SlideShare a Scribd company logo
1 of 4
Download to read offline
International Journal of Computer Applications Technology and Research
Volume 4– Issue 4, 258 - 261, 2015, ISSN:- 2319–8656
www.ijcat.com 258
ENERGY EFFICIENCY IN FILE TRANSFER ACROSS
WIRELESS COMMUNICATION
Snigdhamayee Biswal
Bharath University
Chennai, India
A.Agal Veena
Bharath University
Chennai, India
Shilpi Kumar
Bharath University
Chennai, India
G.Michael
Bharath University
Chennai, India
____________________________________________________________________________________________________
Abstract: The key idea of our Energy Efficiency management is to use the exchange between energy consumption vs the gain in
responsibility, timeliness, and security to maximize the system helpful time period. we tend to formulate the exchange as Associate
in Nursing optimization downside for dynamically crucial the most effective redundancy level to use to multipath routing for
intrusion tolerance so the question response success likelihood is maximized whereas prolonging the helpful time period. Moreover,
we think about this optimization downside for the case during which a voting-based distributed intrusion detection formula is
applied to sight and evict malicious nodes during a HWSN. we over see to develop a novel likelihood model to investigate the most
effective redundancy level in terms of path redundancy and supply redundancy, further because the best intrusion detection settings
in terms of the amount of voters and the intrusion invocation interval below that the time period of a HWSN is maximized. we over
see to then apply the analysis results obtained to the planning of a dynamic redundancy management formula to identify and apply
the most effective style parameter settings at runtime in response to environmental changes, to maximize the HWSN lifetime.
Keywords: Intrusion detection system (IDS), multipath routing, fault tolerance, trust management, heterogeneous WSN (HWSN).
________________________________________________________________________________________________________
1.INTRODUCTION:
Advances in wireless communication and miniature
electronics have enabled the Development of small, low-
cost, low-power sensor nodes (SNs) with sensing and
Communication capabilities [1],[2]. Therefore, the issues of
Wireless Sensor Networks (WSNs) have become popular
research subjects. WSN is infrastructure based network, and
through the mass deployment of SNs, a WSN is formed. The
major function of WSN is to collect and monitor the related
information which about the specific environment. The SNs
detect the surrounding environment or the given target and
deliver the data to the sink using Wireless communication.
The data is then analyzed to find out the state of the target.
However, due to the design of their hardware, WSNs [3]-[7]
suffer from many resources Constraints, such as low
computation capability, limited memory and limited energy.
Because WSNs are composed by numerous low-cost and
small devices which are usually deploy to an open and
unprotected area, they are vulnerable to various types of
attacks. A prevention mechanism is used to counteract well-
known attacks. However, interference mechanisms cannot
resist overall attacks. Therefore, the attacks area unit needed
to be detected. An Intrusion Detection System (IDS) is used
frequently to detect the packets in a network, and confirm
whether or square measure attackers. Additionally, IDS will
facilitate to develop the hindrance system through acquired
natures of attack. Many wireless sensor networks (WSNs)
are deployed in an unattended environment in which energy
replenishment is difficult. Due to limited resources, a WSN
must not only satisfy the application specific QoS
requirements such as reliability, minimum delay and
security, but also minimize energy consumption to prolong
the system useful lifetime. Recently, prior research efforts
have been made to develop network architectures and sensor
hardware in order to effectively deploy WSNs for a variety
of applications. However, Due to a wide diversity of WSN
application requirements, a general-purpose WSN design
cannot fulfill the needs of all applications. In order to attain
this, it is essential to capture the impacts of network
parameters on network performance with respect to
application specifications. Intrusion detection (i.e., object
tracking) in a WSN can be regarded as a monitoring system
for detecting the intruder that is invading the network
domain. Thus, it is necessary to develop the intrusion
detection system (IDS) which is capable of handling more
extensive malicious attacks with energy conservation
mechanism to increase system lifetime. If any system in the
network gets affected by malicious behaviour, the request is
given to the guardian system. The patch framework is given
to the affected system by the guardian system and with the
help the patch framework, the malicious in the affected
system is cleared[8]-[10].
2. SYSTEM ANALYSIS
2.1.Existing System:
In Existing System, effective redundancy management
of a clustered HWSN to prolong its lifetime operation in the
presence of unreliable and malicious nodes. We tend to
address the exchange between energy consumption vs. QoS
gain in responsibility, timeliness and security with the goal
International Journal of Computer Applications Technology and Research
Volume 4– Issue 4, 258 - 261, 2015, ISSN:- 2319–8656
www.ijcat.com 259
to maximize the lifetime of a clustered HWSN while
satisfying application QoS requirements in the context of
multipath routing. More specifically, we analyze the
optimum quantity of redundancy through which data are
routed to a remote sink in the presence of unreliable and
malicious nodes, so that the question success probability is
maximized where as maximizing the HWSN lifetime.
2.2. Proposed System:
In planned System, the best communications vary and
communication modes were derived to maximize the HWSN
period of time. In intra-cluster planning and inter-cluster
multi-hop routing schemes to maximize the network period
of time. They thought of a hierarchic HWSN with CH nodes
having larger energy and process capabilities than traditional
SNs. Associates is developed as an improvement drawback
to balance energy consumption across all nodes with their
roles. In either work cited higher than, no thought was given
to the existence of malicious nodes. A two-tier HWSN with
the target of maximizing network period of time whereas
fulfilling power management and coverage objectives. They
determined the best density magnitude relation of the 2 tier’s
nodes to maximize the system period of time.
.
3. MODULES DESCRIPTION
3.1. Multipath routing:
One path reaching the sink node or base station will
increase during this module, Multipath routing is taken into
account an efficient mechanism for fault and intrusion
tolerance to boost knowledge delivery in WSNs. the
essential plan is that the likelihood of at least as we've a lot
of methods doing knowledge delivery. Whereas most
previous analysis targeted on exploitation multipath routing
to boost responsibility, some attention has been paid to
exploitation multipath routing to tolerate business executive
attacks. These studies, however, mostly unnoticed the trade-
off between QoS gain vs. energy consumption which may
adversely shorten the system time period.
3.2.Intrusion Tolerance:
In these Modules, intrusion tolerance through multipath
routing, there are two major issues to solve:
(1) How many paths to use and
(2) What paths to use.
Intrusion tolerance may be a fault-tolerant style approach
to defensive data systems against malicious attack.
Abandoning the traditional aim of preventing all intrusions,
intrusion tolerance instead implies triggering mechanisms
that forestall intrusions from resulting in a system security
failure.
3.3.Energy Efficient:
In this module, there are two approaches by that energy
economical IDS may be enforced in WSNs. One approach
particularly applicable to flat WSNs is for AN intermediate
node to feedback spite and energy standing of its neighbor
nodes to the sender node (e.g., the supply or sink node)
WHO will then utilize the data to route packets to avoid
nodes with unacceptable spite or energy standing. Another
International Journal of Computer Applications Technology and Research
Volume 4– Issue 4, 258 - 261, 2015, ISSN:- 2319–8656
www.ijcat.com 260
approach that we tend to adopt during this paper is to use
native host-based IDS for energy conservation.
3.4.Simulation Process:
In this module, the value of execution the dynamic
redundancy management rule delineated higher than, as well
as periodic bunch, periodic intrusion detection, and question
process through multipath routing, in terms of energy
consumption.
4. IMPLEMENTATION IN ACTION
Fig. 1:Client a receive datas
Fig. 2:Server transfers files
Fig. 3: Router a forward datas
Fig.4: router transmission service
5. CONCLUSION
The proposed hierarchical dynamic trust management
protocol for cluster-based wireless sensor networks,
considering two aspects of truthfulness, namely, social truth
and QoS truth. The research work will include the
development of a probability model utilizing various
techniques to analyze the protocol performance, and valid
subjective trust against objective trust obtained based on
ground truth node status. Based on the protocol the algorithm
for truth-based intrusion detection will be developing using
weighted choice. The algorithm will identify the best way to
form trust out of social and QoS trust properties (i.e.,
identifying weights to assign to individual trust properties)
and to assign the minimum trust threshold, in order that the
performance of trust-based intrusion detection is maximized,
i.e., each false positives and false negatives are minimized.
Also, the research will deal with the challenging issue of
providing fault tolerance in wireless device networks. Firstly
a new multipath sample for heterogeneous wireless sensor
networks will be define and analyzes upon various
parameters. Then, propose a new fault tolerant multipath
routing protocol which discovers an important number of
energy node disjoint paths with the slightest overhead of one
message per node. Intensive simulations will be conducted
to evaluate our protocol with different scenarios, sensor
nodes densities and deployment strategies.
6. REFERENCES
[1] O. Younis and S. Fahmy, “HEED: a hybrid, energy-
efficient, distributed clustering approach for ad hoc sensor
networks,” IEEE Trans. Mobile Comput., vol. 3, no. 4, pp.
366–379, 2004.
[2] E. Felemban, L. Chang-Gun, and E. Ekici, “MMSPEED:
multipath multi-SPEED protocol for QoS guarantee of
reliability and timeliness in wireless sensor networks,” IEEE
Trans. Mobile Comput., vol. 5, no. 6, pp. 738–754, 2006.
[3] S. Bo, L. Osborne, X. Yang, and S. Guizani, “Intrusion
detection techniques in mobile ad hoc and wireless sensor
networks,” IEEE Wireless Commun. Mag., vol. 14, no. 5, pp.
560–563, 2007.
International Journal of Computer Applications Technology and Research
Volume 4– Issue 4, 258 - 261, 2015, ISSN:- 2319–8656
www.ijcat.com 261
[4] I. Krontiris, T. Dimitriou, and F. C. Freiling, “Towards
intrusion detection in wireless sensor networks,” in Proc.
2007 European Wireless Conf.
[5] J. H. Cho, I. R. Chen, and P. G. Feng, “Effect of intrusion
detection on reliability of mission-oriented mobile group
systems in mobile ad hoc networks,” IEEE Trans. Reliab.,
vol. 59, no. 1, pp. 231–241, 2010.
[6] A. P. R. da Silva, M. H. T. Martins, B. P. S. Rocha, A.
A. F. Loureiro, L. B. Ruiz, and H. C. Wong, “Decentralized
intrusion detection in wireless sensor networks,” in Proc.
2005 ACM Workshop Quality Service Security Wireless
Mobile Netw.
[7] Y. Zhou, Y. Fang, and Y. Zhang, “Securing wireless
sensor networks: a survey,” IEEE Commun. Surveys &
Tutorials, vol. 10, no. 3, pp. 6–28, 2008.
[8] G. Micheal and A.R. Arunachalam “EAACK: Enhanced
Adaptive Acknowledgment for MANET” Middle-East
Journal of Scientific Research 19 (9), 2014.
[9] S.Parameswari , G.Michael” Intrusion Detection System
in MANET : A Survey “ IJETR, Vol-2, April 2014.
[10] G. Micheal “Detection of Malicious Behaviour in P2P
Networks” IJETR, December 2014.

More Related Content

What's hot

A QoI Based Energy Efficient Clustering for Dense Wireless Sensor Network
A QoI Based Energy Efficient Clustering for Dense Wireless Sensor NetworkA QoI Based Energy Efficient Clustering for Dense Wireless Sensor Network
A QoI Based Energy Efficient Clustering for Dense Wireless Sensor Network
ijassn
 
An Authenticated Trust and Reputation Calculation and Management System for C...
An Authenticated Trust and Reputation Calculation and Management System for C...An Authenticated Trust and Reputation Calculation and Management System for C...
An Authenticated Trust and Reputation Calculation and Management System for C...
1crore projects
 
An Analytical Model of Latency and Data Aggregation Tradeoff in Cluster Based...
An Analytical Model of Latency and Data Aggregation Tradeoff in Cluster Based...An Analytical Model of Latency and Data Aggregation Tradeoff in Cluster Based...
An Analytical Model of Latency and Data Aggregation Tradeoff in Cluster Based...
ijsrd.com
 
J031101064069
J031101064069J031101064069
J031101064069
theijes
 
Energy efficient ccrvc scheme for secure communications in mobile ad hoc netw...
Energy efficient ccrvc scheme for secure communications in mobile ad hoc netw...Energy efficient ccrvc scheme for secure communications in mobile ad hoc netw...
Energy efficient ccrvc scheme for secure communications in mobile ad hoc netw...
eSAT Publishing House
 
Reliability in wsn for security
Reliability in wsn for securityReliability in wsn for security
Reliability in wsn for security
Swamy Vivekananda
 

What's hot (18)

50120140505014
5012014050501450120140505014
50120140505014
 
Secure data aggregation technique for wireless sensor networks in the presenc...
Secure data aggregation technique for wireless sensor networks in the presenc...Secure data aggregation technique for wireless sensor networks in the presenc...
Secure data aggregation technique for wireless sensor networks in the presenc...
 
A QoI Based Energy Efficient Clustering for Dense Wireless Sensor Network
A QoI Based Energy Efficient Clustering for Dense Wireless Sensor NetworkA QoI Based Energy Efficient Clustering for Dense Wireless Sensor Network
A QoI Based Energy Efficient Clustering for Dense Wireless Sensor Network
 
Qos group based optimal retransmission medium access protocol for wireless se...
Qos group based optimal retransmission medium access protocol for wireless se...Qos group based optimal retransmission medium access protocol for wireless se...
Qos group based optimal retransmission medium access protocol for wireless se...
 
An Authenticated Trust and Reputation Calculation and Management System for C...
An Authenticated Trust and Reputation Calculation and Management System for C...An Authenticated Trust and Reputation Calculation and Management System for C...
An Authenticated Trust and Reputation Calculation and Management System for C...
 
An Analytical Model of Latency and Data Aggregation Tradeoff in Cluster Based...
An Analytical Model of Latency and Data Aggregation Tradeoff in Cluster Based...An Analytical Model of Latency and Data Aggregation Tradeoff in Cluster Based...
An Analytical Model of Latency and Data Aggregation Tradeoff in Cluster Based...
 
Secure data aggregation technique for wireless
Secure data aggregation technique for wirelessSecure data aggregation technique for wireless
Secure data aggregation technique for wireless
 
J031101064069
J031101064069J031101064069
J031101064069
 
Intrusion detection in heterogeneous network by multipath routing based toler...
Intrusion detection in heterogeneous network by multipath routing based toler...Intrusion detection in heterogeneous network by multipath routing based toler...
Intrusion detection in heterogeneous network by multipath routing based toler...
 
Intrusion detection in heterogeneous network by multipath routing based toler...
Intrusion detection in heterogeneous network by multipath routing based toler...Intrusion detection in heterogeneous network by multipath routing based toler...
Intrusion detection in heterogeneous network by multipath routing based toler...
 
Fa36942946
Fa36942946Fa36942946
Fa36942946
 
[IJET-V1I4P2] Authors : Doddappa Kandakur; Ashwini B P
[IJET-V1I4P2] Authors : Doddappa Kandakur; Ashwini B P[IJET-V1I4P2] Authors : Doddappa Kandakur; Ashwini B P
[IJET-V1I4P2] Authors : Doddappa Kandakur; Ashwini B P
 
An energy efficient protocol based study of wsn to increase the lifetime
An energy efficient protocol based study of wsn to increase the lifetimeAn energy efficient protocol based study of wsn to increase the lifetime
An energy efficient protocol based study of wsn to increase the lifetime
 
Energy efficient ccrvc scheme for secure communications in mobile ad hoc netw...
Energy efficient ccrvc scheme for secure communications in mobile ad hoc netw...Energy efficient ccrvc scheme for secure communications in mobile ad hoc netw...
Energy efficient ccrvc scheme for secure communications in mobile ad hoc netw...
 
Reliability in wsn for security
Reliability in wsn for securityReliability in wsn for security
Reliability in wsn for security
 
Data aggregation in wireless sensor network
Data aggregation in wireless sensor networkData aggregation in wireless sensor network
Data aggregation in wireless sensor network
 
Secure and Efficient Hierarchical Data Aggregation in Wireless Sensor Networks
Secure and Efficient Hierarchical Data Aggregation in Wireless Sensor NetworksSecure and Efficient Hierarchical Data Aggregation in Wireless Sensor Networks
Secure and Efficient Hierarchical Data Aggregation in Wireless Sensor Networks
 
D0606032413 Paper
D0606032413 PaperD0606032413 Paper
D0606032413 Paper
 

Similar to ENERGY EFFICIENCY IN FILE TRANSFER ACROSS WIRELESS COMMUNICATION

Energy efficient ccrvc scheme for secure communications in mobile ad hoc netw...
Energy efficient ccrvc scheme for secure communications in mobile ad hoc netw...Energy efficient ccrvc scheme for secure communications in mobile ad hoc netw...
Energy efficient ccrvc scheme for secure communications in mobile ad hoc netw...
eSAT Journals
 
Survey of Wireless Sensor Network Application
Survey of Wireless Sensor Network ApplicationSurvey of Wireless Sensor Network Application
Survey of Wireless Sensor Network Application
ijsrd.com
 
Power Aware Cluster to Minimize Load In Mobile Ad Hoc Networks
Power Aware Cluster to Minimize Load In Mobile Ad Hoc NetworksPower Aware Cluster to Minimize Load In Mobile Ad Hoc Networks
Power Aware Cluster to Minimize Load In Mobile Ad Hoc Networks
IJRES Journal
 
Secure and Trustable Routing in WSN for End to End Communication
Secure and Trustable Routing in WSN for End to End CommunicationSecure and Trustable Routing in WSN for End to End Communication
Secure and Trustable Routing in WSN for End to End Communication
IJMTST Journal
 
E FFICIENT E NERGY U TILIZATION P ATH A LGORITHM I N W IRELESS S ENSOR...
E FFICIENT  E NERGY  U TILIZATION  P ATH  A LGORITHM  I N  W IRELESS  S ENSOR...E FFICIENT  E NERGY  U TILIZATION  P ATH  A LGORITHM  I N  W IRELESS  S ENSOR...
E FFICIENT E NERGY U TILIZATION P ATH A LGORITHM I N W IRELESS S ENSOR...
IJCI JOURNAL
 

Similar to ENERGY EFFICIENCY IN FILE TRANSFER ACROSS WIRELESS COMMUNICATION (20)

IRJET- Energy Efficiency and Security based Multihop Heterogeneous Trusted Th...
IRJET- Energy Efficiency and Security based Multihop Heterogeneous Trusted Th...IRJET- Energy Efficiency and Security based Multihop Heterogeneous Trusted Th...
IRJET- Energy Efficiency and Security based Multihop Heterogeneous Trusted Th...
 
Energy efficient ccrvc scheme for secure communications in mobile ad hoc netw...
Energy efficient ccrvc scheme for secure communications in mobile ad hoc netw...Energy efficient ccrvc scheme for secure communications in mobile ad hoc netw...
Energy efficient ccrvc scheme for secure communications in mobile ad hoc netw...
 
Energy Proficient and Security Protocol for WSN: A Review
Energy Proficient and Security Protocol for WSN: A ReviewEnergy Proficient and Security Protocol for WSN: A Review
Energy Proficient and Security Protocol for WSN: A Review
 
Scalable and Robust Hierarchical Group of Data in Wireless Sensor Networks
Scalable and Robust Hierarchical Group of Data in Wireless Sensor NetworksScalable and Robust Hierarchical Group of Data in Wireless Sensor Networks
Scalable and Robust Hierarchical Group of Data in Wireless Sensor Networks
 
A secure trust-based protocol for hierarchical routing in wireless sensor ne...
A secure trust-based protocol for hierarchical routing in  wireless sensor ne...A secure trust-based protocol for hierarchical routing in  wireless sensor ne...
A secure trust-based protocol for hierarchical routing in wireless sensor ne...
 
IEEE 2015 NS2 Projects
IEEE 2015 NS2 ProjectsIEEE 2015 NS2 Projects
IEEE 2015 NS2 Projects
 
IEEE 2015 NS2 Projects
IEEE 2015 NS2 ProjectsIEEE 2015 NS2 Projects
IEEE 2015 NS2 Projects
 
Survey of Wireless Sensor Network Application
Survey of Wireless Sensor Network ApplicationSurvey of Wireless Sensor Network Application
Survey of Wireless Sensor Network Application
 
A cross layer protocol based on mac and routing protocols for healthcare appl...
A cross layer protocol based on mac and routing protocols for healthcare appl...A cross layer protocol based on mac and routing protocols for healthcare appl...
A cross layer protocol based on mac and routing protocols for healthcare appl...
 
IRJET-Multipath based Routing and Energy Efficient Multicasting for Wireless ...
IRJET-Multipath based Routing and Energy Efficient Multicasting for Wireless ...IRJET-Multipath based Routing and Energy Efficient Multicasting for Wireless ...
IRJET-Multipath based Routing and Energy Efficient Multicasting for Wireless ...
 
A Brief Research Study Of Wireless Sensor Network
A Brief Research Study Of Wireless Sensor NetworkA Brief Research Study Of Wireless Sensor Network
A Brief Research Study Of Wireless Sensor Network
 
Power Aware Cluster to Minimize Load In Mobile Ad Hoc Networks
Power Aware Cluster to Minimize Load In Mobile Ad Hoc NetworksPower Aware Cluster to Minimize Load In Mobile Ad Hoc Networks
Power Aware Cluster to Minimize Load In Mobile Ad Hoc Networks
 
Irrational node detection in multihop cellular
Irrational node detection in multihop cellularIrrational node detection in multihop cellular
Irrational node detection in multihop cellular
 
Irrational node detection in multihop cellular networks using accounting center
Irrational node detection in multihop cellular networks using accounting centerIrrational node detection in multihop cellular networks using accounting center
Irrational node detection in multihop cellular networks using accounting center
 
Secure and Trustable Routing in WSN for End to End Communication
Secure and Trustable Routing in WSN for End to End CommunicationSecure and Trustable Routing in WSN for End to End Communication
Secure and Trustable Routing in WSN for End to End Communication
 
IRJET-A Brief Study of Leach based Routing Protocol in Wireless Sensor Networks
IRJET-A Brief Study of Leach based Routing Protocol in Wireless Sensor NetworksIRJET-A Brief Study of Leach based Routing Protocol in Wireless Sensor Networks
IRJET-A Brief Study of Leach based Routing Protocol in Wireless Sensor Networks
 
Energy Efficient Key Management Analysis using AVL Trees in Wireless Sensor N...
Energy Efficient Key Management Analysis using AVL Trees in Wireless Sensor N...Energy Efficient Key Management Analysis using AVL Trees in Wireless Sensor N...
Energy Efficient Key Management Analysis using AVL Trees in Wireless Sensor N...
 
E FFICIENT E NERGY U TILIZATION P ATH A LGORITHM I N W IRELESS S ENSOR...
E FFICIENT  E NERGY  U TILIZATION  P ATH  A LGORITHM  I N  W IRELESS  S ENSOR...E FFICIENT  E NERGY  U TILIZATION  P ATH  A LGORITHM  I N  W IRELESS  S ENSOR...
E FFICIENT E NERGY U TILIZATION P ATH A LGORITHM I N W IRELESS S ENSOR...
 
A CROSS LAYER PROTOCOL BASED ON MAC AND ROUTING PROTOCOLS FOR HEALTHCARE APPL...
A CROSS LAYER PROTOCOL BASED ON MAC AND ROUTING PROTOCOLS FOR HEALTHCARE APPL...A CROSS LAYER PROTOCOL BASED ON MAC AND ROUTING PROTOCOLS FOR HEALTHCARE APPL...
A CROSS LAYER PROTOCOL BASED ON MAC AND ROUTING PROTOCOLS FOR HEALTHCARE APPL...
 
EVENT DRIVEN ROUTING PROTOCOLS FOR WIRELESS SENSOR NETWORK- A SURVEY
EVENT DRIVEN ROUTING PROTOCOLS FOR  WIRELESS SENSOR NETWORK- A SURVEYEVENT DRIVEN ROUTING PROTOCOLS FOR  WIRELESS SENSOR NETWORK- A SURVEY
EVENT DRIVEN ROUTING PROTOCOLS FOR WIRELESS SENSOR NETWORK- A SURVEY
 

More from Editor IJCATR

Integrated System for Vehicle Clearance and Registration
Integrated System for Vehicle Clearance and RegistrationIntegrated System for Vehicle Clearance and Registration
Integrated System for Vehicle Clearance and Registration
Editor IJCATR
 
Energy-Aware Routing in Wireless Sensor Network Using Modified Bi-Directional A*
Energy-Aware Routing in Wireless Sensor Network Using Modified Bi-Directional A*Energy-Aware Routing in Wireless Sensor Network Using Modified Bi-Directional A*
Energy-Aware Routing in Wireless Sensor Network Using Modified Bi-Directional A*
Editor IJCATR
 
Hangul Recognition Using Support Vector Machine
Hangul Recognition Using Support Vector MachineHangul Recognition Using Support Vector Machine
Hangul Recognition Using Support Vector Machine
Editor IJCATR
 

More from Editor IJCATR (20)

Text Mining in Digital Libraries using OKAPI BM25 Model
 Text Mining in Digital Libraries using OKAPI BM25 Model Text Mining in Digital Libraries using OKAPI BM25 Model
Text Mining in Digital Libraries using OKAPI BM25 Model
 
Green Computing, eco trends, climate change, e-waste and eco-friendly
Green Computing, eco trends, climate change, e-waste and eco-friendlyGreen Computing, eco trends, climate change, e-waste and eco-friendly
Green Computing, eco trends, climate change, e-waste and eco-friendly
 
Policies for Green Computing and E-Waste in Nigeria
 Policies for Green Computing and E-Waste in Nigeria Policies for Green Computing and E-Waste in Nigeria
Policies for Green Computing and E-Waste in Nigeria
 
Performance Evaluation of VANETs for Evaluating Node Stability in Dynamic Sce...
Performance Evaluation of VANETs for Evaluating Node Stability in Dynamic Sce...Performance Evaluation of VANETs for Evaluating Node Stability in Dynamic Sce...
Performance Evaluation of VANETs for Evaluating Node Stability in Dynamic Sce...
 
Optimum Location of DG Units Considering Operation Conditions
Optimum Location of DG Units Considering Operation ConditionsOptimum Location of DG Units Considering Operation Conditions
Optimum Location of DG Units Considering Operation Conditions
 
Analysis of Comparison of Fuzzy Knn, C4.5 Algorithm, and Naïve Bayes Classifi...
Analysis of Comparison of Fuzzy Knn, C4.5 Algorithm, and Naïve Bayes Classifi...Analysis of Comparison of Fuzzy Knn, C4.5 Algorithm, and Naïve Bayes Classifi...
Analysis of Comparison of Fuzzy Knn, C4.5 Algorithm, and Naïve Bayes Classifi...
 
Web Scraping for Estimating new Record from Source Site
Web Scraping for Estimating new Record from Source SiteWeb Scraping for Estimating new Record from Source Site
Web Scraping for Estimating new Record from Source Site
 
Evaluating Semantic Similarity between Biomedical Concepts/Classes through S...
 Evaluating Semantic Similarity between Biomedical Concepts/Classes through S... Evaluating Semantic Similarity between Biomedical Concepts/Classes through S...
Evaluating Semantic Similarity between Biomedical Concepts/Classes through S...
 
Semantic Similarity Measures between Terms in the Biomedical Domain within f...
 Semantic Similarity Measures between Terms in the Biomedical Domain within f... Semantic Similarity Measures between Terms in the Biomedical Domain within f...
Semantic Similarity Measures between Terms in the Biomedical Domain within f...
 
A Strategy for Improving the Performance of Small Files in Openstack Swift
 A Strategy for Improving the Performance of Small Files in Openstack Swift  A Strategy for Improving the Performance of Small Files in Openstack Swift
A Strategy for Improving the Performance of Small Files in Openstack Swift
 
Integrated System for Vehicle Clearance and Registration
Integrated System for Vehicle Clearance and RegistrationIntegrated System for Vehicle Clearance and Registration
Integrated System for Vehicle Clearance and Registration
 
Assessment of the Efficiency of Customer Order Management System: A Case Stu...
 Assessment of the Efficiency of Customer Order Management System: A Case Stu... Assessment of the Efficiency of Customer Order Management System: A Case Stu...
Assessment of the Efficiency of Customer Order Management System: A Case Stu...
 
Energy-Aware Routing in Wireless Sensor Network Using Modified Bi-Directional A*
Energy-Aware Routing in Wireless Sensor Network Using Modified Bi-Directional A*Energy-Aware Routing in Wireless Sensor Network Using Modified Bi-Directional A*
Energy-Aware Routing in Wireless Sensor Network Using Modified Bi-Directional A*
 
Security in Software Defined Networks (SDN): Challenges and Research Opportun...
Security in Software Defined Networks (SDN): Challenges and Research Opportun...Security in Software Defined Networks (SDN): Challenges and Research Opportun...
Security in Software Defined Networks (SDN): Challenges and Research Opportun...
 
Measure the Similarity of Complaint Document Using Cosine Similarity Based on...
Measure the Similarity of Complaint Document Using Cosine Similarity Based on...Measure the Similarity of Complaint Document Using Cosine Similarity Based on...
Measure the Similarity of Complaint Document Using Cosine Similarity Based on...
 
Hangul Recognition Using Support Vector Machine
Hangul Recognition Using Support Vector MachineHangul Recognition Using Support Vector Machine
Hangul Recognition Using Support Vector Machine
 
Application of 3D Printing in Education
Application of 3D Printing in EducationApplication of 3D Printing in Education
Application of 3D Printing in Education
 
Survey on Energy-Efficient Routing Algorithms for Underwater Wireless Sensor ...
Survey on Energy-Efficient Routing Algorithms for Underwater Wireless Sensor ...Survey on Energy-Efficient Routing Algorithms for Underwater Wireless Sensor ...
Survey on Energy-Efficient Routing Algorithms for Underwater Wireless Sensor ...
 
Comparative analysis on Void Node Removal Routing algorithms for Underwater W...
Comparative analysis on Void Node Removal Routing algorithms for Underwater W...Comparative analysis on Void Node Removal Routing algorithms for Underwater W...
Comparative analysis on Void Node Removal Routing algorithms for Underwater W...
 
Decay Property for Solutions to Plate Type Equations with Variable Coefficients
Decay Property for Solutions to Plate Type Equations with Variable CoefficientsDecay Property for Solutions to Plate Type Equations with Variable Coefficients
Decay Property for Solutions to Plate Type Equations with Variable Coefficients
 

Recently uploaded

VIP Call Girls Palanpur 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Palanpur 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Palanpur 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Palanpur 7001035870 Whatsapp Number, 24/07 Booking
dharasingh5698
 
Call Girls in Ramesh Nagar Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
Call Girls in Ramesh Nagar Delhi 💯 Call Us 🔝9953056974 🔝 Escort ServiceCall Girls in Ramesh Nagar Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
Call Girls in Ramesh Nagar Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
Top Rated Call Girls In chittoor 📱 {7001035870} VIP Escorts chittoor
Top Rated Call Girls In chittoor 📱 {7001035870} VIP Escorts chittoorTop Rated Call Girls In chittoor 📱 {7001035870} VIP Escorts chittoor
Top Rated Call Girls In chittoor 📱 {7001035870} VIP Escorts chittoor
dharasingh5698
 
Call Now ≽ 9953056974 ≼🔝 Call Girls In New Ashok Nagar ≼🔝 Delhi door step de...
Call Now ≽ 9953056974 ≼🔝 Call Girls In New Ashok Nagar  ≼🔝 Delhi door step de...Call Now ≽ 9953056974 ≼🔝 Call Girls In New Ashok Nagar  ≼🔝 Delhi door step de...
Call Now ≽ 9953056974 ≼🔝 Call Girls In New Ashok Nagar ≼🔝 Delhi door step de...
9953056974 Low Rate Call Girls In Saket, Delhi NCR
 

Recently uploaded (20)

Work-Permit-Receiver-in-Saudi-Aramco.pptx
Work-Permit-Receiver-in-Saudi-Aramco.pptxWork-Permit-Receiver-in-Saudi-Aramco.pptx
Work-Permit-Receiver-in-Saudi-Aramco.pptx
 
VIP Call Girls Palanpur 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Palanpur 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Palanpur 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Palanpur 7001035870 Whatsapp Number, 24/07 Booking
 
2016EF22_0 solar project report rooftop projects
2016EF22_0 solar project report rooftop projects2016EF22_0 solar project report rooftop projects
2016EF22_0 solar project report rooftop projects
 
Generative AI or GenAI technology based PPT
Generative AI or GenAI technology based PPTGenerative AI or GenAI technology based PPT
Generative AI or GenAI technology based PPT
 
Thermal Engineering -unit - III & IV.ppt
Thermal Engineering -unit - III & IV.pptThermal Engineering -unit - III & IV.ppt
Thermal Engineering -unit - III & IV.ppt
 
COST-EFFETIVE and Energy Efficient BUILDINGS ptx
COST-EFFETIVE  and Energy Efficient BUILDINGS ptxCOST-EFFETIVE  and Energy Efficient BUILDINGS ptx
COST-EFFETIVE and Energy Efficient BUILDINGS ptx
 
chapter 5.pptx: drainage and irrigation engineering
chapter 5.pptx: drainage and irrigation engineeringchapter 5.pptx: drainage and irrigation engineering
chapter 5.pptx: drainage and irrigation engineering
 
Unleashing the Power of the SORA AI lastest leap
Unleashing the Power of the SORA AI lastest leapUnleashing the Power of the SORA AI lastest leap
Unleashing the Power of the SORA AI lastest leap
 
Call Girls in Ramesh Nagar Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
Call Girls in Ramesh Nagar Delhi 💯 Call Us 🔝9953056974 🔝 Escort ServiceCall Girls in Ramesh Nagar Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
Call Girls in Ramesh Nagar Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
 
Block diagram reduction techniques in control systems.ppt
Block diagram reduction techniques in control systems.pptBlock diagram reduction techniques in control systems.ppt
Block diagram reduction techniques in control systems.ppt
 
Top Rated Call Girls In chittoor 📱 {7001035870} VIP Escorts chittoor
Top Rated Call Girls In chittoor 📱 {7001035870} VIP Escorts chittoorTop Rated Call Girls In chittoor 📱 {7001035870} VIP Escorts chittoor
Top Rated Call Girls In chittoor 📱 {7001035870} VIP Escorts chittoor
 
Hostel management system project report..pdf
Hostel management system project report..pdfHostel management system project report..pdf
Hostel management system project report..pdf
 
data_management_and _data_science_cheat_sheet.pdf
data_management_and _data_science_cheat_sheet.pdfdata_management_and _data_science_cheat_sheet.pdf
data_management_and _data_science_cheat_sheet.pdf
 
Double Revolving field theory-how the rotor develops torque
Double Revolving field theory-how the rotor develops torqueDouble Revolving field theory-how the rotor develops torque
Double Revolving field theory-how the rotor develops torque
 
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
 
(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7
(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7
(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7
 
FEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced Loads
FEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced LoadsFEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced Loads
FEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced Loads
 
Unit 2- Effective stress & Permeability.pdf
Unit 2- Effective stress & Permeability.pdfUnit 2- Effective stress & Permeability.pdf
Unit 2- Effective stress & Permeability.pdf
 
(INDIRA) Call Girl Bhosari Call Now 8617697112 Bhosari Escorts 24x7
(INDIRA) Call Girl Bhosari Call Now 8617697112 Bhosari Escorts 24x7(INDIRA) Call Girl Bhosari Call Now 8617697112 Bhosari Escorts 24x7
(INDIRA) Call Girl Bhosari Call Now 8617697112 Bhosari Escorts 24x7
 
Call Now ≽ 9953056974 ≼🔝 Call Girls In New Ashok Nagar ≼🔝 Delhi door step de...
Call Now ≽ 9953056974 ≼🔝 Call Girls In New Ashok Nagar  ≼🔝 Delhi door step de...Call Now ≽ 9953056974 ≼🔝 Call Girls In New Ashok Nagar  ≼🔝 Delhi door step de...
Call Now ≽ 9953056974 ≼🔝 Call Girls In New Ashok Nagar ≼🔝 Delhi door step de...
 

ENERGY EFFICIENCY IN FILE TRANSFER ACROSS WIRELESS COMMUNICATION

  • 1. International Journal of Computer Applications Technology and Research Volume 4– Issue 4, 258 - 261, 2015, ISSN:- 2319–8656 www.ijcat.com 258 ENERGY EFFICIENCY IN FILE TRANSFER ACROSS WIRELESS COMMUNICATION Snigdhamayee Biswal Bharath University Chennai, India A.Agal Veena Bharath University Chennai, India Shilpi Kumar Bharath University Chennai, India G.Michael Bharath University Chennai, India ____________________________________________________________________________________________________ Abstract: The key idea of our Energy Efficiency management is to use the exchange between energy consumption vs the gain in responsibility, timeliness, and security to maximize the system helpful time period. we tend to formulate the exchange as Associate in Nursing optimization downside for dynamically crucial the most effective redundancy level to use to multipath routing for intrusion tolerance so the question response success likelihood is maximized whereas prolonging the helpful time period. Moreover, we think about this optimization downside for the case during which a voting-based distributed intrusion detection formula is applied to sight and evict malicious nodes during a HWSN. we over see to develop a novel likelihood model to investigate the most effective redundancy level in terms of path redundancy and supply redundancy, further because the best intrusion detection settings in terms of the amount of voters and the intrusion invocation interval below that the time period of a HWSN is maximized. we over see to then apply the analysis results obtained to the planning of a dynamic redundancy management formula to identify and apply the most effective style parameter settings at runtime in response to environmental changes, to maximize the HWSN lifetime. Keywords: Intrusion detection system (IDS), multipath routing, fault tolerance, trust management, heterogeneous WSN (HWSN). ________________________________________________________________________________________________________ 1.INTRODUCTION: Advances in wireless communication and miniature electronics have enabled the Development of small, low- cost, low-power sensor nodes (SNs) with sensing and Communication capabilities [1],[2]. Therefore, the issues of Wireless Sensor Networks (WSNs) have become popular research subjects. WSN is infrastructure based network, and through the mass deployment of SNs, a WSN is formed. The major function of WSN is to collect and monitor the related information which about the specific environment. The SNs detect the surrounding environment or the given target and deliver the data to the sink using Wireless communication. The data is then analyzed to find out the state of the target. However, due to the design of their hardware, WSNs [3]-[7] suffer from many resources Constraints, such as low computation capability, limited memory and limited energy. Because WSNs are composed by numerous low-cost and small devices which are usually deploy to an open and unprotected area, they are vulnerable to various types of attacks. A prevention mechanism is used to counteract well- known attacks. However, interference mechanisms cannot resist overall attacks. Therefore, the attacks area unit needed to be detected. An Intrusion Detection System (IDS) is used frequently to detect the packets in a network, and confirm whether or square measure attackers. Additionally, IDS will facilitate to develop the hindrance system through acquired natures of attack. Many wireless sensor networks (WSNs) are deployed in an unattended environment in which energy replenishment is difficult. Due to limited resources, a WSN must not only satisfy the application specific QoS requirements such as reliability, minimum delay and security, but also minimize energy consumption to prolong the system useful lifetime. Recently, prior research efforts have been made to develop network architectures and sensor hardware in order to effectively deploy WSNs for a variety of applications. However, Due to a wide diversity of WSN application requirements, a general-purpose WSN design cannot fulfill the needs of all applications. In order to attain this, it is essential to capture the impacts of network parameters on network performance with respect to application specifications. Intrusion detection (i.e., object tracking) in a WSN can be regarded as a monitoring system for detecting the intruder that is invading the network domain. Thus, it is necessary to develop the intrusion detection system (IDS) which is capable of handling more extensive malicious attacks with energy conservation mechanism to increase system lifetime. If any system in the network gets affected by malicious behaviour, the request is given to the guardian system. The patch framework is given to the affected system by the guardian system and with the help the patch framework, the malicious in the affected system is cleared[8]-[10]. 2. SYSTEM ANALYSIS 2.1.Existing System: In Existing System, effective redundancy management of a clustered HWSN to prolong its lifetime operation in the presence of unreliable and malicious nodes. We tend to address the exchange between energy consumption vs. QoS gain in responsibility, timeliness and security with the goal
  • 2. International Journal of Computer Applications Technology and Research Volume 4– Issue 4, 258 - 261, 2015, ISSN:- 2319–8656 www.ijcat.com 259 to maximize the lifetime of a clustered HWSN while satisfying application QoS requirements in the context of multipath routing. More specifically, we analyze the optimum quantity of redundancy through which data are routed to a remote sink in the presence of unreliable and malicious nodes, so that the question success probability is maximized where as maximizing the HWSN lifetime. 2.2. Proposed System: In planned System, the best communications vary and communication modes were derived to maximize the HWSN period of time. In intra-cluster planning and inter-cluster multi-hop routing schemes to maximize the network period of time. They thought of a hierarchic HWSN with CH nodes having larger energy and process capabilities than traditional SNs. Associates is developed as an improvement drawback to balance energy consumption across all nodes with their roles. In either work cited higher than, no thought was given to the existence of malicious nodes. A two-tier HWSN with the target of maximizing network period of time whereas fulfilling power management and coverage objectives. They determined the best density magnitude relation of the 2 tier’s nodes to maximize the system period of time. . 3. MODULES DESCRIPTION 3.1. Multipath routing: One path reaching the sink node or base station will increase during this module, Multipath routing is taken into account an efficient mechanism for fault and intrusion tolerance to boost knowledge delivery in WSNs. the essential plan is that the likelihood of at least as we've a lot of methods doing knowledge delivery. Whereas most previous analysis targeted on exploitation multipath routing to boost responsibility, some attention has been paid to exploitation multipath routing to tolerate business executive attacks. These studies, however, mostly unnoticed the trade- off between QoS gain vs. energy consumption which may adversely shorten the system time period. 3.2.Intrusion Tolerance: In these Modules, intrusion tolerance through multipath routing, there are two major issues to solve: (1) How many paths to use and (2) What paths to use. Intrusion tolerance may be a fault-tolerant style approach to defensive data systems against malicious attack. Abandoning the traditional aim of preventing all intrusions, intrusion tolerance instead implies triggering mechanisms that forestall intrusions from resulting in a system security failure. 3.3.Energy Efficient: In this module, there are two approaches by that energy economical IDS may be enforced in WSNs. One approach particularly applicable to flat WSNs is for AN intermediate node to feedback spite and energy standing of its neighbor nodes to the sender node (e.g., the supply or sink node) WHO will then utilize the data to route packets to avoid nodes with unacceptable spite or energy standing. Another
  • 3. International Journal of Computer Applications Technology and Research Volume 4– Issue 4, 258 - 261, 2015, ISSN:- 2319–8656 www.ijcat.com 260 approach that we tend to adopt during this paper is to use native host-based IDS for energy conservation. 3.4.Simulation Process: In this module, the value of execution the dynamic redundancy management rule delineated higher than, as well as periodic bunch, periodic intrusion detection, and question process through multipath routing, in terms of energy consumption. 4. IMPLEMENTATION IN ACTION Fig. 1:Client a receive datas Fig. 2:Server transfers files Fig. 3: Router a forward datas Fig.4: router transmission service 5. CONCLUSION The proposed hierarchical dynamic trust management protocol for cluster-based wireless sensor networks, considering two aspects of truthfulness, namely, social truth and QoS truth. The research work will include the development of a probability model utilizing various techniques to analyze the protocol performance, and valid subjective trust against objective trust obtained based on ground truth node status. Based on the protocol the algorithm for truth-based intrusion detection will be developing using weighted choice. The algorithm will identify the best way to form trust out of social and QoS trust properties (i.e., identifying weights to assign to individual trust properties) and to assign the minimum trust threshold, in order that the performance of trust-based intrusion detection is maximized, i.e., each false positives and false negatives are minimized. Also, the research will deal with the challenging issue of providing fault tolerance in wireless device networks. Firstly a new multipath sample for heterogeneous wireless sensor networks will be define and analyzes upon various parameters. Then, propose a new fault tolerant multipath routing protocol which discovers an important number of energy node disjoint paths with the slightest overhead of one message per node. Intensive simulations will be conducted to evaluate our protocol with different scenarios, sensor nodes densities and deployment strategies. 6. REFERENCES [1] O. Younis and S. Fahmy, “HEED: a hybrid, energy- efficient, distributed clustering approach for ad hoc sensor networks,” IEEE Trans. Mobile Comput., vol. 3, no. 4, pp. 366–379, 2004. [2] E. Felemban, L. Chang-Gun, and E. Ekici, “MMSPEED: multipath multi-SPEED protocol for QoS guarantee of reliability and timeliness in wireless sensor networks,” IEEE Trans. Mobile Comput., vol. 5, no. 6, pp. 738–754, 2006. [3] S. Bo, L. Osborne, X. Yang, and S. Guizani, “Intrusion detection techniques in mobile ad hoc and wireless sensor networks,” IEEE Wireless Commun. Mag., vol. 14, no. 5, pp. 560–563, 2007.
  • 4. International Journal of Computer Applications Technology and Research Volume 4– Issue 4, 258 - 261, 2015, ISSN:- 2319–8656 www.ijcat.com 261 [4] I. Krontiris, T. Dimitriou, and F. C. Freiling, “Towards intrusion detection in wireless sensor networks,” in Proc. 2007 European Wireless Conf. [5] J. H. Cho, I. R. Chen, and P. G. Feng, “Effect of intrusion detection on reliability of mission-oriented mobile group systems in mobile ad hoc networks,” IEEE Trans. Reliab., vol. 59, no. 1, pp. 231–241, 2010. [6] A. P. R. da Silva, M. H. T. Martins, B. P. S. Rocha, A. A. F. Loureiro, L. B. Ruiz, and H. C. Wong, “Decentralized intrusion detection in wireless sensor networks,” in Proc. 2005 ACM Workshop Quality Service Security Wireless Mobile Netw. [7] Y. Zhou, Y. Fang, and Y. Zhang, “Securing wireless sensor networks: a survey,” IEEE Commun. Surveys & Tutorials, vol. 10, no. 3, pp. 6–28, 2008. [8] G. Micheal and A.R. Arunachalam “EAACK: Enhanced Adaptive Acknowledgment for MANET” Middle-East Journal of Scientific Research 19 (9), 2014. [9] S.Parameswari , G.Michael” Intrusion Detection System in MANET : A Survey “ IJETR, Vol-2, April 2014. [10] G. Micheal “Detection of Malicious Behaviour in P2P Networks” IJETR, December 2014.