A selective forwarding attack in mobile wireless sensor networks is an attack that selectively drops or delivers event packets as the compromised node moves. In such an attack, it is difficult to detect the compromised node compared with the selective forwarding attack occurring in the wireless sensor network
because all sensor nodes move. In order to detect selective forwarding attacks in mobile wireless sensor networks, a fog computing-based system for a selective forwarding detection scheme has been proposed. However, since the proposed detection scheme uses a single path, the energy consumption of the sensor node for route discovery when the sensor node moves is large. To solve this problem, this paper uses fuzzy
logic to determine the number of multi-paths needed to improve the energy efficiency of sensor networks. Experimental results show that the energy efficiency of the sensor network is improved by 9.5737% compared with that of the existing scheme after 200 seconds when using the proposed scheme
ER Publication,
IJETR, IJMCTR,
Journals,
International Journals,
High Impact Journals,
Monthly Journal,
Good quality Journals,
Research,
Research Papers,
Research Article,
Free Journals, Open access Journals,
erpublication.org,
Engineering Journal,
Science Journals,
International Journal of Engineering Research and DevelopmentIJERD Editor
Electrical, Electronics and Computer Engineering,
Information Engineering and Technology,
Mechanical, Industrial and Manufacturing Engineering,
Automation and Mechatronics Engineering,
Material and Chemical Engineering,
Civil and Architecture Engineering,
Biotechnology and Bio Engineering,
Environmental Engineering,
Petroleum and Mining Engineering,
Marine and Agriculture engineering,
Aerospace Engineering.
Node Deployment in Homogeneous and Heterogeneous Wireless Sensor NetworkIJMTST Journal
Optimal sensor deployment is necessary condition in homogeneous and heterogeneous wireless sensor
network. Effective deployment of sensor nodes is a major point of concern as performance and lifetime of any
WSN. Proposed sensor deployment in WSN explore every sensor node sends its data to the nearest sink node
of the WSN. In addition to that system proposes a hexagonal cell based sensor deployment which leads to
optimal sensor deployment for both homogeneous and heterogeneous sensor deployment. Wireless sensor
networks are receiving significant concentration due to their potential applications ranging from surveillance
to tracking domains. In limited communication range, a WSN is divided into several disconnected sub-graphs
under certain conditions. We deploy sensor nodes at random locations so that it improves performance of the
network.This paper aims to study, discuss and analyze various node deployment strategies and coverage
problems for Homogeneous and Heterogeneous WSN.
Node detection technique for node replication attack in mobile sensor networkRamesh Patriotic
This document proposes a new technique for detecting node replication attacks in mobile sensor networks. It summarizes existing detection methods and their limitations. The proposed method divides the network into clusters monitored by cluster heads. When a node enters a cluster, the cluster head checks its identity and velocity, which is encrypted and stored in the node. If another node in the cluster has the same identity but different velocity, it is identified as a replica. The technique aims to improve energy efficiency, detection accuracy, and reduce packet drops compared to existing centralized and distributed detection methods.
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
Ant Colony Optimization for Wireless Sensor Network: A Reviewiosrjce
IOSR Journal of Computer Engineering (IOSR-JCE) is a double blind peer reviewed International Journal that provides rapid publication (within a month) of articles in all areas of computer engineering and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications in computer technology. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
GEOGRAPHIC INFORMATION-BASED ROUTING OPTIMIZATION USING GA FOR CLUSTER-BASED ...ijwmn
Wireless sensor networks are used for data collection and event detection in various fields such as homenetworks, military systems, and forest fire monitoring, and are composed of many sensor nodes and a basestation. Sensor nodes have limited computing power, limited energy, are randomly distributed in an open environment that operates independently, and have difficulties in individual management. Taking advantage of those weaknesses, attackers can compromise sensor nodes for various kinds of network attacks. Several security protocols have been proposed to prevent these attacks. Most of the security protocols form routings with cluster head nodes. In the case of routing using only cluster head nodes, it is difficult to re-route when the size of the cluster is increased or the number of the surviving nodes is reduced. To prevent these attacks, the proposed scheme maintains security in a cluster-based security protocol and shows energy efficient routing using genetic algorithm by selecting the appropriate cluster head nodes and
utilizing the characteristics of the sensor node with different transmission outputs based on the distance between each node. In this paper, we use a probabilistic voting-based filtering scheme, one of the clusterbased security protocols, and the shortest path, which is a hierarchical routing protocol that the original probabilistic voting-based filtering scheme is using, to test the proposed scheme. This experiment shows the performance comparison of the routing success rate and routing cost according to the number of nodes on the field, as well as the performance comparison according to the cluster size per number of nodes.
A NOVEL APPROACH TO DETECT THE MOVEMENT OF TARGET IN WIRELESS SENSOR NETWORKSEditor IJMTER
The document summarizes a novel approach to detect target movement in wireless sensor networks. It proposes a prediction-based target tracking and sleep scheduling protocol (PPSS) to improve energy efficiency. The protocol reduces actively awakened nodes and controls their active time. It uses a related neighborhood graph to divide the area into non-overlapping faces for target tracking. An edge detection algorithm identifies polygon locations and wakes nodes before a target crosses to continuously monitor mobile targets. The approach achieves high tracking accuracy while reducing energy costs in wireless sensor networks.
ER Publication,
IJETR, IJMCTR,
Journals,
International Journals,
High Impact Journals,
Monthly Journal,
Good quality Journals,
Research,
Research Papers,
Research Article,
Free Journals, Open access Journals,
erpublication.org,
Engineering Journal,
Science Journals,
International Journal of Engineering Research and DevelopmentIJERD Editor
Electrical, Electronics and Computer Engineering,
Information Engineering and Technology,
Mechanical, Industrial and Manufacturing Engineering,
Automation and Mechatronics Engineering,
Material and Chemical Engineering,
Civil and Architecture Engineering,
Biotechnology and Bio Engineering,
Environmental Engineering,
Petroleum and Mining Engineering,
Marine and Agriculture engineering,
Aerospace Engineering.
Node Deployment in Homogeneous and Heterogeneous Wireless Sensor NetworkIJMTST Journal
Optimal sensor deployment is necessary condition in homogeneous and heterogeneous wireless sensor
network. Effective deployment of sensor nodes is a major point of concern as performance and lifetime of any
WSN. Proposed sensor deployment in WSN explore every sensor node sends its data to the nearest sink node
of the WSN. In addition to that system proposes a hexagonal cell based sensor deployment which leads to
optimal sensor deployment for both homogeneous and heterogeneous sensor deployment. Wireless sensor
networks are receiving significant concentration due to their potential applications ranging from surveillance
to tracking domains. In limited communication range, a WSN is divided into several disconnected sub-graphs
under certain conditions. We deploy sensor nodes at random locations so that it improves performance of the
network.This paper aims to study, discuss and analyze various node deployment strategies and coverage
problems for Homogeneous and Heterogeneous WSN.
Node detection technique for node replication attack in mobile sensor networkRamesh Patriotic
This document proposes a new technique for detecting node replication attacks in mobile sensor networks. It summarizes existing detection methods and their limitations. The proposed method divides the network into clusters monitored by cluster heads. When a node enters a cluster, the cluster head checks its identity and velocity, which is encrypted and stored in the node. If another node in the cluster has the same identity but different velocity, it is identified as a replica. The technique aims to improve energy efficiency, detection accuracy, and reduce packet drops compared to existing centralized and distributed detection methods.
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
Ant Colony Optimization for Wireless Sensor Network: A Reviewiosrjce
IOSR Journal of Computer Engineering (IOSR-JCE) is a double blind peer reviewed International Journal that provides rapid publication (within a month) of articles in all areas of computer engineering and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications in computer technology. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
GEOGRAPHIC INFORMATION-BASED ROUTING OPTIMIZATION USING GA FOR CLUSTER-BASED ...ijwmn
Wireless sensor networks are used for data collection and event detection in various fields such as homenetworks, military systems, and forest fire monitoring, and are composed of many sensor nodes and a basestation. Sensor nodes have limited computing power, limited energy, are randomly distributed in an open environment that operates independently, and have difficulties in individual management. Taking advantage of those weaknesses, attackers can compromise sensor nodes for various kinds of network attacks. Several security protocols have been proposed to prevent these attacks. Most of the security protocols form routings with cluster head nodes. In the case of routing using only cluster head nodes, it is difficult to re-route when the size of the cluster is increased or the number of the surviving nodes is reduced. To prevent these attacks, the proposed scheme maintains security in a cluster-based security protocol and shows energy efficient routing using genetic algorithm by selecting the appropriate cluster head nodes and
utilizing the characteristics of the sensor node with different transmission outputs based on the distance between each node. In this paper, we use a probabilistic voting-based filtering scheme, one of the clusterbased security protocols, and the shortest path, which is a hierarchical routing protocol that the original probabilistic voting-based filtering scheme is using, to test the proposed scheme. This experiment shows the performance comparison of the routing success rate and routing cost according to the number of nodes on the field, as well as the performance comparison according to the cluster size per number of nodes.
A NOVEL APPROACH TO DETECT THE MOVEMENT OF TARGET IN WIRELESS SENSOR NETWORKSEditor IJMTER
The document summarizes a novel approach to detect target movement in wireless sensor networks. It proposes a prediction-based target tracking and sleep scheduling protocol (PPSS) to improve energy efficiency. The protocol reduces actively awakened nodes and controls their active time. It uses a related neighborhood graph to divide the area into non-overlapping faces for target tracking. An edge detection algorithm identifies polygon locations and wakes nodes before a target crosses to continuously monitor mobile targets. The approach achieves high tracking accuracy while reducing energy costs in wireless sensor networks.
1) The document discusses implementing mobile target detection in wireless sensor networks. It focuses on using techniques like Tabu Search heuristics and Sequential Probability Ratio Tests to detect mobile targets and replicas.
2) A key challenge discussed is detecting when a mobile node has been replicated, which the proposed approach attempts to do using SPRT to analyze node speeds and determine if two nodes with the same identity are present.
3) The paper also examines using game theory approaches to maximize network lifetime and weighted intrusion detection in wireless sensor networks for mobile target detection. Experimental results show the SPRT-based replica detection works rapidly with no false positives or negatives.
Energy efficient node deployment for target coverage in wireless sensor networkGaurang Rathod
Network lifetime plays an integral role in setting up an efficient wireless sensor network. Coverage in a network needs to guarantee that the region is monitored with the required degree of reliability. Locations of sensor nodes constitute the basic input for the algorithms that examine coverage of the network. Coverage problems can be broadly classified as area coverage problem and target coverage problem. Area coverage focuses on monitoring the entire region of interest, whereas target coverage concerns monitoring only certain specific points in a given region. Target coverage can be categorized as simple coverage, k-coverage and Q-coverage.
Lower coverage level (simple coverage) is enough for environmental or habitat monitoring or applications like home security. Higher degree of coverage (k-coverage) will be required for some applications like target tracking to track the targets accurately, or if sensors work in a hostile environment such as battle fields or chemically polluted areas. More reliable results are produced for higher degree of coverage which requires multiple sensor nodes to monitor the region/targets. An example of Q-coverage is video surveillance systems deployed for monitoring hostile territorial area where some sensitive targets like a nuclear plant may need more sensors cooperate to ensure source redundancy for precise data. Sensor nodes deterministically deployed by using artificial bee colony algorithm, so as to achieve the required target coverage level and maximize the network lifetime.
This document proposes a novel sleep scheduling method for event monitoring in wireless sensor networks to achieve low broadcasting delay. The method uses a level-by-level offset schedule where when a node detects a critical event, it transmits an alarm message along a predetermined path with offsets between nodes to avoid collisions. It then uses a colored connected dominant set to establish paths for the center node to broadcast the alarm to other nodes. The proposed system is intended for applications like military and forest fire monitoring where quick dissemination of alarm messages is important.
International Journal of Engineering Research and Development (IJERD)IJERD Editor
This document summarizes research on detecting sensor node failures and proposing a node scheduling scheme in wireless sensor networks. It first introduces wireless sensor networks and discusses common node failures that can occur. It then proposes three algorithms: 1) using neighborhood keys and testing procedures to detect node failures, 2) implementing a security-aware routing protocol to provide security, and 3) developing an adaptive node scheduling method to maintain sensing levels when nodes fail. The document evaluates these approaches and concludes they can help address problems of node failure detection, security, and maintaining network functionality.
The document analyzes the likelihood of intruder detection in wireless sensor networks (WSNs) distributed uniformly, Gaussianly, and cohesively. It finds that cohesive networks have the highest detection likelihood as sensing range increases, followed by Gaussian and uniform distributions. The detection probability is calculated for single and multiple sensor detection models under varying parameters like sensing range, number of sensors, and intrusion distance. Clustering sensors improves energy efficiency without impacting intruder detection performance.
The peer-reviewed International Journal of Engineering Inventions (IJEI) is started with a mission to encourage contribution to research in Science and Technology. Encourage and motivate researchers in challenging areas of Sciences and Technology.
The document discusses wireless sensor networks and energy-efficient routing. It introduces WSNs and outlines their typical energy consumption from transmission, reception, and sensing. It describes deterministic and random deployment strategies and their impact on energy use. The document then examines WSN routing protocols and strategies, including flooding, interest-based, and location-based. It analyzes hierarchical protocols like LEACH and DECSA, noting how DECSA improves on LEACH by considering distance and residual energy to better balance energy consumption and prolong network lifetime.
Wireless sensor networks are nowadays widely popular and has become an integral part in the military
applications for human monitoring, thermal detection etc. Security of Wireless sensor network (WSN)
becomes a very important issue with the rapid development of WSN that is vulnerable to a wide range of
attacks such as sinkhole attacks due to deployment in the hostile environment and having limited resources.
Intrusion detection system is one of the major and efficient defensive methods against attacks in WSN. One
such detection technique is black listing technology. But using only Black listing technology is not suitable
for a mobile intruder since it was designed considering only a static intruding node in a WSN. So it is
necessary to build an energy efficient Intrusion detection system for sinkhole attack by a mobile intruder in
WSN. We are intended to design an energy efficient system for detection of sinkhole and elimination of a
mobile intruder from WSN nodes using a technology called greylisting. This technology uses pre alarm
packets to warn the neighboring nodes about the intruder and the energy consumed by the pre alarm
packets for making an alarm is much lesser than that of the packets used in black listing technology. Thus
this method will serve as the solution for the dilemma in providing the security for WSN in sinkhole attack.
This document presents a study on a proposed distributed attack detection algorithm using experimental and simulation analysis. The key points are:
1) The algorithm detects distributed denial of service attacks in wireless sensor networks using detector nodes that monitor traffic and reconstruct patterns to identify attacks.
2) Performance is affected by algorithmic parameters like time epoch length and number of detector nodes, and network parameters like node density and energy.
3) Simulation experiments quantify the attack detection rate, false positive/negative rates, and node energy utilization under variations in these parameters.
This document summarizes research on algorithms for proximity estimation in sensor networks. It discusses using sensor networks to detect events observed by nodes within a certain distance of each other. It proposes an algorithm that utilizes a distributed routing index maintained by nodes in the network to process multiple proximity queries involving different event types. The document reviews several related works on localization algorithms, data-centric sensor networks, geographic routing protocols, and node localization techniques. It evaluates different wireless sensor network simulators and deployment schemes.
Spatial Correlation Based Medium Access Control Protocol Using DSR & AODV Rou...IOSR Journals
The document summarizes a proposed spatial correlation-based medium access control protocol for wireless sensor networks that aims to improve energy efficiency. It discusses how sensor nodes are spatially distributed and correlated in detecting events. An iterative node selection algorithm is used to select a minimum set of representative sensor nodes based on a distortion constraint, in order to reduce redundant transmissions. The protocol uses vector quantization to calculate distances between nodes and a mobile element. It then evaluates the performance of using the DSR and AODV routing protocols with this spatial correlation-based MAC protocol in terms of energy consumption and packet drop ratio through simulations. The simulation results show that the protocol with AODV routing performs better than with DSR routing.
This document summarizes a survey on wireless sensor network lifetime constraints. It discusses how sensor node energy consumption affects network lifetime and the role of routing protocols in extending lifespan. Generic energy consumption includes reception, transmission, and sensing. Deployment strategies like deterministic grids can balance energy usage to prolong network lifetime. Routing protocols aim to minimize transmissions and optimize paths to reduce energy costs.
AN IMPROVED DECENTRALIZED APPROACH FOR TRACKING MULTIPLE MOBILE TARGETS THROU...ijwmn
Target localization and tracking problems in WSNs have received considerable attention recently, driven
by the requirement to achieve high localization accuracy, with the minimum cost possible. In WSN based
tracking applications, it is critical to know the current location of any sensor node with the minimum
energy consumed. This paper focuses on the energy consumption issue in terms of communication
between nodes whenever the localization information is transmitted to a sink node. Tracking through
WSNs can be categorized into centralized and decentralized systems. Decentralized systems offer low
power consumption when deployed to track a small number of mobile targets compared to the centralized
tracking systems. However, in several applications, it is essential to position a large number of mobile
targets. In such applications, decentralized systems offer high power consumption, since the location of
each mobile target is required to be transmitted to a sink node, and this increases the power consumption
for the whole WSN. In this paper, we propose a power efficient decentralized approach for tracking a
large number of mobile targets while offering reasonable localization accuracy through ZigBee network
International Journal of Engineering Research and Development (IJERD)IJERD Editor
The document summarizes research on detecting node replication attacks in mobile sensor networks. It discusses challenges in applying existing witness-finding strategies from static networks to mobile ones due to nodes' changing locations over time. Existing velocity-exceeding detection methods rely on centralized processing at the base station, incurring single point of failure issues. The paper then proposes localized detection algorithms that can effectively detect node replication in a distributed manner without requiring network-wide synchronization or revocation. The algorithms aim to overcome limitations of prior work in efficiently detecting replicas in mobile sensor networks.
An Assessment of Security Mechanisms Against Reactive Jammer Attack In Wirele...ijfcstjournal
Wireless sensor networks have been widely applied to various domains such as environmental monitoring
and surveillance. Since wireless sensor networks utilize open transmission media, they are prone to radio
jamming attacks. These attacks are easy to launch but difficult to defend. These attacks may lead to low
network throughput because of jamming signals. Failure of data transmission in sensor networks is due to
corruption of packets by reactive jammers. A number of defence techniques have been proposed in recent
years to deal with these jammer attacks. However, each defence technique is suitable for only a limited
network range and specific jamming conditions. This paper proposes an adaptive approach to detect and
isolate the reactive jammers by using status messages and trigger identification service.
Protocols for detection of node replication attack on wireless sensor networkIOSR Journals
This document summarizes two techniques for detecting node replication attacks in wireless sensor networks: centralized detection and distributed detection. Centralized detection involves nodes reporting information to a base station, which can detect replication by identifying conflicting location claims for the same node ID. Distributed detection techniques like witness-based strategies and deployment knowledge allow nodes to detect replication locally without a base station through methods like node broadcasting claims to witness nodes. The document analyzes the advantages and limitations of each approach.
IOSR Journal of Electronics and Communication Engineering(IOSR-JECE) is an open access international journal that provides rapid publication (within a month) of articles in all areas of electronics and communication engineering and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications in electronics and communication engineering. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
A detection & prevention of wormhole attack in wsn project abstractvishnuRajan20
At Softroniics we provide job oriented training for freshers in IT sector. We are providing IEEE project guidance and Final year project guidance. We are Pioneers in all leading technologies like Android, Java, .NET, PHP, Python, Embedded Systems, Matlab, NS2, VLSI, Modelsim, Tanner, Xilinx etc. We are specializiling in technologies like Big Data, Cloud Computing, Internet Of Things (iOT), Data Mining, Networking, Information Security, Image Processing and many other. We are providing long term and short term internship also. We are also providing IEEE project support at Calicut, Thrissur and Palakkad. For more details contact 9037291113, 7907435072
Node detection technique for node replication attack in mobile sensor networkIISRT
This document proposes a new technique for detecting node replication attacks in mobile sensor networks. It summarizes existing detection methods and their limitations. The proposed method divides the network into clusters monitored by cluster heads. When a node enters a cluster, the cluster head checks its identity and velocity, which is encrypted and stored in the node. If another node in the cluster has the same identity but different velocity, it is identified as a replica. The technique aims to improve energy efficiency, detection accuracy, and reduce packet drops compared to existing centralized and distributed detection methods. Simulation results show the proposed clustering approach increases energy efficiency and reduces packet loss compared to methods that broadcast identity and location information.
Iisrt 6-node detection technique for node replication attack in mobile sensor...IISRTJournals
This document discusses techniques for detecting node replication attacks in mobile sensor networks. It describes how node replication attacks work by allowing adversaries to create low-cost replica nodes with the same identity as legitimate nodes. Existing centralized detection methods for static networks, like using witness nodes or sending location data to a base station, do not work well for mobile networks where node locations change. The document proposes a new distributed detection method using cluster heads and encryption/decryption to detect replicated nodes based on their velocities. It argues this new method has advantages in accuracy, efficiency and reducing energy consumption compared to previous approaches.
Secure and Efficient Hierarchical Data Aggregation in Wireless Sensor NetworksIJMER
International Journal of Modern Engineering Research (IJMER) is Peer reviewed, online Journal. It serves as an international archival forum of scholarly research related to engineering and science education.
International Journal of Modern Engineering Research (IJMER) covers all the fields of engineering and science: Electrical Engineering, Mechanical Engineering, Civil Engineering, Chemical Engineering, Computer Engineering, Agricultural Engineering, Aerospace Engineering, Thermodynamics, Structural Engineering, Control Engineering, Robotics, Mechatronics, Fluid Mechanics, Nanotechnology, Simulators, Web-based Learning, Remote Laboratories, Engineering Design Methods, Education Research, Students' Satisfaction and Motivation, Global Projects, and Assessment…. And many more.
This document reviews the use of ant colony optimization algorithms for wireless sensor networks. It begins with background on wireless sensor networks and important concepts like sensor nodes, clusters, cluster heads, and base stations. It then discusses routing protocols for wireless sensor networks including location-based, data-centric, mobility-based, and multipath-based protocols. The document provides an overview of ant colony optimization algorithms and reviews several related works that have applied these algorithms to problems in wireless sensor networks, such as sensor wakeup control and increasing network lifetime. It concludes by discussing techniques like data mining and ant colony optimization that could be used to improve wireless sensor network performance.
1) The document discusses implementing mobile target detection in wireless sensor networks. It focuses on using techniques like Tabu Search heuristics and Sequential Probability Ratio Tests to detect mobile targets and replicas.
2) A key challenge discussed is detecting when a mobile node has been replicated, which the proposed approach attempts to do using SPRT to analyze node speeds and determine if two nodes with the same identity are present.
3) The paper also examines using game theory approaches to maximize network lifetime and weighted intrusion detection in wireless sensor networks for mobile target detection. Experimental results show the SPRT-based replica detection works rapidly with no false positives or negatives.
Energy efficient node deployment for target coverage in wireless sensor networkGaurang Rathod
Network lifetime plays an integral role in setting up an efficient wireless sensor network. Coverage in a network needs to guarantee that the region is monitored with the required degree of reliability. Locations of sensor nodes constitute the basic input for the algorithms that examine coverage of the network. Coverage problems can be broadly classified as area coverage problem and target coverage problem. Area coverage focuses on monitoring the entire region of interest, whereas target coverage concerns monitoring only certain specific points in a given region. Target coverage can be categorized as simple coverage, k-coverage and Q-coverage.
Lower coverage level (simple coverage) is enough for environmental or habitat monitoring or applications like home security. Higher degree of coverage (k-coverage) will be required for some applications like target tracking to track the targets accurately, or if sensors work in a hostile environment such as battle fields or chemically polluted areas. More reliable results are produced for higher degree of coverage which requires multiple sensor nodes to monitor the region/targets. An example of Q-coverage is video surveillance systems deployed for monitoring hostile territorial area where some sensitive targets like a nuclear plant may need more sensors cooperate to ensure source redundancy for precise data. Sensor nodes deterministically deployed by using artificial bee colony algorithm, so as to achieve the required target coverage level and maximize the network lifetime.
This document proposes a novel sleep scheduling method for event monitoring in wireless sensor networks to achieve low broadcasting delay. The method uses a level-by-level offset schedule where when a node detects a critical event, it transmits an alarm message along a predetermined path with offsets between nodes to avoid collisions. It then uses a colored connected dominant set to establish paths for the center node to broadcast the alarm to other nodes. The proposed system is intended for applications like military and forest fire monitoring where quick dissemination of alarm messages is important.
International Journal of Engineering Research and Development (IJERD)IJERD Editor
This document summarizes research on detecting sensor node failures and proposing a node scheduling scheme in wireless sensor networks. It first introduces wireless sensor networks and discusses common node failures that can occur. It then proposes three algorithms: 1) using neighborhood keys and testing procedures to detect node failures, 2) implementing a security-aware routing protocol to provide security, and 3) developing an adaptive node scheduling method to maintain sensing levels when nodes fail. The document evaluates these approaches and concludes they can help address problems of node failure detection, security, and maintaining network functionality.
The document analyzes the likelihood of intruder detection in wireless sensor networks (WSNs) distributed uniformly, Gaussianly, and cohesively. It finds that cohesive networks have the highest detection likelihood as sensing range increases, followed by Gaussian and uniform distributions. The detection probability is calculated for single and multiple sensor detection models under varying parameters like sensing range, number of sensors, and intrusion distance. Clustering sensors improves energy efficiency without impacting intruder detection performance.
The peer-reviewed International Journal of Engineering Inventions (IJEI) is started with a mission to encourage contribution to research in Science and Technology. Encourage and motivate researchers in challenging areas of Sciences and Technology.
The document discusses wireless sensor networks and energy-efficient routing. It introduces WSNs and outlines their typical energy consumption from transmission, reception, and sensing. It describes deterministic and random deployment strategies and their impact on energy use. The document then examines WSN routing protocols and strategies, including flooding, interest-based, and location-based. It analyzes hierarchical protocols like LEACH and DECSA, noting how DECSA improves on LEACH by considering distance and residual energy to better balance energy consumption and prolong network lifetime.
Wireless sensor networks are nowadays widely popular and has become an integral part in the military
applications for human monitoring, thermal detection etc. Security of Wireless sensor network (WSN)
becomes a very important issue with the rapid development of WSN that is vulnerable to a wide range of
attacks such as sinkhole attacks due to deployment in the hostile environment and having limited resources.
Intrusion detection system is one of the major and efficient defensive methods against attacks in WSN. One
such detection technique is black listing technology. But using only Black listing technology is not suitable
for a mobile intruder since it was designed considering only a static intruding node in a WSN. So it is
necessary to build an energy efficient Intrusion detection system for sinkhole attack by a mobile intruder in
WSN. We are intended to design an energy efficient system for detection of sinkhole and elimination of a
mobile intruder from WSN nodes using a technology called greylisting. This technology uses pre alarm
packets to warn the neighboring nodes about the intruder and the energy consumed by the pre alarm
packets for making an alarm is much lesser than that of the packets used in black listing technology. Thus
this method will serve as the solution for the dilemma in providing the security for WSN in sinkhole attack.
This document presents a study on a proposed distributed attack detection algorithm using experimental and simulation analysis. The key points are:
1) The algorithm detects distributed denial of service attacks in wireless sensor networks using detector nodes that monitor traffic and reconstruct patterns to identify attacks.
2) Performance is affected by algorithmic parameters like time epoch length and number of detector nodes, and network parameters like node density and energy.
3) Simulation experiments quantify the attack detection rate, false positive/negative rates, and node energy utilization under variations in these parameters.
This document summarizes research on algorithms for proximity estimation in sensor networks. It discusses using sensor networks to detect events observed by nodes within a certain distance of each other. It proposes an algorithm that utilizes a distributed routing index maintained by nodes in the network to process multiple proximity queries involving different event types. The document reviews several related works on localization algorithms, data-centric sensor networks, geographic routing protocols, and node localization techniques. It evaluates different wireless sensor network simulators and deployment schemes.
Spatial Correlation Based Medium Access Control Protocol Using DSR & AODV Rou...IOSR Journals
The document summarizes a proposed spatial correlation-based medium access control protocol for wireless sensor networks that aims to improve energy efficiency. It discusses how sensor nodes are spatially distributed and correlated in detecting events. An iterative node selection algorithm is used to select a minimum set of representative sensor nodes based on a distortion constraint, in order to reduce redundant transmissions. The protocol uses vector quantization to calculate distances between nodes and a mobile element. It then evaluates the performance of using the DSR and AODV routing protocols with this spatial correlation-based MAC protocol in terms of energy consumption and packet drop ratio through simulations. The simulation results show that the protocol with AODV routing performs better than with DSR routing.
This document summarizes a survey on wireless sensor network lifetime constraints. It discusses how sensor node energy consumption affects network lifetime and the role of routing protocols in extending lifespan. Generic energy consumption includes reception, transmission, and sensing. Deployment strategies like deterministic grids can balance energy usage to prolong network lifetime. Routing protocols aim to minimize transmissions and optimize paths to reduce energy costs.
AN IMPROVED DECENTRALIZED APPROACH FOR TRACKING MULTIPLE MOBILE TARGETS THROU...ijwmn
Target localization and tracking problems in WSNs have received considerable attention recently, driven
by the requirement to achieve high localization accuracy, with the minimum cost possible. In WSN based
tracking applications, it is critical to know the current location of any sensor node with the minimum
energy consumed. This paper focuses on the energy consumption issue in terms of communication
between nodes whenever the localization information is transmitted to a sink node. Tracking through
WSNs can be categorized into centralized and decentralized systems. Decentralized systems offer low
power consumption when deployed to track a small number of mobile targets compared to the centralized
tracking systems. However, in several applications, it is essential to position a large number of mobile
targets. In such applications, decentralized systems offer high power consumption, since the location of
each mobile target is required to be transmitted to a sink node, and this increases the power consumption
for the whole WSN. In this paper, we propose a power efficient decentralized approach for tracking a
large number of mobile targets while offering reasonable localization accuracy through ZigBee network
International Journal of Engineering Research and Development (IJERD)IJERD Editor
The document summarizes research on detecting node replication attacks in mobile sensor networks. It discusses challenges in applying existing witness-finding strategies from static networks to mobile ones due to nodes' changing locations over time. Existing velocity-exceeding detection methods rely on centralized processing at the base station, incurring single point of failure issues. The paper then proposes localized detection algorithms that can effectively detect node replication in a distributed manner without requiring network-wide synchronization or revocation. The algorithms aim to overcome limitations of prior work in efficiently detecting replicas in mobile sensor networks.
An Assessment of Security Mechanisms Against Reactive Jammer Attack In Wirele...ijfcstjournal
Wireless sensor networks have been widely applied to various domains such as environmental monitoring
and surveillance. Since wireless sensor networks utilize open transmission media, they are prone to radio
jamming attacks. These attacks are easy to launch but difficult to defend. These attacks may lead to low
network throughput because of jamming signals. Failure of data transmission in sensor networks is due to
corruption of packets by reactive jammers. A number of defence techniques have been proposed in recent
years to deal with these jammer attacks. However, each defence technique is suitable for only a limited
network range and specific jamming conditions. This paper proposes an adaptive approach to detect and
isolate the reactive jammers by using status messages and trigger identification service.
Protocols for detection of node replication attack on wireless sensor networkIOSR Journals
This document summarizes two techniques for detecting node replication attacks in wireless sensor networks: centralized detection and distributed detection. Centralized detection involves nodes reporting information to a base station, which can detect replication by identifying conflicting location claims for the same node ID. Distributed detection techniques like witness-based strategies and deployment knowledge allow nodes to detect replication locally without a base station through methods like node broadcasting claims to witness nodes. The document analyzes the advantages and limitations of each approach.
IOSR Journal of Electronics and Communication Engineering(IOSR-JECE) is an open access international journal that provides rapid publication (within a month) of articles in all areas of electronics and communication engineering and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications in electronics and communication engineering. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
A detection & prevention of wormhole attack in wsn project abstractvishnuRajan20
At Softroniics we provide job oriented training for freshers in IT sector. We are providing IEEE project guidance and Final year project guidance. We are Pioneers in all leading technologies like Android, Java, .NET, PHP, Python, Embedded Systems, Matlab, NS2, VLSI, Modelsim, Tanner, Xilinx etc. We are specializiling in technologies like Big Data, Cloud Computing, Internet Of Things (iOT), Data Mining, Networking, Information Security, Image Processing and many other. We are providing long term and short term internship also. We are also providing IEEE project support at Calicut, Thrissur and Palakkad. For more details contact 9037291113, 7907435072
Node detection technique for node replication attack in mobile sensor networkIISRT
This document proposes a new technique for detecting node replication attacks in mobile sensor networks. It summarizes existing detection methods and their limitations. The proposed method divides the network into clusters monitored by cluster heads. When a node enters a cluster, the cluster head checks its identity and velocity, which is encrypted and stored in the node. If another node in the cluster has the same identity but different velocity, it is identified as a replica. The technique aims to improve energy efficiency, detection accuracy, and reduce packet drops compared to existing centralized and distributed detection methods. Simulation results show the proposed clustering approach increases energy efficiency and reduces packet loss compared to methods that broadcast identity and location information.
Iisrt 6-node detection technique for node replication attack in mobile sensor...IISRTJournals
This document discusses techniques for detecting node replication attacks in mobile sensor networks. It describes how node replication attacks work by allowing adversaries to create low-cost replica nodes with the same identity as legitimate nodes. Existing centralized detection methods for static networks, like using witness nodes or sending location data to a base station, do not work well for mobile networks where node locations change. The document proposes a new distributed detection method using cluster heads and encryption/decryption to detect replicated nodes based on their velocities. It argues this new method has advantages in accuracy, efficiency and reducing energy consumption compared to previous approaches.
Secure and Efficient Hierarchical Data Aggregation in Wireless Sensor NetworksIJMER
International Journal of Modern Engineering Research (IJMER) is Peer reviewed, online Journal. It serves as an international archival forum of scholarly research related to engineering and science education.
International Journal of Modern Engineering Research (IJMER) covers all the fields of engineering and science: Electrical Engineering, Mechanical Engineering, Civil Engineering, Chemical Engineering, Computer Engineering, Agricultural Engineering, Aerospace Engineering, Thermodynamics, Structural Engineering, Control Engineering, Robotics, Mechatronics, Fluid Mechanics, Nanotechnology, Simulators, Web-based Learning, Remote Laboratories, Engineering Design Methods, Education Research, Students' Satisfaction and Motivation, Global Projects, and Assessment…. And many more.
This document reviews the use of ant colony optimization algorithms for wireless sensor networks. It begins with background on wireless sensor networks and important concepts like sensor nodes, clusters, cluster heads, and base stations. It then discusses routing protocols for wireless sensor networks including location-based, data-centric, mobility-based, and multipath-based protocols. The document provides an overview of ant colony optimization algorithms and reviews several related works that have applied these algorithms to problems in wireless sensor networks, such as sensor wakeup control and increasing network lifetime. It concludes by discussing techniques like data mining and ant colony optimization that could be used to improve wireless sensor network performance.
NUMBER OF NEIGHBOUR NODES BASED NEXT FORWARDING NODES DETERMINATION SCHEME FO...ijcsity
Wireless Sensor Networks (Wsn) Are Used In Various Areas. These Networks Are Deployed In An Open Environment. So, They Are Very Weak Against An Attack, And Easily Damaged.The Wsn Has Limited Resources In Terms Of Battery Life, Computing Power, Communication Bandwidth And So On. Many Attacks Aim At That Point.The False Report Injection Attack Is One Of Them. Yu Et Al. Proposed A Dynamic En-Route Filtering Scheme (Def),To Prevent A False Report Injection Attack.In This Paper, We Propose An Energy Enhancement Scheme For Def Using A Fuzzy System. The Def Is Divided Into Three Phases (Key Pre-Distribution Phase, Key Dissemination Phase, Report Forwarding Phase). We Applied Our Scheme At The Next Forwarding Node Determination. So We Used Three Input Factors Of A Fuzzy System To Make A Determination. These Are The Availability Of Energy, Distance To The Base Station,
And Usage Count.Through The Experiments, Our Proposed Method Shows Up To 8.2% Energy Efficiency,Compared With The Def. If The Networks Consume More Energy, Our Proposed Method Shows More Efficiency For The Energy.
Intrusion detection in homogeneous and heterogeneous wireless sensor networksHarshal Ladhe
This document summarizes a research paper about intrusion detection in homogeneous and heterogeneous wireless sensor networks. It discusses analyzing intrusion detection under two scenarios: single-sensor detection, where one sensor can detect an intruder, and multiple-sensor detection, where collaboration is needed. The paper analyzes detection probability with respect to intrusion distance and network parameters like node density and sensor ranges. Simulation results show heterogeneous networks with sensors of varying ranges increase detection probability over homogeneous networks.
This document discusses approaches to improve reliability in wireless sensor networks. It proposes a dynamic sectoring scheme where the network area is divided into sectors with a sensor node assigned as sector head for each. When an event occurs, only that sector is activated, reducing congestion and energy use. This is expected to enhance packet delivery ratio and reduce losses. Prior work on using data fusion and opportunistic flooding algorithms to improve reliability is also reviewed. The dynamic sectoring approach aims to reliably transmit data with low congestion and energy usage.
IJERA (International journal of Engineering Research and Applications) is International online, ... peer reviewed journal. For more detail or submit your article, please visit www.ijera.com
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
This document provides an introduction to wireless sensor networks. It describes a wireless sensor network as a network consisting of distributed sensors that monitor conditions like temperature, sound, and pollutants and pass data to a central location. Each sensor node contains a radio transceiver, microcontroller, sensor interface electronics, and a power source. The sensors form a multi-hop network to transmit data across long distances. Event-driven wireless sensor networks only transmit messages when events of interest occur to avoid overloading the network and wasting energy.
GEOGRAPHIC INFORMATION-BASED ROUTING OPTIMIZATION USING GA FOR CLUSTER-BASED ...ijwmn
Wireless sensor networks are used for data collection and event detection in various fields such as home networks, military systems, and forest fire monitoring, and are composed of many sensor nodes and a base station. Sensor nodes have limited computing power, limited energy, are randomly distributed in an open environment that operates independently, and have difficulties in individual management. Taking advantage of those weaknesses, attackers can compromise sensor nodes for various kinds of network attacks. Several security protocols have been proposed to prevent these attacks. Most of the security protocols form routings with cluster head nodes. In the case of routing using only cluster head nodes, it is difficult to re-route when the size of the cluster is increased or the number of the surviving nodes is reduced. To prevent these attacks, the proposed scheme maintains security in a cluster-based security protocol and shows energy efficient routing using genetic algorithm by selecting the appropriate cluster head nodes and
utilizing the characteristics of the sensor node with different transmission outputs based on the distance between each node. In this paper, we use a probabilistic voting-based filtering scheme, one of the clusterbased security protocols, and the shortest path, which is a hierarchical routing protocol that the original probabilistic voting-based filtering scheme is using, to test the proposed scheme. This experiment shows the performance comparison of the routing success rate and routing cost according to the number of nodes on the field, as well as the performance comparison according to the cluster size per number of nodes.
This document summarizes a research paper that proposes a methodology to improve source location privacy preservation in wireless sensor networks. The paper introduces the concept of "interval indistinguishability" to quantify anonymity. It maps the problem of breaching source anonymity to the statistical problem of binary hypothesis testing with nuisance parameters. The paper proposes modeling anonymity, describes the network and adversarial models, and reviews related work before introducing its methodology. The methodology aims to address issues with existing solutions and practically prove the efficiency of improving source location privacy through a modified statistical framework.
A flooding attack in wireless sensor networks is a type of threat that shortens the lifetimes of the sensor networks. Although flooding attack prevention techniques have been proposed, if a continuous flooding attack occurs, the sensor node energy is depleted during detection. In this paper, we use multi-path routing to solve this problem. In order to balance the load of the sensor node, energy balancing of the sensor node is controlled by determining the number of pathways using fuzzy logic. By adjusting the energy balancing of the sensor nodes, the number of energy-exhausting sensor nodes can be reduced. As a result, when a flooding attack occurs, the energy efficiency of the sensor node is increased by determining the number of pathways.
A flooding attack in wireless sensor networks is a type of threat that shortens the lifetimes of the sensor networks. Although flooding attack prevention techniques have been proposed, if a continuous flooding attack occurs, the sensor node energy is depleted during detection. In this paper, we use multi-path routing to solve this problem. In order to balance the load of the sensor node, energy balancing of the sensor node is controlled by determining the number of pathways using fuzzy logic. By adjusting the energy balancing of the sensor nodes, the number of energy-exhausting sensor nodes can be reduced. As a result, when a flooding attack occurs, the energy efficiency of the sensor node is increased by determining the number of pathways.
MULTI-PATH ROUTE DETERMINATION METHOD FOR NETWORK LOAD BALANCING IN FAP-BASED...ijcsit
A flooding attack in wireless sensor networks is a type of threat that shortens the lifetimes of the sensor
networks. Although flooding attack prevention techniques have been proposed, if a continuous flooding
attack occurs, the sensor node energy is depleted during detection. In this paper, we use multi-path routing
to solve this problem. In order to balance the load of the sensor node, energy balancing of the sensor node
is controlled by determining the number of pathways using fuzzy logic. By adjusting the energy balancing
of the sensor nodes, the number of energy-exhausting sensor nodes can be reduced. As a result, when a
flooding attack occurs, the energy efficiency of the sensor node is increased by determining the number of
pathways.
International Journal of Computational Engineering Research(IJCER)ijceronline
International Journal of Computational Engineering Research(IJCER) is an intentional online Journal in English monthly publishing journal. This Journal publish original research work that contributes significantly to further the scientific knowledge in engineering and Technology.
International Journal of Engineering Research and Development (IJERD)IJERD Editor
journal publishing, how to publish research paper, Call For research paper, international journal, publishing a paper, IJERD, journal of science and technology, how to get a research paper published, publishing a paper, publishing of journal, publishing of research paper, reserach and review articles, IJERD Journal, How to publish your research paper, publish research paper, open access engineering journal, Engineering journal, Mathemetics journal, Physics journal, Chemistry journal, Computer Engineering, Computer Science journal, how to submit your paper, peer reviw journal, indexed journal, reserach and review articles, engineering journal, www.ijerd.com, research journals,
yahoo journals, bing journals, International Journal of Engineering Research and Development, google journals, hard copy of journal
A FUZZY-BASED CONGESTION CONTROLLER FOR CONTROL AND BALANCE CONGESTION IN GRI...cscpconf
A Wireless Sensor Network (WSN) is deployed with a large number of sensors with limited power supply in a wide geographically area. These sensors collect information depending on application. The sensors transmit the data towards a base station called sink. Due to the relatively high node density and source-to-sink communication pattern, congestion is a critical issue in WSN. Congestion not only causes packet loss, but also leads to excessive energy
consumption as well as delay. To address this problem, in this paper we propose a new fuzzy logic based mechanism to detect and control congestion in WSN. In the proposed approach, a
Monitor Node for each grid in congestion candidate region performs a fuzzy control to avoid increasing congestion. Fuzzy controller’s inputs are continually fetched from the network by the Monitor Node. Simulation results show that our approach has higher packet delivery ratio and lower packet loss than existing approaches.
Similar to A MULTI-PATH ROUTING DETERMINATION METHOD FOR IMPROVING THE ENERGY EFFICIENCY IN SELECTIVE FORWARDING ATTACK DETECTION BASED MWSNS (20)
Optimizing Gradle Builds - Gradle DPE Tour Berlin 2024Sinan KOZAK
Sinan from the Delivery Hero mobile infrastructure engineering team shares a deep dive into performance acceleration with Gradle build cache optimizations. Sinan shares their journey into solving complex build-cache problems that affect Gradle builds. By understanding the challenges and solutions found in our journey, we aim to demonstrate the possibilities for faster builds. The case study reveals how overlapping outputs and cache misconfigurations led to significant increases in build times, especially as the project scaled up with numerous modules using Paparazzi tests. The journey from diagnosing to defeating cache issues offers invaluable lessons on maintaining cache integrity without sacrificing functionality.
Comparative analysis between traditional aquaponics and reconstructed aquapon...bijceesjournal
The aquaponic system of planting is a method that does not require soil usage. It is a method that only needs water, fish, lava rocks (a substitute for soil), and plants. Aquaponic systems are sustainable and environmentally friendly. Its use not only helps to plant in small spaces but also helps reduce artificial chemical use and minimizes excess water use, as aquaponics consumes 90% less water than soil-based gardening. The study applied a descriptive and experimental design to assess and compare conventional and reconstructed aquaponic methods for reproducing tomatoes. The researchers created an observation checklist to determine the significant factors of the study. The study aims to determine the significant difference between traditional aquaponics and reconstructed aquaponics systems propagating tomatoes in terms of height, weight, girth, and number of fruits. The reconstructed aquaponics system’s higher growth yield results in a much more nourished crop than the traditional aquaponics system. It is superior in its number of fruits, height, weight, and girth measurement. Moreover, the reconstructed aquaponics system is proven to eliminate all the hindrances present in the traditional aquaponics system, which are overcrowding of fish, algae growth, pest problems, contaminated water, and dead fish.
Batteries -Introduction – Types of Batteries – discharging and charging of battery - characteristics of battery –battery rating- various tests on battery- – Primary battery: silver button cell- Secondary battery :Ni-Cd battery-modern battery: lithium ion battery-maintenance of batteries-choices of batteries for electric vehicle applications.
Fuel Cells: Introduction- importance and classification of fuel cells - description, principle, components, applications of fuel cells: H2-O2 fuel cell, alkaline fuel cell, molten carbonate fuel cell and direct methanol fuel cells.
Redefining brain tumor segmentation: a cutting-edge convolutional neural netw...IJECEIAES
Medical image analysis has witnessed significant advancements with deep learning techniques. In the domain of brain tumor segmentation, the ability to
precisely delineate tumor boundaries from magnetic resonance imaging (MRI)
scans holds profound implications for diagnosis. This study presents an ensemble convolutional neural network (CNN) with transfer learning, integrating
the state-of-the-art Deeplabv3+ architecture with the ResNet18 backbone. The
model is rigorously trained and evaluated, exhibiting remarkable performance
metrics, including an impressive global accuracy of 99.286%, a high-class accuracy of 82.191%, a mean intersection over union (IoU) of 79.900%, a weighted
IoU of 98.620%, and a Boundary F1 (BF) score of 83.303%. Notably, a detailed comparative analysis with existing methods showcases the superiority of
our proposed model. These findings underscore the model’s competence in precise brain tumor localization, underscoring its potential to revolutionize medical
image analysis and enhance healthcare outcomes. This research paves the way
for future exploration and optimization of advanced CNN models in medical
imaging, emphasizing addressing false positives and resource efficiency.
Harnessing WebAssembly for Real-time Stateless Streaming PipelinesChristina Lin
Traditionally, dealing with real-time data pipelines has involved significant overhead, even for straightforward tasks like data transformation or masking. However, in this talk, we’ll venture into the dynamic realm of WebAssembly (WASM) and discover how it can revolutionize the creation of stateless streaming pipelines within a Kafka (Redpanda) broker. These pipelines are adept at managing low-latency, high-data-volume scenarios.
Embedded machine learning-based road conditions and driving behavior monitoringIJECEIAES
Car accident rates have increased in recent years, resulting in losses in human lives, properties, and other financial costs. An embedded machine learning-based system is developed to address this critical issue. The system can monitor road conditions, detect driving patterns, and identify aggressive driving behaviors. The system is based on neural networks trained on a comprehensive dataset of driving events, driving styles, and road conditions. The system effectively detects potential risks and helps mitigate the frequency and impact of accidents. The primary goal is to ensure the safety of drivers and vehicles. Collecting data involved gathering information on three key road events: normal street and normal drive, speed bumps, circular yellow speed bumps, and three aggressive driving actions: sudden start, sudden stop, and sudden entry. The gathered data is processed and analyzed using a machine learning system designed for limited power and memory devices. The developed system resulted in 91.9% accuracy, 93.6% precision, and 92% recall. The achieved inference time on an Arduino Nano 33 BLE Sense with a 32-bit CPU running at 64 MHz is 34 ms and requires 2.6 kB peak RAM and 139.9 kB program flash memory, making it suitable for resource-constrained embedded systems.
Electric vehicle and photovoltaic advanced roles in enhancing the financial p...IJECEIAES
Climate change's impact on the planet forced the United Nations and governments to promote green energies and electric transportation. The deployments of photovoltaic (PV) and electric vehicle (EV) systems gained stronger momentum due to their numerous advantages over fossil fuel types. The advantages go beyond sustainability to reach financial support and stability. The work in this paper introduces the hybrid system between PV and EV to support industrial and commercial plants. This paper covers the theoretical framework of the proposed hybrid system including the required equation to complete the cost analysis when PV and EV are present. In addition, the proposed design diagram which sets the priorities and requirements of the system is presented. The proposed approach allows setup to advance their power stability, especially during power outages. The presented information supports researchers and plant owners to complete the necessary analysis while promoting the deployment of clean energy. The result of a case study that represents a dairy milk farmer supports the theoretical works and highlights its advanced benefits to existing plants. The short return on investment of the proposed approach supports the paper's novelty approach for the sustainable electrical system. In addition, the proposed system allows for an isolated power setup without the need for a transmission line which enhances the safety of the electrical network
A review on techniques and modelling methodologies used for checking electrom...nooriasukmaningtyas
The proper function of the integrated circuit (IC) in an inhibiting electromagnetic environment has always been a serious concern throughout the decades of revolution in the world of electronics, from disjunct devices to today’s integrated circuit technology, where billions of transistors are combined on a single chip. The automotive industry and smart vehicles in particular, are confronting design issues such as being prone to electromagnetic interference (EMI). Electronic control devices calculate incorrect outputs because of EMI and sensors give misleading values which can prove fatal in case of automotives. In this paper, the authors have non exhaustively tried to review research work concerned with the investigation of EMI in ICs and prediction of this EMI using various modelling methodologies and measurement setups.
Understanding Inductive Bias in Machine LearningSUTEJAS
This presentation explores the concept of inductive bias in machine learning. It explains how algorithms come with built-in assumptions and preferences that guide the learning process. You'll learn about the different types of inductive bias and how they can impact the performance and generalizability of machine learning models.
The presentation also covers the positive and negative aspects of inductive bias, along with strategies for mitigating potential drawbacks. We'll explore examples of how bias manifests in algorithms like neural networks and decision trees.
By understanding inductive bias, you can gain valuable insights into how machine learning models work and make informed decisions when building and deploying them.
A MULTI-PATH ROUTING DETERMINATION METHOD FOR IMPROVING THE ENERGY EFFICIENCY IN SELECTIVE FORWARDING ATTACK DETECTION BASED MWSNS
1. International Journal of Wireless & Mobile Networks (IJWMN) Vol. 10, No. 4, August 2018
DOI: 10.5121/ijwmn.2018.10402 9
A MULTI-PATH ROUTING DETERMINATION
METHOD FOR IMPROVING THE ENERGY
EFFICIENCY IN SELECTIVE FORWARDING ATTACK
DETECTION BASED MWSNS
Won Jin Chung1
and Tae Ho Cho2
1&2
Department of Electrical and Computer Engineering, Sungkyunkwan University,
Suwon, Republic of Korea
ABSTRACT
A selective forwarding attack in mobile wireless sensor networks is an attack that selectively drops or
delivers event packets as the compromised node moves. In such an attack, it is difficult to detect the
compromised node compared with the selective forwarding attack occurring in the wireless sensor network
because all sensor nodes move. In order to detect selective forwarding attacks in mobile wireless sensor
networks, a fog computing-based system for a selective forwarding detection scheme has been proposed.
However, since the proposed detection scheme uses a single path, the energy consumption of the sensor
node for route discovery when the sensor node moves is large. To solve this problem, this paper uses fuzzy
logic to determine the number of multi-paths needed to improve the energy efficiency of sensor networks.
Experimental results show that the energy efficiency of the sensor network is improved by 9.5737%
compared with that of the existing scheme after 200 seconds when using the proposed scheme.
KEYWORDS
mobile wireless sensor networks, selective forwarding attack, network security, fuzzy logic, AOMDV
routing protocol
1. INTRODUCTION
Wireless sensor networks (WSNs) are composed of many small sensor nodes that detect
temperature, humidity, vibration, etc., and a base station (BS) that collects detected event data
[1][2]. Since the price of the sensor node is low, it is possible to arrange many sensor nodes in a
large area. The deployed sensor node senses an event and transmits a packet including event
information to the BS through a set path. In this way, WSNs are used in various fields such as
battlefields, military and industrial monitoring, and smart cities. However, there are also problems
with WSNs [3]. First, WSNs are sometimes deployed in hostile territories. In this case, the sensor
nodes are randomly placed through the aircraft. Randomly placed sensor nodes may not be able to
cover all of the areas that they want to sense. Second, the sensor node is energy limited, so if
many sensor nodes are depleted of energy, the area becomes a coverage hole. Since the position
of the sensor node is fixed once it is deployed, a new sensor node must be placed in order to sense
the coverage hole. Finally, in order to sense a moving object, the sensor node should be placed in
the moving direction. However, since the sensor nodes are randomly placed, there is no guarantee
that there is a sensor node in the direction that the object is moving. Mobile wireless sensor
2. International Journal of Wireless & Mobile Networks (IJWMN) Vol. 10, No. 4, August 2018
10
networks (MWSNs) have been proposed to solve these problems [4][5]. Figure 1 shows how
MWSNs detect the occurrence of an event.
Figure 1. Mobile wireless sensor networks
MWSNs are special WSNs with sensor nodes that are in motion. The MWSNs solve the coverage
hole problem when the mobile sensor node moves. In addition, since the number of hops is
reduced due to the movement of the sensor node, the packet transmission success probability is
higher than the packet transmission success probability of the static sensor node. In WSNs, the
sensor nodes around the BS receive the packets intensively, so they consume more energy than
the sensor nodes in other regions. In MWSNs, this problem is solved by the movement of the
sensor nodes. The movement of the sensor node can load balance the sensor node because the
data transmission is not concentrated, as is the case for a static sensor node around the BS.
However, MWSNs also have a disadvantage in that they are placed in low computing power areas
with limited energy in the external environment of the sensor node. Therefore, an attacker can
attempt node capture or a clone node attack to compromise sensor nodes deployed at key facilities.
The attacker can then use a compromised node to attempt various attacks such as selective
forwarding attacks, wormhole attacks, sinkhole attacks, and cybil attacks [6][7]. Among the
various kinds of attacks, selective forwarding attacks are attacks that selectively drop or deliver
packets forwarded through the compromised node. In the case of selective forwarding attacks in
MWSNs, it is difficult to detect compromised nodes due to the movement of all the sensor nodes.
This paper uses a fog server-based system for selective forwarding detection to detect such
attacks. However, since this detection method uses a single-path ad-hoc on-demand distance
vector (AODV) for its routing protocol, the energy efficiency of the sensor node is degraded
when route discovery is used in frequent MWSNs [8]. In addition, when the ad-hoc on-demand
multipath distance vector (AOMDV) routing protocol is used to solve this problem, unnecessary
multi-path routing degrades the energy efficiency of the sensor network [9]. Therefore, the
proposed scheme improves the energy efficiency of the sensor network by determining the
number of multi-paths using fuzzy logic. The composition of this paper is as follows. Section 2
describes the selective forwarding attack and detection scheme and the AOMDV routing protocol.
Section 3 describes the proposed scheme. Section 4 shows the performance of the proposed
scheme through experiments. Finally, Section 5 presents conclusions and future research.
2. RELATED WORKS
The section describes the selective forwarding attack, selective forwarding attack countermeasure,
and AODMV routing protocol.
3. International Journal of Wireless & Mobile Networks (IJWMN) Vol. 10, No. 4, August 2018
11
2.1. Selective Forwarding Attack
A selective forwarding attack occurs through a compromised node or an external electronic
device. When an event occurs, the sensor node that detects the event generates an event
notification packet and delivers it to the BS. The selective forwarding attack selectively passes or
drops event packets from the compromised node when the event notification packet passes the
compromised node. In a military confidential or battleground environment where an event
notification packet must be reached, an attacker attempts a selective forwarding attack through a
compromised node. If an attack occurs in an area where an event notification packet must be
reached, event packets may be selectively reached, which may cause confusion. While selective
forwarding attacks occur in both WSN and MWSN environments, selective forwarding attacks
occurring in MWSNs are treated as more threatening attacks [10]. The reason is that all sensor
nodes move, as the MWSNs form a mobile environment. In a mobile environment, compromised
nodes are difficult to detect because they can move and attempt selective forwarding attacks in
various areas. Figure 2 shows a selective forwarding attack occurring in an MWSN environment.
Figure 2. Selective forwarding attack
2.2. Fog Computing-based System Selective Forwarding Detection
Many types of research have been conducted to detect selective forwarding attacks. However,
most research involves schemes for detecting selective forwarding attacks in WSN environments
using static sensor nodes. These detection schemes are difficult to apply in MWSNs. Q. Yaseen
proposed a fog computing-based selective forwarding detection scheme to detect selective
forwarding attack in mobile environments [10]. The detection scheme is a technique that uses a
watchdog that was used to detect selective forwarding attacks in WSNs. The watchdog monitors
the transmission of the sensor node and measures the packet drop rates within the transmission
range of the sensor node to detect whether a selective forwarding attack occurs. When using the
watchdog, it is necessary to continually measure the packet drop rates within the transmission
range of the sensor node. However, it is difficult to apply this technique in the MWSN
environment in which the sensor node moves. This is because when the sensor node moves, the
transmission range of the sensor node is out of range. A fog computing-based system for selective
forwarding detection solves this problem by using a fog server. A selective forwarding attack
detection scheme consists of three layers, as shown in Figure 3.
4. International Journal of Wireless & Mobile Networks (IJWMN) Vol. 10, No. 4, August 2018
12
Figure 3. Fog computing-based system for the selective forwarding detection scheme
The cloud computing layer is used for data mining and management purposes and is used to
analyze the intrusion patterns of attacks. The fog layer is a virtualization platform that provides a
variety of services. The fog layer is the most important part of the fog computing-based system
for selective forwarding attack detection. The fog server configured in the fog layer collects
information monitored by the watchdog. Since the fog server must be continually monitored by
the watchdog to detect the compromised nodes, the fog servers exchange the monitoring
information of the sensor nodes in cooperation with each other. In addition, the fog server
analyzes the information monitored by the watchdog and performs voting to distinguish it as
either a normal node or a compromised node. Finally, at the wireless sensor layer, the sensor node
consists of an IDS that monitors the forwarding packets (FP) and receives the received packets
(RP). Thus, a fog computing-based system for selective forwarding attack detection can detect
selective forwarding attacks occurring in MWSNs.
2.3. AOMDV Routing Protocol
The AOMDV routing protocol is a special routing protocol that sets and routes multi-paths in the
AODV routing protocol. The AODV routing protocol initiates a route discovery process when the
source node needs to route to the destination node. Route discovery floods a route request
(RREQ) packet at the source node, and when the RREQ packet is received at the destination node,
the route is set by sending a route reply (RREP) packet in the reverse direction. A number of
intermediate nodes between the source node and the destination node send RREP packets only to
valid paths, and otherwise, flood the RREQ packets to find the route. In the AODV routing
protocol, maintenance of routes is done through route error (RERR) packets. If a path failure
occurs, it must be reset to a new path. Rerouting removes the failed path using the RERR packet
and sets the path through a new RREQ packet. Since the sensor node moves in the MWSNs,
many path failures occur, and a new path reset is required through the RERR packet and the
RREQ packet. However, since the sensor node is energy limited, if rerouting due to the
movement of the sensor node continues, the energy efficiency of the sensor node is degraded.
Therefore, an AOMDV routing protocol that sets up multi-paths has been proposed. The
AOMDV routing protocol is a routing protocol designed for use in networks where link failures
occur frequently. When route discovery occurs frequently, overhead and waiting time of the
network occurs, and energy consumption occurs because packets for routing are generated. To
5. International Journal of Wireless & Mobile Networks (IJWMN) Vol. 10, No. 4, August 2018
13
reduce this problem, the AOMDV routing protocol sets up multiple paths and performs route
discovery to discover new paths only when all paths fail. Figure 4 shows the table structure of the
AODV and AOMDV routing protocols.
Figure 4. Structure of routing tables
The hopcount in the AODV routing protocol is replaced by advertised_hopcount in the AOMDV
routing protocol. The advertised_hopcount is initialized only when the sequence number is
updated. Also, the nexthop in the AODV routing protocol is replaced with the route_list in the
AOMDV routing protocol. Route_list stores multiple routes in a list with hopcount.
3. PROPOSED SCHEME
3.1. Motive
The fog computing-based system for selective forwarding detection schemes is a technique for
detecting selective forwarding attacks occurring in MWSNs. However, the selective forwarding
attack detection method uses the AODV routing protocol. Since the AODV routing protocol uses
a single path, when it is applied to MWSNs composed of sensor nodes with mobility, the path
failure occurs due to the movement of the sensor node, and route discovery frequently occurs to
solve the problem. Therefore, energy consumption for route discovery is continuously generated
in the sensor network. To solve this problem, the proposed scheme uses an AOMDV routing
protocol that takes full advantage of the AODV routing protocol and reduces route discovery by
multiple paths. The AOMDV routing protocol can be used to reduce energy consumption for
route re-establishment, but since all routing needs to be set to multi-paths, multi-path routing
should be set up in areas where multiple routing settings are not needed. Therefore, the proposed
scheme improves the energy efficiency of the sensor network by reducing the energy for route
discovery by determining the number of multi-paths using fuzzy logic and controlling the number
of multi-paths in the area where multi-paths are unnecessary.
3.2. Assumption
The initial energy of the sensor node is set at random, and the movement of the sensor node uses
a random waypoint (RWP) model. Selective forwarding attacks occur only on compromised
nodes. BS and fog servers are not attacked.
6. International Journal of Wireless & Mobile Networks (IJWMN) Vol. 10, No. 4, August 2018
14
3.3. Fuzzy System
The proposed scheme improves the energy efficiency of the sensor network for routing the
establishment energy and routing by determining the number of multi-paths using fuzzy logic in
the selective forwarding attack detection scheme in MWSNs.
3.3.1. Input Parameter and Output Value
The proposed scheme uses the fuzzy logic used to determine the number of multi-paths. In fuzzy
logic, the input parameters are density of sensor nodes (DN), the residual energy of sensor nodes
(RE), the distance between the sensor node and a base station (DB) and the output value is
number of Multi-paths (NP).
Input parameters
DN = {L(Low), A(Average), H(High), VH(Very_High)}
RE = {VL(Very_Large), L(Large), M(Medium), S(Small)}
DB = {N(Near), A(Average), F(Far)}
Output value
NP = {P1(Path1), P2(Path2), P3(Path3), P4(Path4), P5(Path5)}
Since the input parameter DN uses the RWP model to move the sensor node, sensor nodes may
be concentrated in one area. In the area where the sensor nodes are dense, the movement of the
sensor node is limited. When the multi-paths are set, the sensor nodes in the dense area set many
multi-paths. If the density of the area decreases due to the movement of the sensor node after a
lapse of time, many sensor nodes must perform the route resetting. This routing is an unnecessary
setting. Therefore, the energy efficiency of the sensor network is improved if the number of
multi-paths is set to a smaller value in a higher density area. The input parameter RE is associated
with the lifetime of the sensor network. If the energy of the sensor node is depleted, the sensor
node cannot deliver the packet from the point of time when the energy is depleted. When many
sensor nodes are exhausted, a coverage hole is generated. This is the same for mobile sensor
nodes. Therefore, when the energy of the sensor node is low, the load balancing of the sensor
node should be performed using multi-paths. When multiple paths are set, the sensor nodes are
load-balanced by sequentially distributing and delivering packets through the set multi-paths [11].
If the load balancing of the sensor node is smooth, the network lifetime of the sensor network
increases. However, load balancing is unnecessary when there are many sensor nodes with a large
amount of energy remaining. In these areas, less energy is spent on routing due to the smaller
number of multi-path configurations. The input parameter DB does not require multiple paths
because sensor nodes near the BS can directly forward the packet to the BS. The number of multi-
paths reduces the energy consumption for routing by setting the number of multi-paths to be
smaller as the distance between the BS and sensor node decreases. Finally, the output value NP
represents the number of multi-paths. A total of 1 to 5 multi-paths can be set. p1 represents one
path setting, and p5 represents five path settings. The proposed scheme improves the energy
efficiency of the sensor network by reducing the energy consumed in path search and the multi-
path setup when detecting selective forwarding attack by setting multi-paths through output value
NP.
7. International Journal of Wireless & Mobile Networks (IJWMN) Vol. 10, No. 4, August 2018
15
3.3.2. Membership Function and Fuzzy Rule Base
The proposed method transforms input and output values into membership functions through
fuzzification and determines the number of multi-paths of AOMDV routing protocol through
defuzzification. Figure 5 is a membership function that schematically shows the fuzzy set in the
proposed scheme.
Figure 5. Fuzzy membership function
Then, the fuzzy rule base is created by using an input parameter and the output value of the fuzzy
logic. Table 1 shows the part of the fuzzy rule base set in the proposed scheme.
Table 1. Fuzzy rules
8. International Journal of Wireless & Mobile Networks (IJWMN) Vol. 10, No. 4, August 2018
16
4. EXPERIMENTAL RESULTS
The proposed method is verified through simulation written in C++ using Visual Studio. The size
of the sensor field used in the proposed scheme is 300ⅹ300(㎡), and the total number of sensor
nodes is 200. The movement of the sensor furnace is based on the RWP model, and the energy of
the sensor node does not exceed 1 Joule. There are three base stations and three fog servers which
receive event packets sent from the sensor nodes and grasps events. The compromised node is
located at random. The movement speed of the sensor node is set to [0, Vmax] km/h and the
direction is set to [0,2π]. The threshold of the proposed scheme is set to 15, the same as the fog
computing-based system for selective forwarding detection. Eelec = 50 nano Joule/bit is
consumed to transmit the packet wirelessly in the sensor node, and εelec = 100 pico Joule/bit/㎡
is consumed in the transmission amplification [12]. Therefore, the energy consumed when
transmitting the data of the k bit packet from the sensor node is calculated according to Eq. (1).
ETx(K, d) = Eelec * k + εelec * k * d2
(1)
The energy consumed when receiving from the sensor node is calculated according to Eq. (2).
ERx(K) = ERx-elec (K) (2)
Figures 6-8 shows the sensor network energy efficiency according to the movement speed of the
sensor node.
Figure 6. Sensor network efficiency (Vmax = 20)
9. International Journal of Wireless & Mobile Networks (IJWMN) Vol. 10, No. 4, August 2018
17
Figure 7. Sensor network efficiency (Vmax = 40)
Figure 8. Sensor network efficiency (Vmax = 60)
Figure 9 shows the number of packets drops with simulation time when the sensor node speed is
[0, 60] km/h.
Figure 9. Number of packet transmission failures to BS (Vmax = 60)
10. International Journal of Wireless & Mobile Networks (IJWMN) Vol. 10, No. 4, August 2018
18
If the simulation time is 50 seconds, the packet drop occurs 14 times in the conventional scheme.
However, since the proposed scheme uses multipath, it can be confirmed that the packet is not
dropped.
4. CONCLUSION
Selective forwarding attacks in MWSNs are difficult to detect because all sensor nodes move. In
addition, the selective forwarding attack detection scheme researched in WSNs is not applicable
to MWSNs because they do not consider the movement of sensor nodes. A fog computing-based
system for selective forwarding detection scheme is a technique for detecting selective
forwarding attacks occurring in MWNS based on the movement of the sensor nodes. Since this
detection scheme transmits packets using the AODV routing protocol, energy consumption of the
sensor node for route discovery is large when the detection scheme is used in MWSNs. The
proposed scheme improves the energy efficiency of the sensor network by determining the
number of multi-paths using fuzzy logic. Experimental results show that the energy efficiency of
the sensor network is 9.5737% higher than that of the existing method when the attack occurs for
n seconds. Future research will be carried out to establish multi-paths suitable for the situation
considering the change in the MWSNs.
ACKNOWLEDGEMENTS
This research was supported by Basic Science Research Program through the National Research
Foundation of Korea (NRF) funded by the Ministry of Education, Science and Technology
(No.NRF-2015R1D1A1A01059484)
REFERENCES
[1] I. F. Akyildiz, W. Su, Y. Sankarasubramaniam and E. Cayirci, "A survey on sensor networks,"
Communications Magazine, IEEE, vol. 40, pp. 102-114, 2002.
[2] K. Akkaya and M. Younis, “A survey on routing protocols for wireless sensor networks,” Ad Hoc
Netw., vol. 3, pp. 325–349, 2005.
[3] R.Javad, M.Moradi and A.S.Ismail, "Mobile wireless sensor networks overview," International
Journal of Computer Communications and Networks vol. 2, no. 1, pp. 17-22, 2012
[4] C. Zhu, et al. "A survey on communication and data management issues in mobile sensor networks",
Wireless Commun. Mobile Computing, vol. 14, no. 1, pp. 19-36, 2014
[5] I. Amundson and X. D. Koutsoukos, "A survey on localization for mobile wireless sensor networks."
Mobile entity localization and tracking in GPS-less environnments. Springer, Berlin, Heidelberg,
235-254, 2009
[6] Y. Wang, G. Attebury, and B. Ramamurthy, “A survey of security issues in wireless sensor
networks,” IEEE Communications Surveys & Tutorials, vol. 8, pp. 2-23, 2007
[7] J. Sen, "A survey on wireless sensor network security," arXiv preprint arXiv:1011.1529, 2010.
[8] C. Perkins, E. Belding-Royer, and S. Das, "Ad hoc on-demand distance vector (AODV) routing,"
IETF RFC 3561, 2003
[9] N M. Marina and S. Das, "On-demand multipath distance vector routing in ad hoc networks", IEEE
International Conference on Network Protocols (ICNP), pp. 14–23, 2001
11. International Journal of Wireless & Mobile Networks (IJWMN) Vol. 10, No. 4, August 2018
19
[10] Q. Yaseen, F. AlBalas, and Y. Jararweh, "A fog computing-based system for selective forwarding
detection in mobile wireless sensor networks". Foundations and Applications of Self* Systems,
IEEE International Workshops on. IEEE, 2016
[11] M. Radi, B. Dezfouli, K. A. Bakar and M. Lee, “Multipath routing in wireless sensor networks:
survey and research challenges,” Sensors, vol. 12, pp. 650-685, Jan. 2012
[12] R.U.Anitha and P. Kamalakkannan, "Enhanced cluster based routing protocol for mobile nodes in
wireless sensor network," Pattern Recognition, Informatics and Mobile Engineering (PRIME), 2013
International Conference on. IEEE, pp. 187-193, 2013
Authors
Won Jin Chung Received a B.S. degree in Information Security from Baekseok
University, Korea, in 2016 and is now working toward a Ph.D. degree in the Department
of Electrical and Computer Engineering at Sungkyunkwan University, Korea.
Tae Ho Cho Received a Ph.D. degree in Electrical and Computer Engineering from the
University of Arizona, USA, in 1993, and B.S. and M.S. degrees in Electrical and
Computer Engineering from Sungkyunkwan University, Republic of Korea, and the
University of Alabama, USA, respectively. He is currently a Professor in the College of
Software, Sungkyunkwan University, Korea.