficient Protocol in Wireless Sensor Network
IRJET- Energy Efficient Protocol in Wireless Sensor Network
 
Improved Development of Energy Efficient Routing Algorithm for Privacy Preser...
Improved Development of Energy Efficient Routing Algorithm for Privacy Preser...Improved Development of Energy Efficient Routing Algorithm for Privacy Preser...
Improved Development of Energy Efficient Routing Algorithm for Privacy Preser...
 
IRJET - Analytical Study of Hierarchical Routing Protocols for Virtual Wi...
IRJET -  	  Analytical Study of Hierarchical Routing Protocols for Virtual Wi...IRJET -  	  Analytical Study of Hierarchical Routing Protocols for Virtual Wi...
IRJET - Analytical Study of Hierarchical Routing Protocols for Virtual Wi...
 
An Improved Enhanced Real Time Routing Protocol (IERT) for Mobile Wireless Se...
An Improved Enhanced Real Time Routing Protocol (IERT) for Mobile Wireless Se...An Improved Enhanced Real Time Routing Protocol (IERT) for Mobile Wireless Se...
An Improved Enhanced Real Time Routing Protocol (IERT) for Mobile Wireless Se...
 
IRJET- Chaos based Secured Communication in Energy Efficient Wireless Sensor...
IRJET-	 Chaos based Secured Communication in Energy Efficient Wireless Sensor...IRJET-	 Chaos based Secured Communication in Energy Efficient Wireless Sensor...
IRJET- Chaos based Secured Communication in Energy Efficient Wireless Sensor...
 
Dynamic Slot Allocation for Improving Traffic Performance in Wireless Sensor ...
Dynamic Slot Allocation for Improving Traffic Performance in Wireless Sensor ...Dynamic Slot Allocation for Improving Traffic Performance in Wireless Sensor ...
Dynamic Slot Allocation for Improving Traffic Performance in Wireless Sensor ...
 
IRJET-A Brief Study of Leach based Routing Protocol in Wireless Sensor Networks
IRJET-A Brief Study of Leach based Routing Protocol in Wireless Sensor NetworksIRJET-A Brief Study of Leach based Routing Protocol in Wireless Sensor Networks
IRJET-A Brief Study of Leach based Routing Protocol in Wireless Sensor Networks
 
Analysis of MAC protocol for Cognitive Radio Wireless Sensor Network (CR-WSN)
Analysis of MAC protocol for Cognitive Radio Wireless Sensor Network (CR-WSN)Analysis of MAC protocol for Cognitive Radio Wireless Sensor Network (CR-WSN)
Analysis of MAC protocol for Cognitive Radio Wireless Sensor Network (CR-WSN)
 
Performance Analysis of DSR, STAR, ZRP Routing Protocols for a Dynamic Ad-Hoc...
Performance Analysis of DSR, STAR, ZRP Routing Protocols for a Dynamic Ad-Hoc...Performance Analysis of DSR, STAR, ZRP Routing Protocols for a Dynamic Ad-Hoc...
Performance Analysis of DSR, STAR, ZRP Routing Protocols for a Dynamic Ad-Hoc...
 
IRJET- Security and QoS Aware Dynamic Clustering (SQADC) Routing Protocol for...
IRJET- Security and QoS Aware Dynamic Clustering (SQADC) Routing Protocol for...IRJET- Security and QoS Aware Dynamic Clustering (SQADC) Routing Protocol for...
IRJET- Security and QoS Aware Dynamic Clustering (SQADC) Routing Protocol for...
 
IRJET- Energy Efficient Reactive Routing to Enhance QOS of Manets
IRJET- Energy Efficient Reactive Routing to Enhance QOS of ManetsIRJET- Energy Efficient Reactive Routing to Enhance QOS of Manets
IRJET- Energy Efficient Reactive Routing to Enhance QOS of Manets
 
IRJET- An Introduction to Wireless Sensor Networks, its Challenges and Security
IRJET- An Introduction to Wireless Sensor Networks, its Challenges and SecurityIRJET- An Introduction to Wireless Sensor Networks, its Challenges and Security
IRJET- An Introduction to Wireless Sensor Networks, its Challenges and Security
 
IRJET- Energy Efficient Secure Communication in Wireless Sensor Networks: A S...
IRJET- Energy Efficient Secure Communication in Wireless Sensor Networks: A S...IRJET- Energy Efficient Secure Communication in Wireless Sensor Networks: A S...
IRJET- Energy Efficient Secure Communication in Wireless Sensor Networks: A S...
 

More from IRJET Journal

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...IRJET Journal
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTUREIRJET Journal
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...IRJET Journal
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsIRJET Journal
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...IRJET Journal
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...IRJET Journal
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...IRJET Journal
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...IRJET Journal
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASIRJET Journal
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...IRJET Journal
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProIRJET Journal
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...IRJET Journal
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemIRJET Journal
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesIRJET Journal
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web applicationIRJET Journal
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...IRJET Journal
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.IRJET Journal
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...IRJET Journal
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignIRJET Journal
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...IRJET Journal
 

More from IRJET Journal (20)

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web application
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
 

Recently uploaded

Call Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile serviceCall Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile servicerehmti665
 
Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.eptoze12
 
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSKurinjimalarL3
 
Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...VICTOR MAESTRE RAMIREZ
 
Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024hassan khalil
 
power system scada applications and uses
power system scada applications and usespower system scada applications and uses
power system scada applications and usesDevarapalliHaritha
 
microprocessor 8085 and its interfacing
microprocessor 8085  and its interfacingmicroprocessor 8085  and its interfacing
microprocessor 8085 and its interfacingjaychoudhary37
 
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escortsranjana rawat
 
Current Transformer Drawing and GTP for MSETCL
Current Transformer Drawing and GTP for MSETCLCurrent Transformer Drawing and GTP for MSETCL
Current Transformer Drawing and GTP for MSETCLDeelipZope
 
chaitra-1.pptx fake news detection using machine learning
chaitra-1.pptx  fake news detection using machine learningchaitra-1.pptx  fake news detection using machine learning
chaitra-1.pptx fake news detection using machine learningmisbanausheenparvam
 
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...ZTE
 
Biology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxBiology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxDeepakSakkari2
 
Call Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call GirlsCall Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call Girlsssuser7cb4ff
 
Artificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptxArtificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptxbritheesh05
 
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxWhat are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxwendy cai
 
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerStudy on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerAnamika Sarkar
 

Recently uploaded (20)

Call Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile serviceCall Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile service
 
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptxExploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
 
Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.
 
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
 
Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...
 
Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024
 
power system scada applications and uses
power system scada applications and usespower system scada applications and uses
power system scada applications and uses
 
microprocessor 8085 and its interfacing
microprocessor 8085  and its interfacingmicroprocessor 8085  and its interfacing
microprocessor 8085 and its interfacing
 
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
 
Current Transformer Drawing and GTP for MSETCL
Current Transformer Drawing and GTP for MSETCLCurrent Transformer Drawing and GTP for MSETCL
Current Transformer Drawing and GTP for MSETCL
 
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
 
chaitra-1.pptx fake news detection using machine learning
chaitra-1.pptx  fake news detection using machine learningchaitra-1.pptx  fake news detection using machine learning
chaitra-1.pptx fake news detection using machine learning
 
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...
 
Biology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxBiology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptx
 
Call Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call GirlsCall Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call Girls
 
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
 
Artificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptxArtificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptx
 
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxWhat are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptx
 
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
 
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerStudy on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
 

Efficient data transfer for WSNs

  • 1. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 03 | Mar 2019 www.irjet.net p-ISSN: 2395-0072 © 2018, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 2063 SECURITY EFFICIENCY OF TRANSFERING THE DATA FOR WIRELESS SENSOR NETWORKS R. Kavitha 1, Mrs. V. Vimala2 1,2Assistant Professor, Dept. of computer science Engineering, S.K.R Engineering College, chennai-600 123 ---------------------------------------------------------------------***---------------------------------------------------------------------- Abstract - Remote sensor organize (WSN) is the promising innovation that is being utilized for a few applications in various fields. Progressions of WSN have made it conceivable to convey the sensors in WKH a few fields. These security dangers are seen at the all layers. Be that as it may, Medium Access Control (Macintosh) sub-layer facesmoredifficultiesas contrasted and different layers on account of radio that expends more vitality assets. In this manner, any conceivable assault over the Macintosh makes the back off working procedure of WBANs. There are a few surely understood assaults that reason the extra vitality utilization saw at the Macintosh layer in WBANs. These assaults include the crash, refusal of rest, and childish assault. The crash assault and forswearing of rest assaults are looked into and dealt with for Macintosh over the WBANs. In any case, narrow minded assault isn't legitimately tended to. In this paper, weproposea narrow-minded discovery medium access control (SDMAC) calculation against childish assault in WBAN. Here the foe hubs have advantage over genuine hubs on Macintosh conventions that utilizationtheassetswrongly, whichprompts vitality utilization in sensor hubs, proposed calculation recognizes the phony hub and hinders the uncommon exercises. For this situation, arrange execution is enhanced in the wake of applying this proposedcalculation. Toapprovethe execution of the proposed calculation, the reenactment is led utilizing NS3. In light of the reenactment results, we exhibit that our proposed SDMAC beats other known existing conventions from vitality effectiveness and transfer speed decrease point of view. Key Words: WBAN, SDMAC 1. INTRODUCTION Remote sensor arranges (WSN) is the promising innovation that is being utilized for a few applications in numerous fields. Progressions of WSN have made it conceivable to convey the sensors in WKH a few fields (e.g. fight, condition checking, reconnaissance, industry, wellbeing and so on.) In any case, existing methodologies encounter the serious security dangers in the field of WSNs especially in the remote body territory systems (WBANs). These security dangers are seen at all the layers. The fast developmentofremotecorrespondenceshasmadetherange asset winding up increasingly more shortage. The idea of psychological radio was proposed to address the issue of range productivity and had been getting an expanding consideration as of late. In the subjective systems, the optional clients (SUs) are permitted to detect, identify and get to the recurrence groups that are not right now being used by essential clients (Discharge). SUs must furnish with the range detecting and access innovation to use the range asset and assurance Discharge's correspondence nature of administration. These assaultsincludetheimpact,disavowal of rest, and narrow-minded assault. 2. Network formation Versatile Hub is the essential ns Hub protest with included functionalities like development, capacity to transmit and get on a channel that enables it to be utilized to make portable, remote recreation situations. The class Portable Hub is gotten from the base classHub.VersatileHub is a part question. The portability highlights including hub development, intermittent position refreshes, keeping up topology limit and so forth are actualized in C++ while pipes of system parts inside Versatile Hub itself (like classifiers, dmux , LL, Macintosh, Channel and so on.) have been executed in Otcl. The systemcomprisesofastartinghub(n1), an end hub (n2), a Basic Connection associating n1– n2, a source transport layer specialist (UDP), and a sink transport layer operator (invalid). This system can be made utilizing the accompanying TCL reproduction content: Set ns [new Simulator] Set n1 [$ns node] Set n2 [$ns node] $ns simplex-link $n1 $n2 Drop Tail Set udp [new Agent/UDP] Set null [new Agent/Null] $ns attach-agent $n1 $udp $ns attach-agent $n2 $null Here, command $ns node creates a Node object. The internal mechanism of the node construction process was described. The statement $ns simplex-link $n1 $n2 Drop Tail creates a unidirectional Simple Link object, whichconnects noden1to node n2.
  • 2. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 03 | Mar 2019 www.irjet.net p-ISSN: 2395-0072 © 2018, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 2064 2.1 Data transmission Looking at the system with the utilization of parcel sniffing programming in versatile remote system is a viable answer for distinguish the wellspring of assault. Existing conventions need inseparatingtheavailabilitymisfortuneor closing down of hubs because of malignant exercises and other system issues like vitality misfortune and portability. The proposed bundle sniffers can be to a great degree valuable to identify and break down movement to separate the malignant exercises from ordinary steering disappointments and to restrain their destructiveoutcomes. 2.2 Feasible path selection Where the QOS metrics are independent to each other a new composite function p isderived. The compositefunction p applies the additive and non-additive QOS parameters in Euclidean space with some modifications. The path is out of constraint values with minimum resources and hencewillbe the more suitable one. If there are multiplefeasibleroutesfor the same destination, then the proposed composite function will be selected. Quality of Service in MANET is defined as a set of service requirements to be met by the network while transmitting the packets between the source and destination. The measurable specified service attributesareend-to-enddelay, bandwidth, packet loss, energy and delay. 2.3 Optimal path selection Optimized Link State Routing (OLSR) protocol will choose the nodes with stronger coverability that creates the overlap of nodes in the MultiPoint Relay (MPR) selection, which will reduce the performance of the network. Optimized Multicast Routing (OMR) protocol is able to change behavior in different situations in order to improve the metric like delivery ratio of the packet and throughput. 2.4 Energy Efficiency The vitality show speakstothevitalitydimensionofhubs in the system. The vitality display characterized in a hub has an underlying worth that is the dimension of vitality thehub has toward the start of the reenactment. This vitality is named as beginning Vitality. In reproduction, the variable "vitality" speaks to the vitality level in a hub at any predefined time. The estimation of starting Vitalityispassed as an info contention. A hub looses a specific measure of vitality for each parcel transmitted and each bundle got. Subsequently, the estimation of introductory Energy_ in a hub gets diminished. The vitality utilization dimension of a hub whenever of the reproduction can bedictated byfinding the contrast between thepresentvitalityesteemandstarting Vitality esteem. On the off chance that a vitalitydimensionof a hub achieves zero, it can't get or transmit any longer parcels. 3. EFFICIENCY OF TRANSFERING ALGORITHM 3.1 LEACH ALGORITHM FOR CLUSTER HEAD FORMATION In this project we proposed an improvement in LEACH protocol which is optimized for the mobile nodes considered as primaryand secondary nodes.Thisproposedmodification is made on the basis of CH selection algorithm to ensure that power resource is equally distributed among the sensor nodes and every sensor nodehas an ability tobecomecluster head.Random way pointmobility(RWP)modelisadaptedby all the mobile sensor nodes.
  • 3. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 03 | Mar 2019 www.irjet.net p-ISSN: 2395-0072 © 2018, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 2065 The rest of the project is organized as follows: CH describes the working for basic leach and Mobile WSNs, discusses the simulation of proposed algorithm and comparison of both routing algorithms defining some performance metrics and finally CHcompares the performanceandbehaviorofrouting algorithms with various parameters. 3.2 SPECTRUM ALLOCATION ALGORITHM IN CRNS: In CRNs, SUs can obtain large amount of wireless frequency band for data transmission, and the spectrum utilizationcan be improved dramatically. Recently, more and more work focus on spectrum allocations in CRNs. The most commonly used methods in spectrum allocations are queuing theory, game theory, and information theory, etc. Here we mainly make some discussions on the queuing theory. We can classify the queuing-based spectrum allocations into two types: (1) The PUs accesses the licensed channels with a ON/OFF model, which describes the PU occupying the licensed channel or not. In this model, SUs is allowed to opportunistically access licensed channel after confirming that PU is idle using spectrum sensing algorithm; (2) PUs and SUs are allowed to transmit their packets simultaneously on the same channel. Such schemes assume that successful interference cancellingtechniqueadopted, in order to minimize the SU’s inference to PUs. 3.3 QUEUING MODEL ANALYSIS Recently, most work on queuing-basedspectrumallocations in CRNs are mainly considering M/G/1 model which assumes that each channel forms a transmission queue with the arriving packets from PUs and SUs. The transmission delay of the packets will be caused when they are allocated to one licensed channel. In this scenario, we can derive the performance achievable in each channel. Based on above analysis, we propose a spectrum allocation strategy using M/M/c model in which all packets from SUs can be treated as one virtual queue, and dynamically allocate these packets to the licensed channels. As follow, we simply present the M/G/1 model and introduce the M/M/c model in detail. Three parameters are considered to describe the M/G/1 model, where ‘M’ means that the users packets arriving obeys a Poisson process, and thus the interval of packets arrival obeys to a negative exponential distribution; ‘G’ means the service time of every packet obeys to a general distribution; and ‘1’ means only one server in the system. In this queue model, the packet who comes first will be served immediately, and the other users will wait in a virtual queue and continue be served when the server is idle. Several parameters are considered to describe the performance of the queue system: (1) Average queue length of system, which is defined as the number of waiting packets in system; (2) Average length of system, whichisdefinedasthenumber of systems with the serving included; (3) Average waiting time in the system, which refers to the average time waiting for serving; (4) Average sojourn time in system, which means the time interval between the packet arrival at system and departure from system. In general, most related research on spectrum allocation in cognitive radio networks achieve a better QoS and allocation strategies combined with M/G/1 model. In traditional CRNs, SUs’ packets will be allocated to the available channels which regarded as servers in M/G/1 model and every packet queue up atthesamechannel canbe seen as the customers. With the help of above parameters defined, we can derive the average transmission delay of SUs’ packets. EXPERIMENTAL RESULTS 4.1 NODE FORMATION Network is initialised with the wireless node with their specifiedlocation. In this number of nodes created has been 12.
  • 4. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 03 | Mar 2019 www.irjet.net p-ISSN: 2395-0072 © 2018, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 2066 4.2 DATA TRANSMISSION Initially packets select random nodes, after which Pheromone value will get updated by all the packets as it reaches the destination. After the particular process, all packets move in the resulted shortest path. PN and SN in which the data or packets can transmitted between the nodes. 5. CONCLUSION In this paper, we center around the lining-based range distribution plot. We reason that the line hypothesis has advantage for the range sharing. In CRNs, the SUs gets to the authorized range band shrewdly, when it isn't possessed by the Discharge. With the assistance of lining hypothesis, we can determine the normal time postponementofSUs'parcel, joining with data hypothesis, diversion hypothesis, and so on. An appropriate system of range portion/sharing can be determined considering transmission deferral and throughput capacities. Aspersuchcapacities,theframework can make full utilization of range openings which are recognized by SUs. Ordinary deals with range allotment/sharing based basically show a solitary channel. The model-based range distribution is show for the CRNs in which all parcels frame into a virtual line and allotted to the accessible channels. We determine the normal transmission postponement of every bundle with the examination of the virtual line, and after that distribute a range gap for every parcel in the entire framework. REFERENCES [1] Implementation of Dynamic Generation Size Adjustment algorithm for cognitive Radio Ad-Hoc Network. [2] Mitigating the impact of malicious behavior via utilizing multiple routes in a cooperative sensing cognitive Radio Network [3] Cooperatively learning footprints of multiple incumbent transmitters by using cognitive radio networks. [4] Design and implementation of credit-based resource allocation protocol for DSA systems