Wireless sensor network (WSN) is the network of hundreds and thousands of micro-sensor nodes,
connecting each other by a wireless medium.WSN provide reliable sensing of the environment, detecting
and reporting events to the sink. One of the most important constraints of WSN is energy consumption.
Since the micro sensors are small in dimension, batteries are necessary to produce power to the network. In
this paper, we have proposed an algorithm for hierarchy based protocols of wireless sensor networks,
which consist of two groups of sensor nodes in a single cluster node. Each cluster consists of a three cluster
head. The event driven data sensing mechanism is used in this paper and this sensed data is transmitted to
the master section head. The gathered data is transmitted to the sink via mobile agent. Hence efficient way
of data transmission is possible with larger group of nodes. In this approach of using hierarchy based
protocols; the lifetime of the sensor network is increased. This paper proposes an innovative approach of
cluster head election. The results are compared with LEACH protocol and proved to be energy efficient.
Concealed Data Aggregation with Dynamic Intrusion Detection System to Remove ...csandit
Data Aggregation is a vital aspect in WSNs (Wireless Sensor Networks) and this is because it
reduces the quantity of data to be transmitted over the complex network. In earlier studies
authors used homomorphic encryption properties for concealing statement during aggregation
such that encrypted data can be aggregated algebraically without decrypting them. These
schemes are not applicable for multi applications which lead to proposal of Concealed Data
Aggregation for Multi Applications (CDAMA). It is designed for multi applications, as it
provides secure counting ability. In wireless sensor networks SN are unarmed and are
susceptible to attacks. Considering the defence aspect of wireless environment we have used
DYDOG (Dynamic Intrusion Detection Protocol Model) and a customized key generation
procedure that uses Digital Signatures and also Two Fish Algorithms along with CDAMA for
augmentation of security and throughput. To prove our proposed scheme’s robustness and
effectiveness, we conducted the simulations, inclusive analysis and comparisons at the ending.
Comprehensive Review on Base Energy Efficient Routing ProtocolIJRES Journal
With the faster growing in electronics industry, small inexpensive battery powered wireless sensors have made an impact on the communications with the physical world. The Wireless Sensor Networks (WSN) consists of hundreds of sensor nodes which are resource constrained. WSN nodes monitor various physical and environmental conditions very cooperatively. WSN uses various nodes for the communication. WSN has become one of the interested areas in the field of research from last few years. To enhance the lifetime of the whole networks energy reduction is the necessary consideration for design and analyse of the clustering and routing protocols. This paper describes the study of various energy efficient routing protocols in WSNs which are important for their designing purpose so as to meet the various resource constraints.
Spread Spectrum Based Energy Efficient Wireless Sensor NetworksIDES Editor
The Wireless Sensor Networks (WSN) is
considered to be one of the most promising emerging
technologies. However one of the main constraints which
is holding back its wide range of applications is the
battery life of the sensor node and thus effecting the
network life. A new approach to this problem has been
presented in this paper. The proposed method is suitable
for event driven applications where the event occurrence
is very rare. The system uses spread spectrum as a means
of communication.
Concealed Data Aggregation with Dynamic Intrusion Detection System to Remove ...csandit
Data Aggregation is a vital aspect in WSNs (Wireless Sensor Networks) and this is because it
reduces the quantity of data to be transmitted over the complex network. In earlier studies
authors used homomorphic encryption properties for concealing statement during aggregation
such that encrypted data can be aggregated algebraically without decrypting them. These
schemes are not applicable for multi applications which lead to proposal of Concealed Data
Aggregation for Multi Applications (CDAMA). It is designed for multi applications, as it
provides secure counting ability. In wireless sensor networks SN are unarmed and are
susceptible to attacks. Considering the defence aspect of wireless environment we have used
DYDOG (Dynamic Intrusion Detection Protocol Model) and a customized key generation
procedure that uses Digital Signatures and also Two Fish Algorithms along with CDAMA for
augmentation of security and throughput. To prove our proposed scheme’s robustness and
effectiveness, we conducted the simulations, inclusive analysis and comparisons at the ending.
Comprehensive Review on Base Energy Efficient Routing ProtocolIJRES Journal
With the faster growing in electronics industry, small inexpensive battery powered wireless sensors have made an impact on the communications with the physical world. The Wireless Sensor Networks (WSN) consists of hundreds of sensor nodes which are resource constrained. WSN nodes monitor various physical and environmental conditions very cooperatively. WSN uses various nodes for the communication. WSN has become one of the interested areas in the field of research from last few years. To enhance the lifetime of the whole networks energy reduction is the necessary consideration for design and analyse of the clustering and routing protocols. This paper describes the study of various energy efficient routing protocols in WSNs which are important for their designing purpose so as to meet the various resource constraints.
Spread Spectrum Based Energy Efficient Wireless Sensor NetworksIDES Editor
The Wireless Sensor Networks (WSN) is
considered to be one of the most promising emerging
technologies. However one of the main constraints which
is holding back its wide range of applications is the
battery life of the sensor node and thus effecting the
network life. A new approach to this problem has been
presented in this paper. The proposed method is suitable
for event driven applications where the event occurrence
is very rare. The system uses spread spectrum as a means
of communication.
Multiagent based multipath routing in wireless sensor networksijwmn
This paper proposes a Multiagent Based Multipath Routing (MBMR) using a set of static and mobile agents
by employing localization technique. The operation of proposed routing technique can be briefly explained
as follows. (1) Anchor nodes are deployed evenly over the network environment. (2) Unknown sensor nodes
are deployed randomly over network environment and these nodes perform localization. (3) Source node
computes the shortest route to destination node through arbitrary midpoint node and intermediate nodes.
(4) Source node generates mobile agents for partial route discovery, which traverses to destination node
through the midpoint and intermediate nodes by carrying information. (5) Mobile agents update the
destination node with carried information. (6) Destination node computes route weight factor for all the
routes discovered by mobile agents. (7) Destination node computes the node disjoint routes and it selects
routes depending on the criticalness of event for communication. The performance of the proposed scheme
is evaluated in terms of performance parameters such as localization error, network lifetime, energy
consumption, cost factor, packet delivery ratio, and latency.
Node Deployment in Homogeneous and Heterogeneous Wireless Sensor NetworkIJMTST Journal
Optimal sensor deployment is necessary condition in homogeneous and heterogeneous wireless sensor
network. Effective deployment of sensor nodes is a major point of concern as performance and lifetime of any
WSN. Proposed sensor deployment in WSN explore every sensor node sends its data to the nearest sink node
of the WSN. In addition to that system proposes a hexagonal cell based sensor deployment which leads to
optimal sensor deployment for both homogeneous and heterogeneous sensor deployment. Wireless sensor
networks are receiving significant concentration due to their potential applications ranging from surveillance
to tracking domains. In limited communication range, a WSN is divided into several disconnected sub-graphs
under certain conditions. We deploy sensor nodes at random locations so that it improves performance of the
network.This paper aims to study, discuss and analyze various node deployment strategies and coverage
problems for Homogeneous and Heterogeneous WSN.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
Engineering Research Publication
Best International Journals, High Impact Journals,
International Journal of Engineering & Technical Research
ISSN : 2321-0869 (O) 2454-4698 (P)
www.erpublication.org
CUTTING DOWN ENERGY USAGE IN WIRELESS SENSOR NETWORKS USING DUTY CYCLE TECHNI...ijwmn
A wireless sensor network is composed of many sensor nodes, that have beengiven out in a
specific zoneandeach of them hadanability of collecting information from the environment and
sending collected data to the sink. The most significant issues in wireless sensor networks,
despite the recent progress is the trouble of the severe limitations of energy resources.Since that
in different applications of sensor nets, we could throw a static or mobile sink, then all aspects of
such networks should be planned with an awareness of energy.One of the most significant topics
related to these networks, is routing. One of the most widely used and efficient methods of
routing isa hierarchy (based on clustering) method.
In The present study with the objective of cutting down energy consumption and persistence of
network coverage, we have offered a novel algorithm based on clustering algorithms and multihop routing.To achieve this goal, first, we layer the network environment based on the size of the
network.We will identify the optimal number of cluster heads and every cluster head based on
the mechanism of topology control will start to accept members.Likewise, we set the first layer
as gate layer and subsequently identifying the gate’s nodes, we’d turn away half of the sensors
and then stop using energy and the remaining nodes in this layer will join the gate’s nodes
because they hold a critical part in bettering the functioning of the system. Cluster heads off
following layers send the information to cluster heads in the above layer until sent data will be
sent to gate’s nodes and finally will be sent to sink. We have tested the proposed algorithm in
two situations 1) when the sink is off and 2)when a sink is on and simulation data shows that
proposed algorithm has better performance in terms of the life span of a network than LEACH
and ELEACH protocols.
BOTTLENECK DETECTION ALGORITHM TO ENHANCE LIFETIME OF WSNijngnjournal
In recent years, a wireless sensor network is gaining much more importance due to its immense
contribution in numerous applications. Deployment of sensor nodes that would reduce computation,
minimize cost and gaining high degree of network connectivity is an challenging task. Random deployment
of sensor nodes causes the wireless sensor networks to face topological weaknesses such as communication
bottlenecks, network partitions and sensing holes. These problems lead to uneven energy utilization,
reduction in reliability of network and reduction in network lifetime. Bottleneck detection algorithm is
proposed to identify bottleneck and minimal bottleneck zones in network. Additional sensor node
deployment strategy is used in bottleneck detection algorithm to extend network lifetime. Random
additional sensor node deployment and Targeted additional sensor node deployment are proposed to
enhance network lifetime. Deployment strategies are compared with respect to network parameters such as
throughput, packet delivery fraction and network lifetime.
Secure and Efficient Hierarchical Data Aggregation in Wireless Sensor NetworksIJMER
International Journal of Modern Engineering Research (IJMER) is Peer reviewed, online Journal. It serves as an international archival forum of scholarly research related to engineering and science education.
International Journal of Modern Engineering Research (IJMER) covers all the fields of engineering and science: Electrical Engineering, Mechanical Engineering, Civil Engineering, Chemical Engineering, Computer Engineering, Agricultural Engineering, Aerospace Engineering, Thermodynamics, Structural Engineering, Control Engineering, Robotics, Mechatronics, Fluid Mechanics, Nanotechnology, Simulators, Web-based Learning, Remote Laboratories, Engineering Design Methods, Education Research, Students' Satisfaction and Motivation, Global Projects, and Assessment…. And many more.
Design Issues and Applications of Wireless Sensor Networkijtsrd
Efficient design and implementation of wireless sensor networks has become a hot area of research in recent years, due to the vast potential of sensor networks to enable applications that connect the physical world to the virtual world. By networking large numbers of tiny sensor nodes, it is possible to obtain data about physical phenomena that was difficult or impossible to obtain in more conventional ways. In future as advances in micro-fabrication technology allow the cost of manufacturing sensor nodes to continue to drop, increasing deployments of wireless sensor networks are expected, with the networks eventually growing to large numbers of nodes.Potential applications for such large-scale wireless sensor networks exist in a variety of fields, including medical monitoring, environmental monitoring, surveillance, home security, military operations, and industrial machine monitoring etc. G. Swarnalatha | R. Srilalitha"Design Issues and Applications of Wireless Sensor Network" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-1 | Issue-6 , October 2017, URL: http://www.ijtsrd.com/papers/ijtsrd4688.pdf http://www.ijtsrd.com/engineering/computer-engineering/4688/design-issues-and-applications-of-wireless-sensor-network/g-swarnalatha
The development of the wireless sensor networks (WSNs) in various applications like Defense, Health,
Environment monitoring, Industry etc. always attract many researchers in this field. WSN is the network
which consists of collection of tiny devices called sensor nodes. Sensor node typically combines wireless
radio transmitter-receiver and limited energy, restricted computational processing capacity and
communication band width. These sensor node sense some physical phenomenon using different
transduces. The current improvement in sensor technology has made possible WSNs that have wide and
varied applications. While selecting the right sensor for application a number of characteristics are
important. This paper provides the basics of WSNs including the node characteristics. It also throws light
on the different routing protocols.
CONCEALED DATA AGGREGATION WITH DYNAMIC INTRUSION DETECTION SYSTEM TO REMOVE ...cscpconf
Data Aggregation is a vital aspect in WSNs (Wireless Sensor Networks) and this is because it
reduces the quantity of data to be transmitted over the complex network. In earlier studies
authors used homomorphic encryption properties for concealing statement during aggregation
such that encrypted data can be aggregated algebraically without decrypting them. These
schemes are not applicable for multi applications which lead to proposal of Concealed Data
Aggregation for Multi Applications (CDAMA). It is designed for multi applications, as it
provides secure counting ability. In wireless sensor networks SN are unarmed and are
susceptible to attacks. Considering the defence aspect of wireless environment we have used
DYDOG (Dynamic Intrusion Detection Protocol Model) and a customized key generation
procedure that uses Digital Signatures and also Two Fish Algorithms along with CDAMA for
augmentation of security and throughput. To prove our proposed scheme’s robustness and
effectiveness, we conducted the simulations, inclusive analysis and comparisons at the ending.
EVENT DRIVEN ROUTING PROTOCOLS FOR WIRELESS SENSOR NETWORK- A SURVEYijcsa
Advances in embedded systems have resulted in the development of wireless sensor networks, which not
only provide unique opportunities for monitoring but also controlling homes, cities and the environments.
Recent advancements in wireless sensor network have resulted into many new protocols some of them are
specifically designed for sensor network for detecting the event and routing the event related information to
the base station in efficient manner. This paper surveys recent event driven routing protocols for wireless
sensor network. We have compared various event driven routing protocols using different parameters like
Sink Centric, Node Centric, Reliability, Congestion control, Energy Efficiency, Loss reliability and loss
recovery. We have also described LEACH and MECN protocols but as they are not e
Multiagent based multipath routing in wireless sensor networksijwmn
This paper proposes a Multiagent Based Multipath Routing (MBMR) using a set of static and mobile agents
by employing localization technique. The operation of proposed routing technique can be briefly explained
as follows. (1) Anchor nodes are deployed evenly over the network environment. (2) Unknown sensor nodes
are deployed randomly over network environment and these nodes perform localization. (3) Source node
computes the shortest route to destination node through arbitrary midpoint node and intermediate nodes.
(4) Source node generates mobile agents for partial route discovery, which traverses to destination node
through the midpoint and intermediate nodes by carrying information. (5) Mobile agents update the
destination node with carried information. (6) Destination node computes route weight factor for all the
routes discovered by mobile agents. (7) Destination node computes the node disjoint routes and it selects
routes depending on the criticalness of event for communication. The performance of the proposed scheme
is evaluated in terms of performance parameters such as localization error, network lifetime, energy
consumption, cost factor, packet delivery ratio, and latency.
Node Deployment in Homogeneous and Heterogeneous Wireless Sensor NetworkIJMTST Journal
Optimal sensor deployment is necessary condition in homogeneous and heterogeneous wireless sensor
network. Effective deployment of sensor nodes is a major point of concern as performance and lifetime of any
WSN. Proposed sensor deployment in WSN explore every sensor node sends its data to the nearest sink node
of the WSN. In addition to that system proposes a hexagonal cell based sensor deployment which leads to
optimal sensor deployment for both homogeneous and heterogeneous sensor deployment. Wireless sensor
networks are receiving significant concentration due to their potential applications ranging from surveillance
to tracking domains. In limited communication range, a WSN is divided into several disconnected sub-graphs
under certain conditions. We deploy sensor nodes at random locations so that it improves performance of the
network.This paper aims to study, discuss and analyze various node deployment strategies and coverage
problems for Homogeneous and Heterogeneous WSN.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
Engineering Research Publication
Best International Journals, High Impact Journals,
International Journal of Engineering & Technical Research
ISSN : 2321-0869 (O) 2454-4698 (P)
www.erpublication.org
CUTTING DOWN ENERGY USAGE IN WIRELESS SENSOR NETWORKS USING DUTY CYCLE TECHNI...ijwmn
A wireless sensor network is composed of many sensor nodes, that have beengiven out in a
specific zoneandeach of them hadanability of collecting information from the environment and
sending collected data to the sink. The most significant issues in wireless sensor networks,
despite the recent progress is the trouble of the severe limitations of energy resources.Since that
in different applications of sensor nets, we could throw a static or mobile sink, then all aspects of
such networks should be planned with an awareness of energy.One of the most significant topics
related to these networks, is routing. One of the most widely used and efficient methods of
routing isa hierarchy (based on clustering) method.
In The present study with the objective of cutting down energy consumption and persistence of
network coverage, we have offered a novel algorithm based on clustering algorithms and multihop routing.To achieve this goal, first, we layer the network environment based on the size of the
network.We will identify the optimal number of cluster heads and every cluster head based on
the mechanism of topology control will start to accept members.Likewise, we set the first layer
as gate layer and subsequently identifying the gate’s nodes, we’d turn away half of the sensors
and then stop using energy and the remaining nodes in this layer will join the gate’s nodes
because they hold a critical part in bettering the functioning of the system. Cluster heads off
following layers send the information to cluster heads in the above layer until sent data will be
sent to gate’s nodes and finally will be sent to sink. We have tested the proposed algorithm in
two situations 1) when the sink is off and 2)when a sink is on and simulation data shows that
proposed algorithm has better performance in terms of the life span of a network than LEACH
and ELEACH protocols.
BOTTLENECK DETECTION ALGORITHM TO ENHANCE LIFETIME OF WSNijngnjournal
In recent years, a wireless sensor network is gaining much more importance due to its immense
contribution in numerous applications. Deployment of sensor nodes that would reduce computation,
minimize cost and gaining high degree of network connectivity is an challenging task. Random deployment
of sensor nodes causes the wireless sensor networks to face topological weaknesses such as communication
bottlenecks, network partitions and sensing holes. These problems lead to uneven energy utilization,
reduction in reliability of network and reduction in network lifetime. Bottleneck detection algorithm is
proposed to identify bottleneck and minimal bottleneck zones in network. Additional sensor node
deployment strategy is used in bottleneck detection algorithm to extend network lifetime. Random
additional sensor node deployment and Targeted additional sensor node deployment are proposed to
enhance network lifetime. Deployment strategies are compared with respect to network parameters such as
throughput, packet delivery fraction and network lifetime.
Secure and Efficient Hierarchical Data Aggregation in Wireless Sensor NetworksIJMER
International Journal of Modern Engineering Research (IJMER) is Peer reviewed, online Journal. It serves as an international archival forum of scholarly research related to engineering and science education.
International Journal of Modern Engineering Research (IJMER) covers all the fields of engineering and science: Electrical Engineering, Mechanical Engineering, Civil Engineering, Chemical Engineering, Computer Engineering, Agricultural Engineering, Aerospace Engineering, Thermodynamics, Structural Engineering, Control Engineering, Robotics, Mechatronics, Fluid Mechanics, Nanotechnology, Simulators, Web-based Learning, Remote Laboratories, Engineering Design Methods, Education Research, Students' Satisfaction and Motivation, Global Projects, and Assessment…. And many more.
Design Issues and Applications of Wireless Sensor Networkijtsrd
Efficient design and implementation of wireless sensor networks has become a hot area of research in recent years, due to the vast potential of sensor networks to enable applications that connect the physical world to the virtual world. By networking large numbers of tiny sensor nodes, it is possible to obtain data about physical phenomena that was difficult or impossible to obtain in more conventional ways. In future as advances in micro-fabrication technology allow the cost of manufacturing sensor nodes to continue to drop, increasing deployments of wireless sensor networks are expected, with the networks eventually growing to large numbers of nodes.Potential applications for such large-scale wireless sensor networks exist in a variety of fields, including medical monitoring, environmental monitoring, surveillance, home security, military operations, and industrial machine monitoring etc. G. Swarnalatha | R. Srilalitha"Design Issues and Applications of Wireless Sensor Network" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-1 | Issue-6 , October 2017, URL: http://www.ijtsrd.com/papers/ijtsrd4688.pdf http://www.ijtsrd.com/engineering/computer-engineering/4688/design-issues-and-applications-of-wireless-sensor-network/g-swarnalatha
The development of the wireless sensor networks (WSNs) in various applications like Defense, Health,
Environment monitoring, Industry etc. always attract many researchers in this field. WSN is the network
which consists of collection of tiny devices called sensor nodes. Sensor node typically combines wireless
radio transmitter-receiver and limited energy, restricted computational processing capacity and
communication band width. These sensor node sense some physical phenomenon using different
transduces. The current improvement in sensor technology has made possible WSNs that have wide and
varied applications. While selecting the right sensor for application a number of characteristics are
important. This paper provides the basics of WSNs including the node characteristics. It also throws light
on the different routing protocols.
CONCEALED DATA AGGREGATION WITH DYNAMIC INTRUSION DETECTION SYSTEM TO REMOVE ...cscpconf
Data Aggregation is a vital aspect in WSNs (Wireless Sensor Networks) and this is because it
reduces the quantity of data to be transmitted over the complex network. In earlier studies
authors used homomorphic encryption properties for concealing statement during aggregation
such that encrypted data can be aggregated algebraically without decrypting them. These
schemes are not applicable for multi applications which lead to proposal of Concealed Data
Aggregation for Multi Applications (CDAMA). It is designed for multi applications, as it
provides secure counting ability. In wireless sensor networks SN are unarmed and are
susceptible to attacks. Considering the defence aspect of wireless environment we have used
DYDOG (Dynamic Intrusion Detection Protocol Model) and a customized key generation
procedure that uses Digital Signatures and also Two Fish Algorithms along with CDAMA for
augmentation of security and throughput. To prove our proposed scheme’s robustness and
effectiveness, we conducted the simulations, inclusive analysis and comparisons at the ending.
EVENT DRIVEN ROUTING PROTOCOLS FOR WIRELESS SENSOR NETWORK- A SURVEYijcsa
Advances in embedded systems have resulted in the development of wireless sensor networks, which not
only provide unique opportunities for monitoring but also controlling homes, cities and the environments.
Recent advancements in wireless sensor network have resulted into many new protocols some of them are
specifically designed for sensor network for detecting the event and routing the event related information to
the base station in efficient manner. This paper surveys recent event driven routing protocols for wireless
sensor network. We have compared various event driven routing protocols using different parameters like
Sink Centric, Node Centric, Reliability, Congestion control, Energy Efficiency, Loss reliability and loss
recovery. We have also described LEACH and MECN protocols but as they are not e
International Journal of Computational Engineering Research(IJCER) ijceronline
International Journal of Computational Engineering Research(IJCER) is an intentional online Journal in English monthly publishing journal. This Journal publish original research work that contributes significantly to further the scientific knowledge in engineering and Technology.
Study Of Coded Based Mechanism In WSN SystemIJERA Editor
Wireless Sensor networks (WSN) is an emerging technology and have great potential to be employed in critical
situations like battlefields and commercial applications such as building, traffic surveillance, habitat monitoring
and smart homes and many more scenarios.One of the major challenges wireless sensor networks face today is
QoS. In order to ensure data security and quality of service required by an application in an energy efficient
way, we propose a mechanism for QoS routing with coding and selective encryption scheme for WSNs.Our
approach provides reliable and secure data transmission and can adapt to the resource constraints of WSNs.
An Efficient Approach for Data Gathering and Sharing with Inter Node Communi...cscpconf
In today’s era Wireless sensor networks (WSNs) have emerged as a solution for a wide range of
applications. Most of the traditional WSN architectures consist of static nodes which are densely deployed
over a sensing area. Recently, several WSN architectures based on mobile elements (MEs) have been
proposed. Most of them exploit mobility to address the problem of data collection in WSNs. The common
drawback among them is to data sharing between interconnected nodes. In this paper we propose an
Efficient Approach for Data Gathering and Sharing with Inter Node Communication in Mobile-Sink. Our
algorithm is divided into seven parts: Registration Phase, Authentication Phase, Request and Reply Phase,
Setup Phase, Setup Phase (NN), Data Gathering, and Forwarding to Sink. Our approach provides an
efficient way to handle data in between the intercommunication nodes. By the above approach we can
access the data from the node which is not in the list, by sharing the data from the node which is
approachable to the desired node. For accessing and sharing we need some security so that the data can
be shared between authenticated nodes. For this we use two way security approach one for the accessing
node and other for the sharing.
CUTTING DOWN ENERGY USAGE IN WIRELESS SENSOR NETWORKS USING DUTY CYCLE TECHNI...ijwmn
A wireless sensor network is composed of many sensor nodes, that have beengiven out in a
specific zoneandeach of them hadanability of collecting information from the environment and
sending collected data to the sink. The most significant issues in wireless sensor networks,
despite the recent progress is the trouble of the severe limitations of energy resources.Since that
in different applications of sensor nets, we could throw a static or mobile sink, then all aspects of
such networks should be planned with an awareness of energy.One of the most significant topics
related to these networks, is routing. One of the most widely used and efficient methods of
routing isa hierarchy (based on clustering) method.
A Review of Routing Protocols for Wireless Sensor NetworkIJMER
A wireless sensor network is a collection of nodes organized into a cooperative network. Each node consists of processing capability, may contain multiple types of memory, have a RF transceiver, have a power source, and accommodate various sensors and actuators. The nodes
communicate wirelessly and often self-organize after being deployed in an ad hoc fashion. Routing protocols for wireless sensor networks are responsible for maintaining the routes in the network and have to ensure reliable multi-hop communication .The performance of the network is
greatly influenced by the routing techniques. Routing is to find out the path to route the sensed data to the base station. In this paper the features of WSNs are introduced and routing protocols are reviewed for Wireless Sensor Network
A NOVEL APPROACH FOR ENERGY EFFICIENT HIERARCHY BASED ROUTING IN SENSOR NETWO...cscpconf
Wireless sensor network (WSN) is the collection of many micro-sensor nodes, connecting each other by a
wireless medium. WSN exhibits different approaches to provide reliable sensing of the environment,
detecting and reporting events. In this paper, we have proposed an algorithm for hierarchy based protocols
of wireless sensor networks, which consist of two groups of sensor nodes in a single cluster node. Each
cluster consists of a three cluster head. The event driven data sensing mechanism is used in this paper and
this sensed data is transmitted to the master section head. Hence efficient way of data transmission is possible with larger group of nodes. In this approach, using hierarchy based protocols; the lifetime of the sensor network is increased.
A Review Study on Shortest Path in WSN to detect the Abnormal Packet for savi...Editor IJMTER
The main motive of this research is to study energy-efficient data-gathering mechanisms to
abnormal packet data for saving the energy. To detect the abnormal packet irregularities is useful for
saving energy, as well as for management of network, because the patterns found can be used for
both decision making in applications and system performance tuning. Node distribution in WSNs is
either deterministic or self-organizing and application dependant. The sensor nodes in WSNs have
minimum energy and they use their energy for communication and sensing.
Wireless Sensor Network (WSN) is partially distributed autonomous sensors to monitor physical or environmental conditions such as temperature, pressure etc. and to cooperatively pass their data through the network to the central location. The technique referred to as multi-hop wireless communications is used by the WSN’s to communicate. Due to the limited processing power and the finite power accessible to each sensor nodes, the application of regular routing techniques is not recommended. Hence recent advances in wireless sensor networks have made the routing protocols more efficient. This paper surveys and compares the advanced routing protocols. The three main categories discussed here are flat based, hierarchical based and location based. The paper concludes with open research issues.
A Comparative Analysis for Hybrid Routing Protocol for Wireless Sensor NetworksIJERA Editor
Wireless Sensor Networks (WSNs) consist of smallnodes with sensing, computation and wireless
communicationscapabilities. These sensor networks interconnect a several othernodes when established in large
and this opens up severaltechnical challenges and immense application possibilities.These wireless sensor
networks communicate using multi-hopwireless communications, regular ad hoc routing techniquescannot be
directly applied to sensor networks domain due tothe limited processing power and the finite power available
toeach sensor nodes hence recent advances in wireless sensornetworks have developed many protocols
depending on theapplication and network architecture and are specificallydesigned for sensor networks where
energy awareness is anessential consideration. This paper presents routingprotocols for sensor networks and
compares the routingprotocols that are presently of increasing importance.
In this paper, we propose Hybrid Routing Protocol whichcombines the merits of proactive and reactive approach
andovercome their demerits.
ER Publication,
IJETR, IJMCTR,
Journals,
International Journals,
High Impact Journals,
Monthly Journal,
Good quality Journals,
Research,
Research Papers,
Research Article,
Free Journals, Open access Journals,
erpublication.org,
Engineering Journal,
Science Journals,
Energy Efficient Key Management Analysis using AVL Trees in Wireless Sensor N...inventionjournals
International Journal of Engineering and Science Invention (IJESI) is an international journal intended for professionals and researchers in all fields of computer science and electronics. IJESI publishes research articles and reviews within the whole field Engineering Science and Technology, new teaching methods, assessment, validation and the impact of new technologies and it will continue to provide information on the latest trends and developments in this ever-expanding subject. The publications of papers are selected through double peer reviewed to ensure originality, relevance, and readability. The articles published in our journal can be accessed online.
A review of Hierarchical energy Protocols in Wireless Sensor Networkiosrjce
IOSR Journal of Computer Engineering (IOSR-JCE) is a double blind peer reviewed International Journal that provides rapid publication (within a month) of articles in all areas of computer engineering and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications in computer technology. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
Similar to EFFICIENT HIERARCHICAL ROUTING PROTOCOL IN SENSOR NETWORKS (20)
Connector Corner: Automate dynamic content and events by pushing a buttonDianaGray10
Here is something new! In our next Connector Corner webinar, we will demonstrate how you can use a single workflow to:
Create a campaign using Mailchimp with merge tags/fields
Send an interactive Slack channel message (using buttons)
Have the message received by managers and peers along with a test email for review
But there’s more:
In a second workflow supporting the same use case, you’ll see:
Your campaign sent to target colleagues for approval
If the “Approve” button is clicked, a Jira/Zendesk ticket is created for the marketing design team
But—if the “Reject” button is pushed, colleagues will be alerted via Slack message
Join us to learn more about this new, human-in-the-loop capability, brought to you by Integration Service connectors.
And...
Speakers:
Akshay Agnihotri, Product Manager
Charlie Greenberg, Host
Essentials of Automations: Optimizing FME Workflows with ParametersSafe Software
Are you looking to streamline your workflows and boost your projects’ efficiency? Do you find yourself searching for ways to add flexibility and control over your FME workflows? If so, you’re in the right place.
Join us for an insightful dive into the world of FME parameters, a critical element in optimizing workflow efficiency. This webinar marks the beginning of our three-part “Essentials of Automation” series. This first webinar is designed to equip you with the knowledge and skills to utilize parameters effectively: enhancing the flexibility, maintainability, and user control of your FME projects.
Here’s what you’ll gain:
- Essentials of FME Parameters: Understand the pivotal role of parameters, including Reader/Writer, Transformer, User, and FME Flow categories. Discover how they are the key to unlocking automation and optimization within your workflows.
- Practical Applications in FME Form: Delve into key user parameter types including choice, connections, and file URLs. Allow users to control how a workflow runs, making your workflows more reusable. Learn to import values and deliver the best user experience for your workflows while enhancing accuracy.
- Optimization Strategies in FME Flow: Explore the creation and strategic deployment of parameters in FME Flow, including the use of deployment and geometry parameters, to maximize workflow efficiency.
- Pro Tips for Success: Gain insights on parameterizing connections and leveraging new features like Conditional Visibility for clarity and simplicity.
We’ll wrap up with a glimpse into future webinars, followed by a Q&A session to address your specific questions surrounding this topic.
Don’t miss this opportunity to elevate your FME expertise and drive your projects to new heights of efficiency.
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...UiPathCommunity
💥 Speed, accuracy, and scaling – discover the superpowers of GenAI in action with UiPath Document Understanding and Communications Mining™:
See how to accelerate model training and optimize model performance with active learning
Learn about the latest enhancements to out-of-the-box document processing – with little to no training required
Get an exclusive demo of the new family of UiPath LLMs – GenAI models specialized for processing different types of documents and messages
This is a hands-on session specifically designed for automation developers and AI enthusiasts seeking to enhance their knowledge in leveraging the latest intelligent document processing capabilities offered by UiPath.
Speakers:
👨🏫 Andras Palfi, Senior Product Manager, UiPath
👩🏫 Lenka Dulovicova, Product Program Manager, UiPath
JMeter webinar - integration with InfluxDB and GrafanaRTTS
Watch this recorded webinar about real-time monitoring of application performance. See how to integrate Apache JMeter, the open-source leader in performance testing, with InfluxDB, the open-source time-series database, and Grafana, the open-source analytics and visualization application.
In this webinar, we will review the benefits of leveraging InfluxDB and Grafana when executing load tests and demonstrate how these tools are used to visualize performance metrics.
Length: 30 minutes
Session Overview
-------------------------------------------
During this webinar, we will cover the following topics while demonstrating the integrations of JMeter, InfluxDB and Grafana:
- What out-of-the-box solutions are available for real-time monitoring JMeter tests?
- What are the benefits of integrating InfluxDB and Grafana into the load testing stack?
- Which features are provided by Grafana?
- Demonstration of InfluxDB and Grafana using a practice web application
To view the webinar recording, go to:
https://www.rttsweb.com/jmeter-integration-webinar
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualityInflectra
In this insightful webinar, Inflectra explores how artificial intelligence (AI) is transforming software development and testing. Discover how AI-powered tools are revolutionizing every stage of the software development lifecycle (SDLC), from design and prototyping to testing, deployment, and monitoring.
Learn about:
• The Future of Testing: How AI is shifting testing towards verification, analysis, and higher-level skills, while reducing repetitive tasks.
• Test Automation: How AI-powered test case generation, optimization, and self-healing tests are making testing more efficient and effective.
• Visual Testing: Explore the emerging capabilities of AI in visual testing and how it's set to revolutionize UI verification.
• Inflectra's AI Solutions: See demonstrations of Inflectra's cutting-edge AI tools like the ChatGPT plugin and Azure Open AI platform, designed to streamline your testing process.
Whether you're a developer, tester, or QA professional, this webinar will give you valuable insights into how AI is shaping the future of software delivery.
Elevating Tactical DDD Patterns Through Object CalisthenicsDorra BARTAGUIZ
After immersing yourself in the blue book and its red counterpart, attending DDD-focused conferences, and applying tactical patterns, you're left with a crucial question: How do I ensure my design is effective? Tactical patterns within Domain-Driven Design (DDD) serve as guiding principles for creating clear and manageable domain models. However, achieving success with these patterns requires additional guidance. Interestingly, we've observed that a set of constraints initially designed for training purposes remarkably aligns with effective pattern implementation, offering a more ‘mechanical’ approach. Let's explore together how Object Calisthenics can elevate the design of your tactical DDD patterns, offering concrete help for those venturing into DDD for the first time!
State of ICS and IoT Cyber Threat Landscape Report 2024 previewPrayukth K V
The IoT and OT threat landscape report has been prepared by the Threat Research Team at Sectrio using data from Sectrio, cyber threat intelligence farming facilities spread across over 85 cities around the world. In addition, Sectrio also runs AI-based advanced threat and payload engagement facilities that serve as sinks to attract and engage sophisticated threat actors, and newer malware including new variants and latent threats that are at an earlier stage of development.
The latest edition of the OT/ICS and IoT security Threat Landscape Report 2024 also covers:
State of global ICS asset and network exposure
Sectoral targets and attacks as well as the cost of ransom
Global APT activity, AI usage, actor and tactic profiles, and implications
Rise in volumes of AI-powered cyberattacks
Major cyber events in 2024
Malware and malicious payload trends
Cyberattack types and targets
Vulnerability exploit attempts on CVEs
Attacks on counties – USA
Expansion of bot farms – how, where, and why
In-depth analysis of the cyber threat landscape across North America, South America, Europe, APAC, and the Middle East
Why are attacks on smart factories rising?
Cyber risk predictions
Axis of attacks – Europe
Systemic attacks in the Middle East
Download the full report from here:
https://sectrio.com/resources/ot-threat-landscape-reports/sectrio-releases-ot-ics-and-iot-security-threat-landscape-report-2024/
Epistemic Interaction - tuning interfaces to provide information for AI supportAlan Dix
Paper presented at SYNERGY workshop at AVI 2024, Genoa, Italy. 3rd June 2024
https://alandix.com/academic/papers/synergy2024-epistemic/
As machine learning integrates deeper into human-computer interactions, the concept of epistemic interaction emerges, aiming to refine these interactions to enhance system adaptability. This approach encourages minor, intentional adjustments in user behaviour to enrich the data available for system learning. This paper introduces epistemic interaction within the context of human-system communication, illustrating how deliberate interaction design can improve system understanding and adaptation. Through concrete examples, we demonstrate the potential of epistemic interaction to significantly advance human-computer interaction by leveraging intuitive human communication strategies to inform system design and functionality, offering a novel pathway for enriching user-system engagements.
Epistemic Interaction - tuning interfaces to provide information for AI support
EFFICIENT HIERARCHICAL ROUTING PROTOCOL IN SENSOR NETWORKS
1. International Journal Of Advanced Smart Sensor Network Systems (IJASSN), Vol 3, No.2, April 2013
DOI:10.5121/ijassn.2013.3202 11
EFFICIENTHIERARCHICAL ROUTING
PROTOCOL IN SENSORNETWORKS
S.Karthikeyan1
and S.Jayashri2
1
Research scholar, Sathyabma University, chennai, India
karthijoy1@gmail.com
2
Principal, Adhiparasakthi Engineering college, Melmaruvathur, Tamil Nadu, India
jayaravi2010@gmail.com
ABSTRACT
Wireless sensor network (WSN) is the network of hundreds and thousands of micro-sensor nodes,
connecting each other by a wireless medium.WSN provide reliable sensing of the environment, detecting
and reporting events to the sink. One of the most important constraints of WSN is energy consumption.
Since the micro sensors are small in dimension, batteries are necessary to produce power to the network. In
this paper, we have proposed an algorithm for hierarchy based protocols of wireless sensor networks,
which consist of two groups of sensor nodes in a single cluster node. Each cluster consists of a three cluster
head. The event driven data sensing mechanism is used in this paper and this sensed data is transmitted to
the master section head. The gathered data is transmitted to the sink via mobile agent. Hence efficient way
of data transmission is possible with larger group of nodes. In this approach of using hierarchy based
protocols; the lifetime of the sensor network is increased. This paper proposes an innovative approach of
cluster head election. The results are compared with LEACH protocol and proved to be energy efficient.
KEYWORDS
Sensor Nodes, lifetime, event driven, master section head, Mobile Agent.
1.INTRODUCTION
With the advancements in Wireless communication The design and implementation of WSNs
have become a sizzling and important area of research. The micro-sensors along with compact
and portable computing devices have made the distributed sensing of greater importance. It
enables the applications to connect the physical world to the virtual world due to the latent of
sensor networks. To obtain the information about the physical environment was in fact difficult or
almost impossible to obtain in more conventional ways. But by introducing the sensor networks
with tiny sensor nodes, the whole picture turned upside-down, turned impossible possible. As
micro-fabrication technology will become advanced in the future it will ultimately allow the
increase deployments of wireless sensor networks and cost of manufacturing sensor nodes to fall,
where the networks are growing rapidly to large number of nodes, for e.g., thousands[1]. When
compared to data processing, the data transmission consumes more energy in WSN. The data
aggregation will balance the energy consumption of each node, so that the network’s lifetime is
increased [2],[3].The major advantages of WSN over conventional networks are accuracy, low
cost, greater coverage area and reliability. WSNs are immobile, comprises large number of tiny
micro sensors, which is more than the nodes in traditional networks. The WSN perform a specific
data gathering and transmission by deploying large number of sensor nodes randomly. It has a
base station called as sink, which receives the transmitted data. For such large scale wireless
2. International Journal Of Advanced Smart Sensor Network Systems (IJASSN), Vol 3, No.2, April 2013
12
sensor networks large number of potential applications exist in a variety of fields like medical
monitoring, environmental monitoring, surveillance, security, military operations and industrial
machine monitoring. For better view and understanding as to why traditional protocols are not
best suited for these types of sensor network applications, the unique features of sensor networks
and the performance metrics with which the protocols for the sensor networks must be evaluated
will be categorized in the remainder of this section. To achieve the specific performance
requirements of these networks one of the popular approaches used is Clustering. After clustering,
the cluster head collects and gathers the sensed data and transmits to the sink. The cluster head
election is rotated to share the burden of the head and balance the energy consumption [4]. There
is always a limitation on the cost and size of the network, because the power of the nodes depends
on the actual power embedded in the nodes [5].
1.1 Features of WSN
Most of the ad hoc network features are shared by WSN. Thus protocol design which is used for
sensing networks must include for the properties of ad-hoc networks [6]. Some of the features of
Sensor networks are given here. The communication is unreliable due to the usage of wireless
medium. The lifetime of the network is affected by the limited energy supplies of the nodes in the
network. However several unique features exist in wireless sensor networks that don’t even exist
in general ad hoc networks. These features will require modification of designs for ad hoc
network as they have to face new challenges. The ad hoc network has lesser size, whereas the
sensor networks have thousands of nodes in it. The sensor nodes are typically immobile, which
clearly means that the mechanism used in traditional ad-hoc network protocols to deal with
mobility may be unnecessary and may also look overweight. Unexpected node failure is more,
since they are deployed in harsh environmental conditions. The nodes used in WSN are very tiny
micro sensors, which are much smaller than nodes used in traditional ad hoc networks (e.g.,
PDAs, laptop computers), These nodes consist of smaller batteries which leads to shorter life
time, less computational power and also less memory. Additional services such as location
information may also be required in wireless sensor networks. In the traditional ad hoc networks
nodes compete for resources such as bandwidth whereas nodes in a sensor network are expected
to behave more cooperatively because they try to accomplish a similar universal goal, which is
typically related to maintaining an application-level quality of service (QOS), or fidelity.
Communication is actually data-centric rather than address-centric, which means that depending
on the description of the data, routed data may be aggregated or compressed or prioritized or
dropped. Communication in the sensor networks typically take place in the form of very short
packets, which means that the relative overhead imposed at different network layers have become
much more important.
1.2 Challenges in WSN Design
WSN design is motivated and influenced by one or more of the following technical challenge:
Mostly the WSNs are randomly deployed, where the large no of nodes are distributed densely
across large region. The dense deployment of sensor nodes leads to high correlation of data in the
neighbourhood that are sensed by the nodes.
WSN has four design constraints, which are bandwidth, memory energy and consumption.
Because of its small size micro sensors could only be attached with bounded battery energy
supply. The WSN batteries are non rechargeable and/or irreplaceable. The memory limitation
allows them to perform with restricted computational functionality. The connectivity and
topology of WSNs may frequently vary due to the unreliability of the individual wireless micro-
sensors. Sensor nodes incur more errors since it uses wireless medium. The communication
environment is mostly noisy and can cause severe signal distortion. WSN is used for wide range
3. International Journal Of Advanced Smart Sensor Network Systems (IJASSN), Vol 3, No.2, April 2013
13
of tasks, such as target detection and tracking, environment monitoring, remote sensing, military
surveillance, etc., Requirements for the different applications may vary significantly. Privacy and
safety should be essential considerations in the design of WSNs because many of them are used
for surveillance or military purposes. The accuracy of data reported to what is actually occurring
in the environment represents the quality of WSN. The way to measure accuracy is the amount of
data. Latency is another aspect of accuracy. Data collected by WSNs are typically time sensitive,
e.g., early warning of fires. It is therefore important to receive the data at the destination/control
centre in a timely manner. With long latency may be outdated and lead to wrong reactions [6] due
to processing or communication data.
2. TAXONOMY FOR ROUTING PROTOCOLS
Classification of routing protocols for network structure is
2.1 Flat-based routing
In the flat based routing, feature of unique global identifier cannot be provided for each node
because of large number of nodes. Equal roles are assigned to deployed nodes in the networks.
Data-centric routing, where queries are given by the destination node to the particular region of
the nodes. Data is delivered after a delay period from the region of that particular sensed node.
Data request is based on queries, properties of the data is specifically necessary for this attribute
based naming. For e.g., SPIN, Rumour routing, DD and Gradient based routing (GBR).
2.2. Hierarchical-based routing (Cluster-based routing)
Sensor nodes can play different roles in the networks and the protocol is based on the cluster
creation. Cluster creation and specific task assignment to cluster head contributes the overall
system energy efficiency, scalability, and lifetime of the network. Hierarchical routing performs
aggregation and data fusion which in result decreases the number of information message
transmitted to the destination node. The hierarchical based routing gives an energy efficient way
of reducing the energy consumption in the cluster.
In addition to this, sensor nodes with different characteristics of data transmission are performed.
For e.g., Power-Efficient Gathering in Sensor Information Systems (PEGASIS), Low Energy
Adaptive Clustering Hierarchy (LEACH), Threshold-Sensitive Energy Efficient Protocols
(TEEN).
2.3. Location-based routing
Location based addressing of nodes is formed in this routing protocol. Distance between the node
A and the neighbour are estimated by calculating the signal strength or by GPS receivers. For
e.g., Geographic Adaptive Fidelity (GAF), Geographic and Energy Aware Routing (GEAR).
3. HIERARCHY BASED PROTOCOL
3.1. LEACH
LEACH (Low Energy Adaptive Clustering Hierarchy) is cluster-based protocol. It has distributed
cluster formation. In LEACH, the cluster head selection is random among the group of distributed
nodes. The role of cluster head is rotated to evenly distribute energy of the sensor nodes in the
networks. The operation of collecting the data from the sensor nodes and transmit it to the base
4. International Journal Of Advanced Smart Sensor Network Systems (IJASSN), Vol 3, No.2, April 2013
14
station is done by LEACH. Using LEACH the cluster head (CH) compress the information packet
received from different nodes within the same cluster and the aggregated data packet are
transmitted to the base station which reduces the size of the information to be transmitted to the
base station. The cluster head rotates, to avoid energy dissipation due to data transfer to the base
station. This leads to balanced energy consumption of the network, which in turn increases the
lifetime of the network [7]. This protocol uses the TDMA/CDMA medium access control (MAC)
which reduces collision in the inter-cluster and Intra-cluster data transmission. Centralized data
collection is done in a periodical basis. In this protocol, there happens constant monitoring of the
sensor nodes in the networks. Periodically data transmission will drain the limited energy of the
sensor nodes in the network. Since user does not need all the data instantaneously. Unnecessary
data transmission is avoided to save energy in sensor nodes. In addition to improvement in energy
density, energy consumption is reduced. Rotation of the cluster head is randomized after a period
of time. So that energy distributed in the sensor nodes will be even after a certain period of time.
LEACH is operated in two phases, the setup phase and the steady state phase. In the setup phase,
organized clusters and Cluster head selection takes place. In the steady state phase, the actual data
is transferred to the base station. The steady state phase duration is longer than the duration of the
setup phase to minimize the overhead. A predetermined fraction of nodes, p, elect themselves as
CHs as follow in the setup phases. Sensor node with the random number (r) is chosen between 0
and1. If the Compared random number is less than the threshold value, T (n), for the current
round then the node becomes a cluster-head. The threshold value is calculated based on the
desired percentage to become a cluster head, current round and nodes that has not appeared as a
cluster-head in the last (1/p) rounds, which is denoted by G.
T(n) =
P/(1 − p ∗ r mod If n G
0 Otherwise
(1)
Where G is the group of nodes involved in the cluster head selection process. After CH selection,
CH broadcasts an advertisement message as a new cluster-heads to the group of the sensor nodes
in the network [8]. Non-cluster head receives the advertisement message and from there it decides
which cluster they want to join. The advertisement the nodes are grouped based on the strength of
the advertisement. Member allocation takes place so that the non-cluster nodes inform the CH
that they will be a part of this cluster. Messages from different nodes are received by the CH that
it would like to be a part of the cluster, based on the number of nodes in the cluster. TDMA
schedule is created by the cluster-head nodes and each node is assigned with a time slot by which
it can transmit.
This schedule is being broadcasted to each and every node present in the cluster. Data is sensed
and transmitted to the cluster heads by the sensor nodes during the steady state phase. The cluster
head node receives all the data and then it aggregates all the data before sending the data to the
base station. After a definite period of time, which will be called as priori the network will go
back to the setup phase and then it will go for another round of selecting new CH. Cluster will use
different CDMA codes to communicate. This is done to reduce interference from nodes which
belong to other clusters. LEACH increases the network lifetime, but there will be a number of
issues for the assumptions used for this protocol.
The distance between two nodes i and j are calculated by using the equation 2. This distance is
calculated for the neighbour node selection [8].
Distance (i, j) = ((X − X )^2 + (Y − Y )^2) (2)
5. International Journal Of Advanced Smart Sensor Network Systems (IJASSN), Vol 3, No.2, April 2013
15
Received signal strength Indicator is calculated by using the equation 3.
RSSI = -(10 log + A) A (3)
Where n = signal propagation strength, d = Distance from the sender, A = Received signal
strength indicator at 1 meter distance. Based on distance (d), the n value decreases and value A
increases.
The main work of LEACH is to watch whether all nodes can transmit with sufficient power to
reach the BS if it is required to. With this each node will have computational power for
supporting different MAC protocols. But networks are not allowed to be deployed in large
regions. It predicts that nodes must always consist of data to send & the nodes which are located
nearby will have correlated data. The number of predetermined CH (p) need not be necessarily
distributed throughout the network uniformly. There could be a probability that the selected CHs
could be concentrated in any one part of the network [9]. Therefore there is a possibility that that
some nodes will not have any CH's in their vicinity. Moreover, the concept of dynamic clustering
brings an additional concept for eg., head changes, advertisements etc., which reduces the gain in
energy consumption. At last the protocols assure that all the nodes must begin with the same
amount of energy capacity in each of the selection round. It is assumed that CH will consume
almost the same amount of energy for each node. The protocol should extend to account for
non uniform energy nodes, i.e., by using energy-based threshold.
3.2TEEN and APTEEN
Two hierarchical routing protocols are proposed for time-critical applications namely TEEN
(Threshold-sensitive Energy Efficient sensor Network) and APTEEN (Adaptive Periodic
Threshold-sensitive Energy Efficient sensor Network protocol). They are energy efficient
hierarchy based routing protocol. They make use of a data centric mechanism. The medium is
sensed by the sensor nodes in the case of teens, whereas data transmission is done very rarely.
Within every cluster, one of the nodes is selected as cluster head. A cluster head is used to send
its members a hard threshold which results as the threshold value of the sensed attribute, that is
the minimum value of the sensed attribute to force the node to initiate transmission and a soft
threshold, which is actually a differential change in the value of sensed attribute that is used to
trigger the node to switch on its transmitter and it transmit. Now the hard threshold gets activated
and it tries to reduce the number of transmission by allowing the nodes to transmit only sensed
attribute[10] comes under the range of interest. The soft threshold in result reduces the number of
transmission otherwise it may happen when there is little or no change in sensed attribute. When
the value of soft threshold is small it gives a more perfect picture of the network with increased
energy consumption. Each cluster head gathers and aggregates the data received and transmits it
to the base station. In such cases, the user is able to control the trade-off between energy
efficiency and data accuracy. When cluster-heads are needed to be changed, new set of values are
broadcasted for the above parameters. TEEN is designed in such a way that it can react to the
sudden alterations of the sensed element [11]. The ultimate drawback of this scheme is that, if the
threshold is not received, the nodes can never communicate and the user will not be able to get
any sort of data from the network. The nodes will be sensing their environment continuously. For
the first time when a parameter from attribute set reaches its hard threshold value, the node will
switch its transmitter to on state and then it sends the sensed data. The sensed value is store in an
internal variable known as sensed value (sv). The nodes are able to transmit data in the period of
current cluster only if the following conditions are satisfied. The conditions are:- 1) The current of
the sensed attribute must be greater then the hard threshold. 2) The current value of the sensed
attribute must differ from SV by an amount equal to or greater than the soft threshold.
6. International Journal Of Advanced Smart Sensor Network Systems (IJASSN), Vol 3, No.2, April 2013
16
The important features of TEEN include its suitability for the time critical sensing applications.
Also, as message transmission will consume more energy than data sensing, the amount of energy
consumption in this scheme is less than the proactive networks. The soft threshold can also be
varied. For every cluster time change, a set of fresh parameters are broadcasted and so, the user
can change them as it is required. APTEEN is an extension of TEEN, which possess hybrid
protocol enabling both reactive and proactive functions. The periodicity and threshold values are
changed by APTEEN which is a hybrid protocol & are used in the TEEN protocol as per the user
needs & type of the application [12]. APTEEN incorporated query handling. The following
parameters are being broadcasted by the cluster heads in the APTEEN periodically.
1. ATTRIBUTE: - A set of physical parameters which is obtained by the user at his self interest.
2. THRESHOLDS: - Soft threshold (ST) and hard threshold (HT) are the two parameters of the
threshold.
3. SCHEDULE: - This is a TDMA schedule, which assigns slots to each node.
4. COUNT TIME (CT):- This is the maximum time period obtained between two successive
reports which is being sent by a node [12].
The environment will be sensed continuously by the nodes and only those nodes which sense a
data value at or beyond the hard threshold will transmit. Once a node is able to sense a value
beyond HT, it will transmit data only if the values of that attribute change by an amount that is
equal to or greater than ST. If in some case a node does not send data for a particular time period
which is equal to count time, it is forced to sense and retransmit the data. A TDMA schedule is
used and each and every node in the cluster is assigned to a transmission slot.
Hence APTEEN will use a modified TDMA schedule for implementing the hybrid network. The
main features of the APTEEN scheme will contain the following:- It will combine both the
proactive and reactive policies. It will also offer a lot of flexibility by allowing the user to set the
count-time interval (CT) and the threshold values for the energy consumption can be controlled
by changing the count time as well as the threshold values. The actual problem involved in using
the scheme is that it requires an additional complexity to implement the threshold functions and
the count time. The simulation of TEEN and APTEEN had shows that the two protocols had
outperformed LEACH. The APTEENs performance is somewhere between LEACH and TEEN in
terms of energy dissipation and network lifetime. As it decreases the number of transmissions,
TEEN always gives the best performance. The actual drawback of the two approaches are the
overhead and the complexity which will associate with forming clusters at multiple levels, the
method of implementing threshold based functions and the way to deal with attribute-based
naming of queries.
4. PROPOSED SK ALGORITHM
The approach of hierarchy based routing algorithm targets to conserve energy of the sensor
networks while clustering and reducing the number of hops for data transmission between
clusters. In cluster formation energy is the most significant parameter. Let the initial energy of
each node be considered as a constant of 8 joules. In this algorithm, every cluster has three cluster
heads and 70 nodes which are divided into two groups. Each group consist of a sub-cluster head
(CH) with 35 nodes. Thus a cluster is designed to have 2 sub cluster head and a master section
head. By gathering the data, Sub-cluster head check for event occurrence. If an event occurred
then sub-cluster head transmit the event occurred data to the master section head. The master
section head then transmits the data to the sink by multi-hop. More sensor nodes are used in a
single cluster in a predefined manner.
7. International Journal Of Advanced Smart Sensor Network Systems (IJASSN), Vol 3, No.2, April 2013
17
Figure 1 cluster with master section head
The energy of the network is calculated after the cluster formation, size of data packet
transmitted, and number of hops to reach the destination. All of them reflect the energy
consumed. Energy consumption is varied depending upon the hops and the amount of data
transmitted. Message communications is the number of communications occurred between any
pair of nodes while clustering the network. Hence in this proposed work cluster (as portrayed in
figure 1) consists of two cluster heads as Sub cluster heads and a master section head. The data
collected from the head is transmitted via a mobile agent. The mobile agent is created and passed
to all the cluster heads in the sink. The agent traverses to all the clusters sequentially in a serial
fashion. Each cluster contains a container, where the computation is carried out. The cluster head
collects the event driven data from the environment and computes the data. The computation
results are stored in the agent and the agent moves to the next cluster to collect its data. The agent
transfers the data to sink after it reaches the sink finally. After receiving the entire event driven
data, the sink destroys the agent. In the previous methodology of data transmission from the
cluster head to the sink takes place based on the amount of data, distance, number of hops and
time.
Minimum amount of data transmission is from CH to sink is around 60mw with the duration of
25ms. Proposed SK algorithm the mobile agent plays a role of data gathering with Zero loss of
energy from the cluster heads. Event driven data are out of 100 packets approximately 5 to10
packets, only those packets alone will be computed and transmitted by MA to the sink.
Table 1.Simulation parameters
Parameter Value
Node Deployment region 1000m X 1000m
Total number of clusters 3
Number of nodes in a cluster 70
Initial energy of the node 8Joules.
Energy used to transmit / receive the Data(
E )
50nJ/bit
Energy used by the amplifier (E ) 100pJ/bit
Data reception rate 87.23%
Sub Head election takes place When the residual energy of the sub head is
half of the Initial energy
8. International Journal Of Advanced Smart Sensor Network Systems (IJASSN), Vol 3, No.2, April 2013
18
= ( ∗ ) + ( ∗ ∗ ) (4)
= ( ∗ ) (5)
Amount of energy consumed for transmission and reception is shown in equation 4 and 5. Where
k is packet size of the data which is to be transmitted to a distance of d, E is energy spent by
the transmitter or receiver device, E is the energy spent for transmitter amplifier and k is the
number of bits transmitted.
Residual Energy = Total energy – (Energy consumption to transmit a data).
Energy consumed for the data that is transmitted is calculated for 50 bytes of data. In this
proposed work, computation for the cluster head and cluster formation has been reduced. In the
existing methodology, for each and every round the selected cluster head has to inform every
member node, that it is the cluster head by calculating the residual energy of all the nodes. Here,
in this algorithm, the cluster head selection takes places only when the cluster head loses its
residual energy below half of the initial energy level of CH. Thereby the complexity of cluster
head selection is much reduced. Energy consumption is varied depending upon the hops and the
amount of data transmitted. The deployment of more nodes is deployed in an area which will also
increase the sensing capability of the network. As each cluster consists of more sensing nodes,
number of clusters is reduced in this algorithm. Communication cost will also be decreased
because more nodes are used in moderate areas.
5. SIMULATION RESULTS
Network simulator (NS2) is used for the simulation of the proposed algorithm. NS2 is an event
simulator that consists of a package of tools that simulates behaviour of networks. It helps
creating network topologies, analyse and log events to understand the network behaviour.
According to the order of their scheduled occurrences events are queued and processed.
Each cluster consists of 70 nodes and three heads. Nodes are distributed with two groups and each
groups with sub heads. Energy consumption of 50 byte of data transmission is considered and
compared with the Leach protocol shown in Figure 2. For SK protocol the energy is efficient.
Figure 2.Energy consumption of nodes in different Hops
9. International Journal Of Advanced Smart Sensor Network Systems (IJASSN), Vol 3, No.2, April 2013
19
Here 50 bytes of data is transmitted for a single hop. The energy calculation is only based on the
data transmitted and it doesn’t include the energy consumption for routing setup phase. X-axis
represents the number of hops and Y-axis represents the energy consumption in joules. It shows
the energy consumption details for different hops with a constant data of 50 bytes.
Figure 3.Residual Energy Vs packet Transmitted with in a cluster
The figure 3 shows, the decrease in the residual energy of the sensor nodes as more packets are
received compared with Leach. The X-axis represents the number of data packets and Y-axis
represents the energy consumption in joules. As more and more data packets are received, the
residual energy of the nodes reduces.
The data packet which is sensed by node is passed to head, which in turn transmits to the base
station. This is considered in residual energy simulation in algorithm is shown in Figure 4.
Figure 4.Residual Energy Vs Data packet Transmitted to the BS
Each group consist of 35 nodes. Here the energy consumption of each group is shown. As the
network size increase the corresponding energy consumption for 500 bytes of data transmission
also increases. This is illustrated in figure 5. The X-axis represents number of nodes and the y-
10. International Journal Of Advanced Smart Sensor Network Systems (IJASSN), Vol 3, No.2, April 2013
20
axis represents the energy consumption in joules. The energy consumption for the data
transmission increases linearly with the size of the network. If the distance between the nodes
increases, the energy consumption is negligible increases.
Figure 5. Residual Energy Vs nodes for 500 bytes of data transmission.
The increase in the network size, results in an increase in the number of hops for transmission of
data as shown in figure 6. The X-axis represents the network size and the Y-axis represents the
number of hops depending on the timing. The increase in the network size will have a linear
impact in the number of hops of data transmission.
Figure 6.Network size VS Transmission Hops
The proposed SK algorithm is simulated using JADE. JADE is a software development
framework which supports graphical tools and act as a middle-ware. JAVA language is used for
implementation. JAVA is an object oriented programming language. Mobile agent is created in
the sink, passed to heads to collect the event occurred data. Then the agent computes and transmit
it to sink in tabulation is shown in figure7.
11. International Journal Of Advanced Smart Sensor Network Systems (IJASSN), Vol 3, No.2, April 2013
21
Figure7. Event occurred data is tabulated in sink
6. CONCLUSION
The energy efficient hierarchy based protocols which are proposed in this paper have resulted in a
significant improvement in the performance of the network over a centralised approach. As a
result of the algorithm proposed, where the initial energy of the nodes and cluster head are
defined, the energy consumed for the computation is less as shown in the simulation results.
Based on the cluster head selection proposed in this paper, the complexity of the network and its
energy consumption is much reduced. The nodes being deployed in large numbers within
moderate area, demonstrates the reduction in communication cost. This algorithm is extended
to use mobile agent for data transmission, which facilitates data gathering and data
transmission in an efficient manner. This reduces the complexity and the Latency.
REFERENCE
[1] Y. Xu, J. Heinemann and D. Estrin.“Geography-informed energy conservation for ad hoc routing”, In
Proceedings of the Seventh Annual International Conference on Mobile Computing and Networking
(MobiCom), 2001.
[2] Boulis A, Ganeriwal S and Srivastava M B,“ Aggregation in sensor networks: an Energy-Accuracy
Trade-Off” ,Elsevier journal of Ad Hoc Networks, 2003, 1(1), pp.317-331.
[3] C. Intanagonwiwat, R. Govindan andEstrin D. Directed diffusion: A scalable and
robustcommunication paradigm for sensor networks. In Proceedings of theSixth Annual
InternationalConference on Mobile Computing and Networks (MobiCom), 2000.
[4] Abdul Sattar Malik, Jingmingkuang,Jiakang Liu, Wang Chong, “Energy Consumption & Lifetime
Analysis in Cluster-based Wireless Sensor Networks for Periodic monitoring
Applications”,International conference on Network security, wireless Communications and trusted
computing, IEEE November2009, pp:657-661.
[5] KeyhanKhamforoosh, Hana Khamforoush, “A New Routing Algorithm for Energy Reduction in
Wireless sensor Networks”, IEEE conference 2009, pp: 505-509.
[6] Mohammad Ilyas and ImadMahgoub, “Handbook of Sensor Networks: Compact Wireless and Wired
sensing systems” by CRC press.
[7] M.J.Handy, M.Haase, D. Timmernann, “Low Energy Adaptive Clustering Hierarchy with
Deterministic Cluster-Head Selection”, International conference on University of Rostock ,2004,
PP:211-216.
12. International Journal Of Advanced Smart Sensor Network Systems (IJASSN), Vol 3, No.2, April 2013
22
[8] sudakshinadasgupta, paramarthadutta,”An improved LEACH approach for head selection stratergy in
a fuzzy-c means induced clustering of a wireless sensor network” IEMCON 2011 organised by IEM
to collaboration with IEEE on 5th and 6th of jan 2012,PP-203-208.
[9] T. Rappaport, Wireless Communications:Principles&Practice.EnglewoodCliffs,NJ: Prentice- Hall,
1996.
[10] J. Elson and D. Estrin, “An Address-Free Architecture for Dynamic Sensor Networks”. Technical
Report 00-724, Computer Science Department, USC, January 2000.
[11] DionisisKandris, PanagiotisTsioumas, Anthony Tzes, George Nikolakopoulos and Dimitrios D.
Vergados, “Power conservation through Energy Efficient Routing in Wireless sensor Networks”,
sensor journal, September 2009, PP: 7320-7342.
[12] W. B. Heinzelman. “Application-Specific Protocol Architectures for Wireless Networks”.PhD thesis,
Massachusetts Institute of Technology, June 2000.