The popularity of Wireless Sensor Networks (WSN) have increased rapidly and tremendously due to the vast potential of the sensor networks to connect the physical world with the virtual world. Since sensor devices rely on battery power and node energy and may be placed in hostile environments, so replacing them becomes a difficult task. Thus, improving the energy of these networks i.e. network lifetime becomes important. The thesis provides methods for clustering and cluster head selection to WSN to improve energy efficiency using fuzzy logic controller. It presents a comparison between the different methods on the basis of the network lifetime. It compares existing ABC optimization method with BFO algorithm for different size of networks and different scenario. It provides cluster head selection method with good performance and reduced computational complexity. In addition it also proposes BFO as an algorithm for clustering of WSN which would result in improved performance with faster convergence.
A Survey of Routing Protocols for Structural Health MonitoringIJEEE
Wireless sensor networks have emerged in recent years as a promising technology that can impact the field of structural monitoring and infrastructure asset management. Various routing protocols are used to define communication among sensor nodes of the wireless sensor network for purpose of disseminating information. These routing protocols can be designed to improve the network performance in terms of energy consumption, delay and security issues. This paper discusses the requirements of routing protocol for Structural health monitoring and presents summary of various routing protocols used for WSNs for Structural health monitoring.
Wireless Sensor Networks are highly distributed self-organized systems. WSN have been deployed in various fields. Now a day, Topology issues have received more and more attentions in Wireless Sensor Networks (WSN). While WSN applications are normally optimized by the given underlying network topology, another trend is to optimize WSN by means of topology control. In this area, a number of approaches have been invested, like network connectivity based topology control, cooperating schemes, topology directed routing, sensor coverage based topology control. Most of the schemes have proven to be able to provide a better network monitoring and communication performance with prolonged system lifetime. In this survey paper, I provide a full view of the studies in this area.
Information extraction from sensor networks using the Watershed transform alg...M H
Wireless sensor networks are an effective tool to provide fine resolution monitoring of the physical environment. Sensors generate continuous streams of data, which leads to several computational challenges. As sensor nodes become increasingly active devices, with more processing and communication resources, various methods of distributed data processing and sharing become feasible. The challenge is to extract information from the gathered sensory data with a specified level of accuracy in a timely and power-efficient approach. This paper presents a new solution to distributed information extraction that makes use of the morphological Watershed algorithm. The Watershed algorithm dynamically groups sensor nodes into homogeneous network segments with respect to their topological relationships and their sensing-states. This setting allows network programmers to manipulate groups of spatially distributed data streams instead of individual nodes. This is achieved by using network segments as programming abstractions on which various query processes can be executed. Aiming at this purpose, we present a reformulation of the global Watershed algorithm. The modified Watershed algorithm is fully asynchronous, where sensor nodes can autonomously process their local data in parallel and in collaboration with neighbouring nodes. Experimental evaluation shows that the presented solution is able to considerably reduce query resolution cost without scarifying the quality of the returned results. When compared to similar purpose schemes, such as “Logical Neighborhood”, the proposed approach reduces the total query resolution overhead by up to 57.5%, reduces the number of nodes involved in query resolution by up to 59%, and reduces the setup convergence time by up to 65.1%.
Adaptive Routing in Wireless Sensor Networks: QoS Optimisation for Enhanced A...M H
One of the key challenges for research in wireless sensor networks is the development of routing protocols that provide application-specific service guarantees. This paper presents a new cluster-based Route Optimisation and Load-balancing protocol, called ROL, that uses various quality of service (QoS) metrics to meet application requirements. ROL combines several application requirements, specifically it attempts to provide an inclusive solution to prolong network life, provide timely message delivery and improve network robustness. It uses a combination of routing metrics that can be configured according to the priorities of user-level applications to improve overall network performance. To this end, an optimisation tool for balancing the communication resources for the constraints and priorities of user applications has been developed and Nutrient-flow-based Distributed Clustering (NDC), an algorithm for load balancing is proposed. NDC works seamlessly with any clustering algorithm to equalise, as far as possible, the diameter and the membership of clusters. This paper presents simulation results to show that ROL/NDC gives a higher network lifetime than other similar schemes, such Mires++. In simulation, ROL/NDC maintains a maximum of 7\% variation from the optimal cluster population, reduces the total number of set-up messages by up to 60%, reduces the end-to-end delay by up to 56%, and enhances the data delivery ratio by up to 0.98% compared to Mires++.
A Survey of Routing Protocols for Structural Health MonitoringIJEEE
Wireless sensor networks have emerged in recent years as a promising technology that can impact the field of structural monitoring and infrastructure asset management. Various routing protocols are used to define communication among sensor nodes of the wireless sensor network for purpose of disseminating information. These routing protocols can be designed to improve the network performance in terms of energy consumption, delay and security issues. This paper discusses the requirements of routing protocol for Structural health monitoring and presents summary of various routing protocols used for WSNs for Structural health monitoring.
Wireless Sensor Networks are highly distributed self-organized systems. WSN have been deployed in various fields. Now a day, Topology issues have received more and more attentions in Wireless Sensor Networks (WSN). While WSN applications are normally optimized by the given underlying network topology, another trend is to optimize WSN by means of topology control. In this area, a number of approaches have been invested, like network connectivity based topology control, cooperating schemes, topology directed routing, sensor coverage based topology control. Most of the schemes have proven to be able to provide a better network monitoring and communication performance with prolonged system lifetime. In this survey paper, I provide a full view of the studies in this area.
Information extraction from sensor networks using the Watershed transform alg...M H
Wireless sensor networks are an effective tool to provide fine resolution monitoring of the physical environment. Sensors generate continuous streams of data, which leads to several computational challenges. As sensor nodes become increasingly active devices, with more processing and communication resources, various methods of distributed data processing and sharing become feasible. The challenge is to extract information from the gathered sensory data with a specified level of accuracy in a timely and power-efficient approach. This paper presents a new solution to distributed information extraction that makes use of the morphological Watershed algorithm. The Watershed algorithm dynamically groups sensor nodes into homogeneous network segments with respect to their topological relationships and their sensing-states. This setting allows network programmers to manipulate groups of spatially distributed data streams instead of individual nodes. This is achieved by using network segments as programming abstractions on which various query processes can be executed. Aiming at this purpose, we present a reformulation of the global Watershed algorithm. The modified Watershed algorithm is fully asynchronous, where sensor nodes can autonomously process their local data in parallel and in collaboration with neighbouring nodes. Experimental evaluation shows that the presented solution is able to considerably reduce query resolution cost without scarifying the quality of the returned results. When compared to similar purpose schemes, such as “Logical Neighborhood”, the proposed approach reduces the total query resolution overhead by up to 57.5%, reduces the number of nodes involved in query resolution by up to 59%, and reduces the setup convergence time by up to 65.1%.
Adaptive Routing in Wireless Sensor Networks: QoS Optimisation for Enhanced A...M H
One of the key challenges for research in wireless sensor networks is the development of routing protocols that provide application-specific service guarantees. This paper presents a new cluster-based Route Optimisation and Load-balancing protocol, called ROL, that uses various quality of service (QoS) metrics to meet application requirements. ROL combines several application requirements, specifically it attempts to provide an inclusive solution to prolong network life, provide timely message delivery and improve network robustness. It uses a combination of routing metrics that can be configured according to the priorities of user-level applications to improve overall network performance. To this end, an optimisation tool for balancing the communication resources for the constraints and priorities of user applications has been developed and Nutrient-flow-based Distributed Clustering (NDC), an algorithm for load balancing is proposed. NDC works seamlessly with any clustering algorithm to equalise, as far as possible, the diameter and the membership of clusters. This paper presents simulation results to show that ROL/NDC gives a higher network lifetime than other similar schemes, such Mires++. In simulation, ROL/NDC maintains a maximum of 7\% variation from the optimal cluster population, reduces the total number of set-up messages by up to 60%, reduces the end-to-end delay by up to 56%, and enhances the data delivery ratio by up to 0.98% compared to Mires++.
Information Extraction from Wireless Sensor Networks: System and ApproachesM H
Recent advances in wireless communication have made it possible to develop low-cost, and low power Wireless Sensor Networks (WSN). The WSN can be used for several application areas (e.g., habitat monitoring, forest fire detection, and health care). WSN Information Extraction (IE) techniques can be classified into four categories depending on the factors that drive data acquisition: event-driven, time-driven, query-based, and hybrid. This paper presents a survey of the state-of-the-art IE techniques in WSNs. The benefits and shortcomings of different IE approaches are presented as motivation for future work into automatic hybridization and adaptation of IE mechanisms.
This presentation is all about the wireless sensor networks, how they collect data using aggregation, and how they evaluate or calculate the parameters
Simulation Issues in Wireless Sensor Networks: A SurveyM H
This paper presents a survey of simulation tools and systems for wireless sensor networks. Wireless sensor network modelling and simulation methodologies are presented for each system alongside judgments concerning their relative ease of use and accuracy. Finally, we propose a mixed-mode simulation methodology that integrates a simulated environment with real wireless sensor network testbed hardware in order to improve both the accuracy and scalability of results when evaluating different prototype designs and systems.
Map as a Service: A Framework for Visualising and Maximising Information Retu...M H
This paper presents a distributed information extraction and visualisation service, called the mapping service, for maximising information return from large-scale wireless sensor networks. Such a service would greatly simplify the production of higher-level, information-rich, representations suitable for informing other network services and the delivery of field information visualisations. The mapping service utilises a blend of inductive and deductive models to map sense data accurately using externally available knowledge. It utilises the special characteristics of the application domain to render visualisations in a map format that are a precise reflection of the concrete reality. This service is suitable for visualising an arbitrary number of sense modalities. It is capable of visualising from multiple independent types of the sense data to overcome the limitations of generating visualisations from a single type of sense modality. Furthermore, the mapping service responds dynamically to changes in the environmental conditions, which may affect the visualisation performance by continuously updating the application domain model in a distributed manner. Finally, a distributed self-adaptation function is proposed with the goal of saving more power and generating more accurate data visualisation. We conduct comprehensive experimentation to evaluate the performance of our mapping service and show that it achieves low communication overhead, produces maps of high fidelity, and further minimises the mapping predictive error dynamically through integrating the application domain model in the mapping service.
ENERGY EFFICIENCY IN FILE TRANSFER ACROSS WIRELESS COMMUNICATION Editor IJCATR
The key idea of our Energy Efficiency management is to use the exchange between energy consumption vs the gain in responsibility, timeliness, and security to maximize the system helpful time period. we tend to formulate the exchange as Associate in Nursing optimization downside for dynamically crucial the most effective redundancy level to use to multipath routing for intrusion tolerance so the question response success likelihood is maximized whereas prolonging the helpful time period. Moreover, we think about this optimization downside for the case during which a voting-based distributed intrusion detection formula is applied to sight and evict malicious nodes during a HWSN. we over see to develop a novel likelihood model to investigate the most effective redundancy level in terms of path redundancy and supply redundancy, further because the best intrusion detection settings in terms of the amount of voters and the intrusion invocation interval below that the time period of a HWSN is maximized. we over see to then apply the analysis results obtained to the planning of a dynamic redundancy management formula to identify and apply the most effective style parameter settings at runtime in response to environmental changes, to maximize the HWSN lifetime.
An Analytical Model of Latency and Data Aggregation Tradeoff in Cluster Based...ijsrd.com
Sensor networks are collection of sensor nodes which co-operatively send sensed data to base station. As sensor nodes are battery driven, an efficient utilization of power is essential in order to use networks for long duration. Therefore it is needed to reduce data traffic inside sensor networks, thereby reducing the amount of data that is needed to send to base station. The main goal of data aggregation algorithms is to gather and aggregate data in an energy efficient manner so that network lifetime is enhanced. In wireless sensor network, periodic data sampling leads to enormous collection of raw facts, the transmission of which would rapidly deplete the sensor power. A fundamental challenge in the design of wireless sensor networks (WSNs) is to maximize their lifetimes. Data aggregation has emerged as a basic approach in WSNs in order to reduce the number of transmissions of sensor nodes, and hence minimizing the overall power consumption in the network. Data aggregation is affected by several factors, such as the placement of aggregation points, the aggregation function, and the density of sensors in the network. In this paper, an analytical model of wireless sensor network is developed and performance is analyzed for varying degree of aggregation and latency parameters. The overall performance of our proposed methods is evaluated using MATLAB simulator in terms of aggregation cycles, average packet drops, transmission cost and network lifetime. Finally, simulation results establish the validity and efficiency of the approach.
Lifetime optimization and security are two conflicting design issues for multi-hop wireless sensor networks (WSNs) with non-replenish able energy resources. In this paper, we first propose a novel secure and efficient Cost-Aware Secure Routing (CASER) protocol to address these two conflicting issues through two adjustable parameters
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
Transport layer protocol for urgent data transmission in wsneSAT Journals
Abstract wireless sensor networks is a growing class of highly dynamic, complex network environment on top of which a wide range of applications, such as habitat monitoring, object tracking, precision agriculture, building monitoring and military systems are built. The real time applications often generate urgent data and one-time event notifications that need to be communicated reliably. The successful delivery of such information has a direct effect on the overall performance of the system. Reliable communication is important for sensor networks. Urgent data transmission has been a serious problem for Wireless sensor networks. WSN face difficulties in handling urgent data like congestion and reliability due to their unique requirements and constraints. Various protocols for congestion avoidance and reliability achievement for WSN have been proposed recently. Few of them have also worked on congestion elimination. These protocols try to minimize the problem using different mechanism. This paper explores these mechanisms and tries to find their features and limitations which directed us for our research. Keywords: Congestion, Reliability, Transport layer Protocol, Urgent data transmission, Wireless Sensor Network.
Algorithmic Construction of Optimal and Load Balanced Clusters in Wireless Se...M H
This paper proposes a clustering algorithm - Ba-lanced Minimum Radius Clustering (BMRC) - for use in large scale, distributed Wireless Sensor Networks (WSN). Cluster balancing is an intractable problem to solve in a distributed manner, and distribution is important, by reason of both avoiding specialised node vulnerability and minimising message overhead.The BMRC algorithm described here distributes several of the cluster balancing functions to the cluster-heads. In proposing this algorithm, several tentative claims have been made for it, namely that it is suitable for arbitrary number of cluster heads; that its pecifies a way to elect cluster heads and use them to create the local models; that it accomplishes optimal balanced clusters in distributed manner; that it is scalable and it uses the number-of-hops as a clustering parameter; that it is energy efficient. These claims were studied and verified by simulation.
A Fault tolerant system based on Genetic Algorithm for Target Tracking in Wir...Editor IJCATR
In this paper, we explored the possibility of using Genetic Algorithm (GA) being used in Wireless Sensor Networks in general with
specific emphasize on Fault tolerance. In Wireless sensor networks, usually sensor and sink nodes are separated by long communication
distance and hence to optimize the energy, we are using clustering approach. Here we are employing improved K-means clustering algorithm to
form the cluster and GA to find optimal use of sensor nodes and recover from fault as quickly as possible so that target detection won’t be
disrupted. This technique is simulated using Matlab software to check energy consumption and lifetime of the network. Based on the
simulation results, we concluded that this model shows significant improvement in energy consumption rate and network lifetime than other
method such as Traditional clustering or Simulated Annealing
Survey of Wireless Sensor Network Applicationijsrd.com
Sensor networks offer a powerful combination of distributed sensing, computing and communication. They lend themselves to countless applications and, at the same time, offer numerous challenges due to their peculiarities, primarily the stringent energy constraints to which sensing nodes are typically subjected. The distinguishing traits of sensor networks have a direct impact on the hardware design of the nodes at least four levels: power source, processor, communication hardware, and sensors. Various hardware platforms have already been designed to test the many ideas spawned by the re-search community and to implement applications to virtually all fields of science and technology. We are convinced that CAS will be able to provide a substantial contribution to the development of this exciting field. A wireless sensor network (WSN) has important applications such as remote environmental monitoring and target tracking. This has been enabled by the availability, particularly in recent years, of sensors that are smaller, cheaper, and intelligent. These sensors are equipped with wireless interfaces with which they can communicate with one another to form a network. The design of a WSN depends significantly on the application, and it must consider factors such as the environment, the application's design objectives, cost, hardware, and system constraints. The goal of our survey is to present a comprehensive review of the recent literature since the publication of [I.F. Akyildiz, W. Su, Y. Sankarasubramaniam, E. Cayirci, A survey on sensor networks, IEEE Communications Magazine, 2002]. Following a top-down approach, we give an overview of several new applications and then review the literature on various aspects of WSNs. We classify the problems into three different categories: (1) Internal platform and underlying operating system, (2) Communication protocol stack, and (3) Network services, provisioning, and deployment. We review the major development in these three categories and outline new challenges.
Information Extraction from Wireless Sensor Networks: System and ApproachesM H
Recent advances in wireless communication have made it possible to develop low-cost, and low power Wireless Sensor Networks (WSN). The WSN can be used for several application areas (e.g., habitat monitoring, forest fire detection, and health care). WSN Information Extraction (IE) techniques can be classified into four categories depending on the factors that drive data acquisition: event-driven, time-driven, query-based, and hybrid. This paper presents a survey of the state-of-the-art IE techniques in WSNs. The benefits and shortcomings of different IE approaches are presented as motivation for future work into automatic hybridization and adaptation of IE mechanisms.
This presentation is all about the wireless sensor networks, how they collect data using aggregation, and how they evaluate or calculate the parameters
Simulation Issues in Wireless Sensor Networks: A SurveyM H
This paper presents a survey of simulation tools and systems for wireless sensor networks. Wireless sensor network modelling and simulation methodologies are presented for each system alongside judgments concerning their relative ease of use and accuracy. Finally, we propose a mixed-mode simulation methodology that integrates a simulated environment with real wireless sensor network testbed hardware in order to improve both the accuracy and scalability of results when evaluating different prototype designs and systems.
Map as a Service: A Framework for Visualising and Maximising Information Retu...M H
This paper presents a distributed information extraction and visualisation service, called the mapping service, for maximising information return from large-scale wireless sensor networks. Such a service would greatly simplify the production of higher-level, information-rich, representations suitable for informing other network services and the delivery of field information visualisations. The mapping service utilises a blend of inductive and deductive models to map sense data accurately using externally available knowledge. It utilises the special characteristics of the application domain to render visualisations in a map format that are a precise reflection of the concrete reality. This service is suitable for visualising an arbitrary number of sense modalities. It is capable of visualising from multiple independent types of the sense data to overcome the limitations of generating visualisations from a single type of sense modality. Furthermore, the mapping service responds dynamically to changes in the environmental conditions, which may affect the visualisation performance by continuously updating the application domain model in a distributed manner. Finally, a distributed self-adaptation function is proposed with the goal of saving more power and generating more accurate data visualisation. We conduct comprehensive experimentation to evaluate the performance of our mapping service and show that it achieves low communication overhead, produces maps of high fidelity, and further minimises the mapping predictive error dynamically through integrating the application domain model in the mapping service.
ENERGY EFFICIENCY IN FILE TRANSFER ACROSS WIRELESS COMMUNICATION Editor IJCATR
The key idea of our Energy Efficiency management is to use the exchange between energy consumption vs the gain in responsibility, timeliness, and security to maximize the system helpful time period. we tend to formulate the exchange as Associate in Nursing optimization downside for dynamically crucial the most effective redundancy level to use to multipath routing for intrusion tolerance so the question response success likelihood is maximized whereas prolonging the helpful time period. Moreover, we think about this optimization downside for the case during which a voting-based distributed intrusion detection formula is applied to sight and evict malicious nodes during a HWSN. we over see to develop a novel likelihood model to investigate the most effective redundancy level in terms of path redundancy and supply redundancy, further because the best intrusion detection settings in terms of the amount of voters and the intrusion invocation interval below that the time period of a HWSN is maximized. we over see to then apply the analysis results obtained to the planning of a dynamic redundancy management formula to identify and apply the most effective style parameter settings at runtime in response to environmental changes, to maximize the HWSN lifetime.
An Analytical Model of Latency and Data Aggregation Tradeoff in Cluster Based...ijsrd.com
Sensor networks are collection of sensor nodes which co-operatively send sensed data to base station. As sensor nodes are battery driven, an efficient utilization of power is essential in order to use networks for long duration. Therefore it is needed to reduce data traffic inside sensor networks, thereby reducing the amount of data that is needed to send to base station. The main goal of data aggregation algorithms is to gather and aggregate data in an energy efficient manner so that network lifetime is enhanced. In wireless sensor network, periodic data sampling leads to enormous collection of raw facts, the transmission of which would rapidly deplete the sensor power. A fundamental challenge in the design of wireless sensor networks (WSNs) is to maximize their lifetimes. Data aggregation has emerged as a basic approach in WSNs in order to reduce the number of transmissions of sensor nodes, and hence minimizing the overall power consumption in the network. Data aggregation is affected by several factors, such as the placement of aggregation points, the aggregation function, and the density of sensors in the network. In this paper, an analytical model of wireless sensor network is developed and performance is analyzed for varying degree of aggregation and latency parameters. The overall performance of our proposed methods is evaluated using MATLAB simulator in terms of aggregation cycles, average packet drops, transmission cost and network lifetime. Finally, simulation results establish the validity and efficiency of the approach.
Lifetime optimization and security are two conflicting design issues for multi-hop wireless sensor networks (WSNs) with non-replenish able energy resources. In this paper, we first propose a novel secure and efficient Cost-Aware Secure Routing (CASER) protocol to address these two conflicting issues through two adjustable parameters
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
Transport layer protocol for urgent data transmission in wsneSAT Journals
Abstract wireless sensor networks is a growing class of highly dynamic, complex network environment on top of which a wide range of applications, such as habitat monitoring, object tracking, precision agriculture, building monitoring and military systems are built. The real time applications often generate urgent data and one-time event notifications that need to be communicated reliably. The successful delivery of such information has a direct effect on the overall performance of the system. Reliable communication is important for sensor networks. Urgent data transmission has been a serious problem for Wireless sensor networks. WSN face difficulties in handling urgent data like congestion and reliability due to their unique requirements and constraints. Various protocols for congestion avoidance and reliability achievement for WSN have been proposed recently. Few of them have also worked on congestion elimination. These protocols try to minimize the problem using different mechanism. This paper explores these mechanisms and tries to find their features and limitations which directed us for our research. Keywords: Congestion, Reliability, Transport layer Protocol, Urgent data transmission, Wireless Sensor Network.
Algorithmic Construction of Optimal and Load Balanced Clusters in Wireless Se...M H
This paper proposes a clustering algorithm - Ba-lanced Minimum Radius Clustering (BMRC) - for use in large scale, distributed Wireless Sensor Networks (WSN). Cluster balancing is an intractable problem to solve in a distributed manner, and distribution is important, by reason of both avoiding specialised node vulnerability and minimising message overhead.The BMRC algorithm described here distributes several of the cluster balancing functions to the cluster-heads. In proposing this algorithm, several tentative claims have been made for it, namely that it is suitable for arbitrary number of cluster heads; that its pecifies a way to elect cluster heads and use them to create the local models; that it accomplishes optimal balanced clusters in distributed manner; that it is scalable and it uses the number-of-hops as a clustering parameter; that it is energy efficient. These claims were studied and verified by simulation.
A Fault tolerant system based on Genetic Algorithm for Target Tracking in Wir...Editor IJCATR
In this paper, we explored the possibility of using Genetic Algorithm (GA) being used in Wireless Sensor Networks in general with
specific emphasize on Fault tolerance. In Wireless sensor networks, usually sensor and sink nodes are separated by long communication
distance and hence to optimize the energy, we are using clustering approach. Here we are employing improved K-means clustering algorithm to
form the cluster and GA to find optimal use of sensor nodes and recover from fault as quickly as possible so that target detection won’t be
disrupted. This technique is simulated using Matlab software to check energy consumption and lifetime of the network. Based on the
simulation results, we concluded that this model shows significant improvement in energy consumption rate and network lifetime than other
method such as Traditional clustering or Simulated Annealing
Survey of Wireless Sensor Network Applicationijsrd.com
Sensor networks offer a powerful combination of distributed sensing, computing and communication. They lend themselves to countless applications and, at the same time, offer numerous challenges due to their peculiarities, primarily the stringent energy constraints to which sensing nodes are typically subjected. The distinguishing traits of sensor networks have a direct impact on the hardware design of the nodes at least four levels: power source, processor, communication hardware, and sensors. Various hardware platforms have already been designed to test the many ideas spawned by the re-search community and to implement applications to virtually all fields of science and technology. We are convinced that CAS will be able to provide a substantial contribution to the development of this exciting field. A wireless sensor network (WSN) has important applications such as remote environmental monitoring and target tracking. This has been enabled by the availability, particularly in recent years, of sensors that are smaller, cheaper, and intelligent. These sensors are equipped with wireless interfaces with which they can communicate with one another to form a network. The design of a WSN depends significantly on the application, and it must consider factors such as the environment, the application's design objectives, cost, hardware, and system constraints. The goal of our survey is to present a comprehensive review of the recent literature since the publication of [I.F. Akyildiz, W. Su, Y. Sankarasubramaniam, E. Cayirci, A survey on sensor networks, IEEE Communications Magazine, 2002]. Following a top-down approach, we give an overview of several new applications and then review the literature on various aspects of WSNs. We classify the problems into three different categories: (1) Internal platform and underlying operating system, (2) Communication protocol stack, and (3) Network services, provisioning, and deployment. We review the major development in these three categories and outline new challenges.
Comprehensive Review on Base Energy Efficient Routing ProtocolIJRES Journal
With the faster growing in electronics industry, small inexpensive battery powered wireless sensors have made an impact on the communications with the physical world. The Wireless Sensor Networks (WSN) consists of hundreds of sensor nodes which are resource constrained. WSN nodes monitor various physical and environmental conditions very cooperatively. WSN uses various nodes for the communication. WSN has become one of the interested areas in the field of research from last few years. To enhance the lifetime of the whole networks energy reduction is the necessary consideration for design and analyse of the clustering and routing protocols. This paper describes the study of various energy efficient routing protocols in WSNs which are important for their designing purpose so as to meet the various resource constraints.
Mobile Coordinated Wireless Sensor Networks with Fault-Tolerance for Structur...rahulmonikasharma
This paper introduces the Structural health monitoring (SHM) using Mobile Access Coordinated Wireless Sensor Network (MA-WSN) energy - efficient scheme for time sensitive applications. In Sensor Networks with Mobile Access points (SENMA), the mobile access points (MAs) traverse the network to collect information directly from each sensor. To organize disjoint nodes forming into small groups in high energy level, sensors are used in clustering methods, where each cluster has a coordinator referred as Cluster Head (CH). Early detection of failure CHs will reduce the data loss and provide possible minimal recovery efforts. Failure CHs are unable to connect to automatically organized another cluster head of access node and this access node collect and transfer data directly. So a new technique has been proposed in this paper which improves the life time of sensor nodes or it minimizes the maximum energy used by the sensor for transmitting data to the base station and also ensures monitoring quality. The performance of the proposed placement method has been tested by NS2 simulations and the result is compared with the sensor placement using effective independence method. This method obtains almost the same placement quality as that provided by using effective independence method, but with improvement in system life time.
Features of wsn and various routing techniques for wsn a surveyeSAT Publishing House
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology.
Features of wsn and various routing techniques for wsn a surveyeSAT Journals
Abstract A Wireless Sensor Network is the collection of large number of sensor nodes, which are technically or economically feasible and measure the ambient condition in the environment surrounding them. The difference between usual wireless networks and WSNs is that sensors are sensitive to energy consumption. Most of the attention is given to routing protocols, for energy awareness, since they might differ depending on the application and network architecture. Routing techniques for WSN are classified into three categories based on network structure: Flat, hierarchical and location-based routing. Furthermore, these protocols can be classified into multi-path based, query based, negotiation-based, QoS-based, and coherent–based, depending on the protocol operation. In this paper the survey of routing techniques in WSNs is shown. It is also outlined the design challenges and performance metrics for routing protocols in WSNs. Finally We also highlight the advantages and performance issues of different routing techniques by it’s comparative analysis. Future-directions for routing in sensor network is also described. Index Terms: Wireless sensor network, Routing techniques, Routing challenges and future directions.
CUTTING DOWN ENERGY USAGE IN WIRELESS SENSOR NETWORKS USING DUTY CYCLE TECHNI...ijwmn
A wireless sensor network is composed of many sensor nodes, that have beengiven out in a
specific zoneandeach of them hadanability of collecting information from the environment and
sending collected data to the sink. The most significant issues in wireless sensor networks,
despite the recent progress is the trouble of the severe limitations of energy resources.Since that
in different applications of sensor nets, we could throw a static or mobile sink, then all aspects of
such networks should be planned with an awareness of energy.One of the most significant topics
related to these networks, is routing. One of the most widely used and efficient methods of
routing isa hierarchy (based on clustering) method.
CUTTING DOWN ENERGY USAGE IN WIRELESS SENSOR NETWORKS USING DUTY CYCLE TECHNI...ijwmn
A wireless sensor network is composed of many sensor nodes, that have beengiven out in a
specific zoneandeach of them hadanability of collecting information from the environment and
sending collected data to the sink. The most significant issues in wireless sensor networks,
despite the recent progress is the trouble of the severe limitations of energy resources.Since that
in different applications of sensor nets, we could throw a static or mobile sink, then all aspects of
such networks should be planned with an awareness of energy.One of the most significant topics
related to these networks, is routing. One of the most widely used and efficient methods of
routing isa hierarchy (based on clustering) method.
In The present study with the objective of cutting down energy consumption and persistence of
network coverage, we have offered a novel algorithm based on clustering algorithms and multihop routing.To achieve this goal, first, we layer the network environment based on the size of the
network.We will identify the optimal number of cluster heads and every cluster head based on
the mechanism of topology control will start to accept members.Likewise, we set the first layer
as gate layer and subsequently identifying the gate’s nodes, we’d turn away half of the sensors
and then stop using energy and the remaining nodes in this layer will join the gate’s nodes
because they hold a critical part in bettering the functioning of the system. Cluster heads off
following layers send the information to cluster heads in the above layer until sent data will be
sent to gate’s nodes and finally will be sent to sink. We have tested the proposed algorithm in
two situations 1) when the sink is off and 2)when a sink is on and simulation data shows that
proposed algorithm has better performance in terms of the life span of a network than LEACH
and ELEACH protocols.
A NOVEL APPROACH FOR ENERGY EFFICIENT HIERARCHY BASED ROUTING IN SENSOR NETWO...cscpconf
Wireless sensor network (WSN) is the collection of many micro-sensor nodes, connecting each other by a
wireless medium. WSN exhibits different approaches to provide reliable sensing of the environment,
detecting and reporting events. In this paper, we have proposed an algorithm for hierarchy based protocols
of wireless sensor networks, which consist of two groups of sensor nodes in a single cluster node. Each
cluster consists of a three cluster head. The event driven data sensing mechanism is used in this paper and
this sensed data is transmitted to the master section head. Hence efficient way of data transmission is possible with larger group of nodes. In this approach, using hierarchy based protocols; the lifetime of the sensor network is increased.
EVENT DRIVEN ROUTING PROTOCOLS FOR WIRELESS SENSOR NETWORK- A SURVEYijcsa
Advances in embedded systems have resulted in the development of wireless sensor networks, which not
only provide unique opportunities for monitoring but also controlling homes, cities and the environments.
Recent advancements in wireless sensor network have resulted into many new protocols some of them are
specifically designed for sensor network for detecting the event and routing the event related information to
the base station in efficient manner. This paper surveys recent event driven routing protocols for wireless
sensor network. We have compared various event driven routing protocols using different parameters like
Sink Centric, Node Centric, Reliability, Congestion control, Energy Efficiency, Loss reliability and loss
recovery. We have also described LEACH and MECN protocols but as they are not e
Design Issues and Applications of Wireless Sensor Networkijtsrd
Efficient design and implementation of wireless sensor networks has become a hot area of research in recent years, due to the vast potential of sensor networks to enable applications that connect the physical world to the virtual world. By networking large numbers of tiny sensor nodes, it is possible to obtain data about physical phenomena that was difficult or impossible to obtain in more conventional ways. In future as advances in micro-fabrication technology allow the cost of manufacturing sensor nodes to continue to drop, increasing deployments of wireless sensor networks are expected, with the networks eventually growing to large numbers of nodes.Potential applications for such large-scale wireless sensor networks exist in a variety of fields, including medical monitoring, environmental monitoring, surveillance, home security, military operations, and industrial machine monitoring etc. G. Swarnalatha | R. Srilalitha"Design Issues and Applications of Wireless Sensor Network" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-1 | Issue-6 , October 2017, URL: http://www.ijtsrd.com/papers/ijtsrd4688.pdf http://www.ijtsrd.com/engineering/computer-engineering/4688/design-issues-and-applications-of-wireless-sensor-network/g-swarnalatha
Node Deployment in Homogeneous and Heterogeneous Wireless Sensor NetworkIJMTST Journal
Optimal sensor deployment is necessary condition in homogeneous and heterogeneous wireless sensor
network. Effective deployment of sensor nodes is a major point of concern as performance and lifetime of any
WSN. Proposed sensor deployment in WSN explore every sensor node sends its data to the nearest sink node
of the WSN. In addition to that system proposes a hexagonal cell based sensor deployment which leads to
optimal sensor deployment for both homogeneous and heterogeneous sensor deployment. Wireless sensor
networks are receiving significant concentration due to their potential applications ranging from surveillance
to tracking domains. In limited communication range, a WSN is divided into several disconnected sub-graphs
under certain conditions. We deploy sensor nodes at random locations so that it improves performance of the
network.This paper aims to study, discuss and analyze various node deployment strategies and coverage
problems for Homogeneous and Heterogeneous WSN.
An Efficient Approach for Data Gathering and Sharing with Inter Node Communi...cscpconf
In today’s era Wireless sensor networks (WSNs) have emerged as a solution for a wide range of
applications. Most of the traditional WSN architectures consist of static nodes which are densely deployed
over a sensing area. Recently, several WSN architectures based on mobile elements (MEs) have been
proposed. Most of them exploit mobility to address the problem of data collection in WSNs. The common
drawback among them is to data sharing between interconnected nodes. In this paper we propose an
Efficient Approach for Data Gathering and Sharing with Inter Node Communication in Mobile-Sink. Our
algorithm is divided into seven parts: Registration Phase, Authentication Phase, Request and Reply Phase,
Setup Phase, Setup Phase (NN), Data Gathering, and Forwarding to Sink. Our approach provides an
efficient way to handle data in between the intercommunication nodes. By the above approach we can
access the data from the node which is not in the list, by sharing the data from the node which is
approachable to the desired node. For accessing and sharing we need some security so that the data can
be shared between authenticated nodes. For this we use two way security approach one for the accessing
node and other for the sharing.
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
PROPOSED A HETEROGENEOUS CLUSTERING ALGORITHM TO IMPROVE QOS IN WSNIJCNCJournal
In this article it has presented leach extended hierarchical 3-level clustered heterogeneous and dynamics
algorithm. On suggested protocol (LEH3LA) with planning of selected auction cluster head, and
alternative cluster head node, problem of delay on processing, processing of selecting members, decrease
of expenses, and energy consumption, decrease of sending message, and receiving messages inside the
clusters, selecting of cluster heads in large sensor networks were solved. This algorithm uses hierarchical
heterogeneous network (3-levels), collective intelligence, and intra-cluster interaction for communications.
Also it will solve the problems of sending data in Multi-BS mobile networks, expanding inter-cluster
networks, overlap cluster, genesis orphan nodes, boundary change dynamically clusters, using backbone
networks, cloud sensor. Using sleep/wake scheduling algorithm or TDMA-schedule alternative cluster head
node provides redundancy, and fault tolerance. Local processing in cluster head nodes, and alternative
cluster head, intra-cluster and inter-cluster communications such as Multi-HOP cause increase on
processing speed, and sending data intra-cluster and inter-cluster. Decrease of overhead network, and
increase the load balancing among cluster heads. Using encapsulation of data method, by cluster head
nodes, energy consumption decrease during sending data. Also by improving quality of service (QoS) in
CBRP, LEACH, 802.15.4, decrease of energy consumption in sensors, cluster heads and alternative cluster
head nodes, cause increase on lift time of sensor networks.
Data Mining is a significant field in today’s data-driven world. Understanding and implementing its concepts can lead to discovery of useful insights. This paper discusses the main concepts of data mining, focusing on two main concepts namely Association Rule Mining and Time Series Analysis
A Review on Real Time Integrated CCTV System Using Face Detection for Vehicle...rahulmonikasharma
We are describes the technique for real time human face detection and counting the number of passengers in vehicle and also gender of the passengers.The Image processing technology is very popular,now at present all are going to use it for various purpose. It can be applied to various applications for detecting and processing the digital images. Face detection is a part of image processing. It is used for finding the face of human in a given area. Face detection is used in many applications such as face recognition, people tracking, or photography. In this paper,The webcam is installed in public vehicle and connected with Raspberry Pi model. We use face detection technique for detecting and counting the number of passengers in public vehicle via webcam with the help of image processing and Raspberry Pi.
Considering Two Sides of One Review Using Stanford NLP Frameworkrahulmonikasharma
Sentiment analysis is a type of natural language processing for tracking the mood of the public about a particular product or a topic and is useful in several ways. Polarity shift is the most classical task which aims at classifying the reviews either positive or negative. But in many cases, in addition to the positive and negative reviews, there still many neutral reviews exist. However, the performance sometimes limited due to the fundamental deficiencies in handling the polarity shift problem. We propose an Improvised Dual Sentiment Analysis (IDSA) model to address this problem for sentiment classification. We first propose a novel data expansion technique by creating sentiment-reversed review for each training and test review. We develop a corpus based method to construct a pseudo-antonym dictionary. It removes DSA’s dependency on an external antonym dictionary for review reversion. We conduct a range of experiments and the results demonstrates the effectiveness of DSA in addressing the polarity shift in sentiment classification. .
A New Detection and Decoding Technique for (2×N_r ) MIMO Communication Systemsrahulmonikasharma
The requirements of fifth generation new radio (5G- NR) access networks are very high capacity and ultra-reliability. In this paper, we proposed a V-BLAST2 × N_r MIMO system that is analyzed, improved, and expected to achieve both very high throughput and ultra- reliability simultaneously.A new detection technique called parallel detection algorithm is proposed. The performance of the proposed algorithm compared with existing linear detection algorithms. It was seen that the proposed technique increases the speed of signal transmission and prevents error propagation which may be present in serial decoding techniques. The new algorithm reduces the bit error probability and increases the capacity simultaneouslywithout using a standard STC technique. However, it was seen that the BER of systems using the proposed algorithm is slightly higher than a similar system using only STC technique. Simulation results show the advantages of using the proposed technique.
Broadcasting Scenario under Different Protocols in MANET: A Surveyrahulmonikasharma
A wireless network enables people to communicate and access applications and information without wires. This provides freedom of movement and the ability to extend applications to different parts of a building, city, or nearly anywhere in the world. Wireless networks allow people to interact with e-mail or browse the Internet from a location that they prefer. Adhoc Networks are self-organizing wireless networks, absent any fixed infrastructure. broadcasting of data through proper channel is essential. Various protocols are designed to avoid the loss of data. In this paper an overview of different broadcast protocols are discussed.
Sybil Attack Analysis and Detection Techniques in MANETrahulmonikasharma
Security is important for many sensor network applications. A particularly harmful attack against sensor and ad hoc networks is known as the Sybil attack [6], where a node Illegitimately claims multiple identities.Mobility cause a main problem when we talk about security in Mobile Ad-hoc networks. It doesn’t depend on fixed architecture, the nodes are continuously moving in a random fashion. In this article we will focus on identifying the Sybil attack in MANET. It uses air medium for communication so it is more prone to the attack. Sybil attack is one in which single node present multiple fake identities to other nodes, which cause destruction.
A Landmark Based Shortest Path Detection by Using A* and Haversine Formularahulmonikasharma
In 1900, less than 20 percent of the world populace lived in cities, in 2007, fair more than 50 percent of the world populace lived in cities. In 2050, it has been anticipated that more than 70 percent of the worldwide population (about 6.4 billion individuals) will be city tenants. There's more weight being set on cities through this increment in population [1]. With approach of keen cities, data and communication technology is progressively transforming the way city regions and city inhabitants organize and work in reaction to urban development. In this paper, we create a nonspecific plot for navigating a route throughout city A asked route is given by utilizing combination of A* Algorithm and Haversine equation. Haversine Equation gives least distance between any two focuses on spherical body by utilizing latitude and longitude. This least distance is at that point given to A* calculation to calculate minimum distance. The method for identifying the shortest path is specify in this paper.
Processing Over Encrypted Query Data In Internet of Things (IoTs) : CryptDBs,...rahulmonikasharma
Internet of Things (IoT) is the developing technologies that would be the biggest agents to modify the current world. Machine-to-machine communications perform with virtual, mobile and instantaneous connections. In IoT system, it consists of data-gathering sensors various other household devices. Intended for protecting IoT system, the end-to-end secure communication is a necessary measure to protect against unauthorized entities (e.g., modification attacks and eavesdropping,) and the data unprotected on the Cloud. The most important concern hereby is how to preserve the insightful information and to provide the privacy of user data. In IoT, the encrypted data computing is based on techniques appear to be promising approaches. In this paper, we discuss about the recent secure database systems, which are capable to execute SQL queries over encrypted data.
Quality Determination and Grading of Tomatoes using Raspberry Pirahulmonikasharma
In India cultivation of tomatoes is carried out by traditional methods and techniques. Today tremendous improvement in field of agriculture technologies and products can be seen. The tomatoes affect the overall production drastically. Image processing technique can be key technique for finding good qualities of tomatoes and grading. This work aimed to study different types of algorithms used for quality grading and sorting of fruit from the acquire image. In previous years several types of techniques are applied to analyses the good quality fruits. A simple system can be implemented using Raspberry pi with computer vision technology and image processing algorithms.
Comparative of Delay Tolerant Network Routings and Scheduling using Max-Weigh...rahulmonikasharma
Network management and Routing is supportively done by performing with the nodes, due to infrastructure-less nature of the network in Ad hoc networks or MANET. The nodes are maintained itself from the functioning of the network, for that reason the MANET security challenges several defects. Routing process and Scheduling is a significant idea to enhance the security in MANET. Other than, scheduling has been recognized to be a key issue for implementing throughput/capacity optimization in Ad hoc networks. Designed underneath conventional (LT) light tailed assumptions, traffic fundamentally faces Heavy-tailed (HT) assumption of the validity of scheduling algorithms. Scheduling policies are utilized for communication networks such as Max-Weight, backpressure and ACO, which are provably throughput optimality and the Pareto frontier of the feasible throughput region under maximal throughput vector. In wireless ad-hoc network, the issue of routing and optimal scheduling performs with time varying channel reliability and multiple traffic streams. Depending upon the security issues within MANETs in this paper presents a comparative analysis of existing scheduling policies based on their performance to progress the delay performance in most scenarios. The security issues of MANETs considered from this paper presents a relative analysis of existing scheduling policies depend on their performance to progress the delay performance in most developments.
DC Conductivity Study of Cadmium Sulfide Nanoparticlesrahulmonikasharma
The dc conductivity of consolidated nanoparticle of CdS has been studied over the temperature range from 303 K to 523 K and the conductivity has been found to be much larger than that of single crystals.
A Survey on Peak to Average Power Ratio Reduction Methods for LTE-OFDMrahulmonikasharma
OFDM (Orthogonal Frequency Division Multiplexing) is generally preferred for high data rate transmission in digital communication. The Long-Term Evolution (LTE) standards for the fourth generation (4G) wireless communication systems. Orthogonal Frequency Division Multiple Access (OFDMA) and Single Carrier Frequency Division Multiple Access (SC-FDMA) are the two multiple access techniques which are generally used in LTE.OFDM system has a major shortcoming of high peak to average power ratio (PAPR) value. This paper explains different PAPR reduction techniques and presents a comparison of the various techniques based on theoretical results. It also presents a survey of the various PAPR reduction techniques and the state of the art in this area.
IOT Based Home Appliance Control System, Location Tracking and Energy Monitoringrahulmonikasharma
Home automation has been a dream of sciences for so many years. It could wind up conceivable in twentieth century simply after power all family units and web administrations were begun being utilized on across the board level. The point of home robotization is to give enhanced accommodation, comfort, vitality effectiveness and security. Vitality checking and protection holds prime significance in this day and age in view of the irregularity between control age and request observing frameworks accessible in the market. Ordinarily, customers are disappointed with the power charge as it doesn't demonstrate the power devoured at the gadget level. This paper shows the outline and execution of a vitality meter utilizing Arduino microcontroller which can be utilized to gauge the power devoured by any individual electrical apparatus. The primary expectation of the proposed vitality meter is to screen the power utilization at the gadget level, transfer it to the server and build up remote control of any apparatus. So we can screen the power utilization remotely and close down gadgets if vital. The car segment is additionally one of the application spaces where vehicle can be made keen by utilizing "IOT". So a vehicle following framework is additionally executed to screen development of vehicles remotely.
Thermal Radiation and Viscous Dissipation Effects on an Oscillatory Heat and ...rahulmonikasharma
An anticipated outcome that is intended chapter is to investigate effects of magnetic field on an oscillatory flow of a viscoelastic fluid with thermal radiation, viscous dissipation with Ohmic heating which bounded by a vertical plane surface, have been studied. Analytical solutions for the quasi – linear hyperbolic partial differential equations are obtained by perturbation technique. Solutions for velocity and temperature distributions are discussed for various values of physical parameters involving in the problem. The effects of cooling and heating of a viscoelastic fluid compared to the Newtonian fluid have been discussed.
Advance Approach towards Key Feature Extraction Using Designed Filters on Dif...rahulmonikasharma
In fast growing database repository system, image as data is one of the important concern despite text or numeric. Still we can’t replace test on any cost but for advancement, information may be managed with images. Therefore image processing is a wide area for the researcher. Many stages of processing of image provide researchers with new ideas to keep information safe with better way. Feature extraction, segmentation, recognition are the key areas of the image processing which helps to enhance the quality of working with images. Paper presents the comparison between image formats like .jpg, .png, .bmp, .gif. This paper is focused on the feature extraction and segmentation stages with background removal process. There are two filters, one is integer filter and second one is floating point Filter, which is used for the key feature extraction from image. These filters applied on the different images of different formats and visually compare the results.
Alamouti-STBC based Channel Estimation Technique over MIMO OFDM Systemrahulmonikasharma
The examination on various looks into on MIMO STBC framework in order to accomplish the higher framework execution is standard that the execution of the remote correspondence frameworks can be improved by usage numerous transmit and get radio wires, that is normally gathered on the grounds that the MIMO procedure, and has been incorporated. The Alamouti STBC might be a promising because of notice the pick up inside the remote interchanges framework misuse MIMO. To broaden the code rate and furthermore the yield of the symmetrical zone time square code for more than 4 transmit reception apparatuses is examined. The outlined framework is beated once forced with M-PSK (i.e upto 32-PSK) regulation. The channel estimation examine in these conditions.
Empirical Mode Decomposition Based Signal Analysis of Gear Fault Diagnosisrahulmonikasharma
A vibration investigation is about the specialty of searching for changes in the vibration example, and after that relating those progressions back to the machines mechanical outline. The level of vibration and the example of the vibration reveal to us something about the interior state of the turning segment. The vibration example can let us know whether the machine is out of adjust or twisted. Al-so blames with the moving components and coupling issues can be distinguished. This paper shows an approach for equip blame investigation utilizing signal handling plans. The information has been taken from college of ohio, joined states. The investigation has done utilizing MATLAB software.
This paper discusses a new algorithm of a univariate method, which is vitally important to develop a short-term load forecasting module for planning and operation of distribution system. It has many applications including purchasing of energy, generation and infrastructure development etc. We have discussed different time series forecasting approaches in this paper. But ARIMA has proved itself as the most appropriate method in forecasting of the load profile for West Bengal using the historical data of the year of 2017. Auto Regressive Integrated Moving Average model gives more accuracy level of load forecast than any other techniques. Mean Absolute Percentage Error (MAPE) has been calculated for the mentioned forecasted model.
Impact of Coupling Coefficient on Coupled Line Couplerrahulmonikasharma
The coupled line coupler is a type of directional coupler which finds practical utility. It is mainly used for sampling the microwave power. In this paper, 3 couplers A,B & C are designed with different values of coupling coefficient 6dB,10dB & 18dB respectively at a frequency of 2.5GHz using ADS tool. The return loss, isolation loss & transmission loss are determined. The design & simulation is done using microstrip line technology.
Design Evaluation and Temperature Rise Test of Flameproof Induction Motorrahulmonikasharma
The ignition of flammable gases, vapours or dust in presence of oxygen contained in the surrounding atmosphere may lead to explosion. Flameproof three phase induction motors are the most common and frequently used in the process industries such as oil refineries, oil rigs, petrochemicals, fertilizers, etc. The design of flameproof motor is such that it allows and sustain explosion within the enclosure caused by ignition of hazardous gases without transmitting it to the external flammable atmosphere. The enclosure is mechanically strong enough to withstand the explosion pressure developed inside it. To prevent an explosion due to hot spot on the surface of the motor, flameproof induction motors are subjected to heat run test to determine the maximum surface temperature and temperature class with respect to the ignition temperature of the surrounding flammable gas atmosphere. This paper highlights the design features of flameproof motors and their surface temperature classification for different sizes.
KuberTENes Birthday Bash Guadalajara - K8sGPT first impressionsVictor Morales
K8sGPT is a tool that analyzes and diagnoses Kubernetes clusters. This presentation was used to share the requirements and dependencies to deploy K8sGPT in a local environment.
Harnessing WebAssembly for Real-time Stateless Streaming PipelinesChristina Lin
Traditionally, dealing with real-time data pipelines has involved significant overhead, even for straightforward tasks like data transformation or masking. However, in this talk, we’ll venture into the dynamic realm of WebAssembly (WASM) and discover how it can revolutionize the creation of stateless streaming pipelines within a Kafka (Redpanda) broker. These pipelines are adept at managing low-latency, high-data-volume scenarios.
Using recycled concrete aggregates (RCA) for pavements is crucial to achieving sustainability. Implementing RCA for new pavement can minimize carbon footprint, conserve natural resources, reduce harmful emissions, and lower life cycle costs. Compared to natural aggregate (NA), RCA pavement has fewer comprehensive studies and sustainability assessments.
HEAP SORT ILLUSTRATED WITH HEAPIFY, BUILD HEAP FOR DYNAMIC ARRAYS.
Heap sort is a comparison-based sorting technique based on Binary Heap data structure. It is similar to the selection sort where we first find the minimum element and place the minimum element at the beginning. Repeat the same process for the remaining elements.
NUMERICAL SIMULATIONS OF HEAT AND MASS TRANSFER IN CONDENSING HEAT EXCHANGERS...ssuser7dcef0
Power plants release a large amount of water vapor into the
atmosphere through the stack. The flue gas can be a potential
source for obtaining much needed cooling water for a power
plant. If a power plant could recover and reuse a portion of this
moisture, it could reduce its total cooling water intake
requirement. One of the most practical way to recover water
from flue gas is to use a condensing heat exchanger. The power
plant could also recover latent heat due to condensation as well
as sensible heat due to lowering the flue gas exit temperature.
Additionally, harmful acids released from the stack can be
reduced in a condensing heat exchanger by acid condensation. reduced in a condensing heat exchanger by acid condensation.
Condensation of vapors in flue gas is a complicated
phenomenon since heat and mass transfer of water vapor and
various acids simultaneously occur in the presence of noncondensable
gases such as nitrogen and oxygen. Design of a
condenser depends on the knowledge and understanding of the
heat and mass transfer processes. A computer program for
numerical simulations of water (H2O) and sulfuric acid (H2SO4)
condensation in a flue gas condensing heat exchanger was
developed using MATLAB. Governing equations based on
mass and energy balances for the system were derived to
predict variables such as flue gas exit temperature, cooling
water outlet temperature, mole fraction and condensation rates
of water and sulfuric acid vapors. The equations were solved
using an iterative solution technique with calculations of heat
and mass transfer coefficients and physical properties.
Literature Review Basics and Understanding Reference Management.pptxDr Ramhari Poudyal
Three-day training on academic research focuses on analytical tools at United Technical College, supported by the University Grant Commission, Nepal. 24-26 May 2024
1. International Journal on Recent and Innovation Trends in Computing and Communication ISSN: 2321-8169
Volume: 5 Issue: 8 93 – 98
_______________________________________________________________________________________________
93
IJRITCC | August 2017, Available @ http://www.ijritcc.org
_______________________________________________________________________________________
Energy Consumption Minimization in WSN using BFO
Nidhi Malik
CSE Department
N.C College of Engineering
Israna, Panipat
nidhimalik63@gmail.com
Anju Bhandari
HOD & Assistant Professor, CSE Department
N.C College of Engineering
Israna, Pnipat
er.anjugandhi@gmail.com
Abstract— The popularity of Wireless Sensor Networks (WSN) have increased rapidly and tremendously due to the vast potential of the sensor
networks to connect the physical world with the virtual world. Since sensor devices rely on battery power and node energy and may be placed in
hostile environments, so replacing them becomes a difficult task. Thus, improving the energy of these networks i.e. network lifetime becomes
important. The thesis provides methods for clustering and cluster head selection to WSN to improve energy efficiency using fuzzy logic
controller. It presents a comparison between the different methods on the basis of the network lifetime. It compares existing ABC optimization
method with BFO algorithm for different size of networks and different scenario. It provides cluster head selection method with good
performance and reduced computational complexity. In addition it also proposes BFO as an algorithm for clustering of WSN which would result
in improved performance with faster convergence.
Keywords— Wireless sensor network, ABC, BFO Algorithm.
__________________________________________________*****_________________________________________________
I. INTRODUCTION
A. Wireless Sensor Networks
Sensor nodes offer a powerful mixture of distributed
sensing, computing and verbal exchange. The ever-
increasing skills of those tiny sensor nodes, which include
sensing, statistics processing, and speaking, allow the belief
of WSNs primarily based at the collaborative attempt of a
number of other sensor nodes. They allow an extensive
range of programs and, at the equal time, provide numerous
challenges because of their peculiarities, basically the
stringent electricity constraints to which sensing nodes are
generally subjected. WSNs comprise knowledge and
technologies from 3 unique fields; Wireless
communications, networking and Systems and Control
theory. In order to understand the existing and potential
applications for WSNs, state-of-the-art and extraordinarily
green communication protocols are required. This chapter
offers a first advent to the WSNs, consisting of structure,
specific traits and packages.Much more important to
detector network operation is electricity-performance, that
dictates community period of time, and also the high level
QoS, or fidelity, that's met over the direction of the network
period of time. This QoS is application-precise and will be
measured variety of various strategies. For instance, in a
normal police investigation utility, it should be needed that
one detector stays active inside every sub location of the
network, so as that any entrant is also detected with High
chance. During this scenario, QoS may be delineated by
means that of the share of the environment that's genuinely
blanketed by spirited sensors. in a very normal trailing
application, this QoS may be the anticipated accuracy of the
goal space estimation provided by means that of the
community.
Figure 1.1 Wireless Sensor Networking
B. Network Protocols
When we style the network protocols for a Wi-Fi detector
networks, then numerous sorts of key parts area unit to be
thought about. Initial and main, thanks to the scarce power
assets, routing choices ought to
be guided through a number of awareness of the ability
resources within the network. Moreover, detector networks
area unit explicit from fashionable advert hoc networks
therein contact channels oft exist between activities and
sinks, in situ of between man or girl supply nodes and sinks.
The sink node(s) area unit ordinarily larger interested in
associate degree traditional description of the environment,
as hostile specific readings from the individual detector
devices. Thus, communication in detector networks is
usually referred to as statistics-centric, rather than cope
with-centric, and records could also be aggregate regionally
as hostile having all raw records sent to the sink(s). These
specific functions of detector networks have implications
within the community layer and so need a re-taking under
consideration protocols for statistics routing. In addition,
sensors typically have understanding in their personal space
as how to meaningfully investigate their facts. These
neighborhood facts could also be applied among the
network layer for routing functions. Finally, if a detector
2. International Journal on Recent and Innovation Trends in Computing and Communication ISSN: 2321-8169
Volume: 5 Issue: 8 93 – 98
_______________________________________________________________________________________________
94
IJRITCC | August 2017, Available @ http://www.ijritcc.org
_______________________________________________________________________________________
network is correctly connected (i.e., above is required to
produce communication paths), topology management
services need to be used at the aspect of the everyday
routing protocols.
1) Clustering for knowledge Aggregation
As detector networks area unit foretold to scale to massive
numbers of nodes, protocol measurability could be a crucial
style criterion. If the sensors area unit managed directly by
victimization the bottom station, communication overhead,
management delay, and management complexness end up to
be limiting parts in community performance. Clump has
been planned with the help of researchers to establishment a
number of sensors, ordinarily within a geographic
neighborhood, to form a cluster that's controlled by
approach of a cluster head. A hard and fast or adaptive
technique could also be used for cluster maintenance.
Support many critical network features inside a cluster,
which includes channel access for cluster contributors and
energy control, in addition to among clusters, consisting of
routing and code separation to avoid inter-cluster
interference. Moreover, clustering distributes the control
duty from the bottom station to the cluster heads, and gives
a handy framework for records fusion, local selection
making and local control, and strength savings.
The important purpose of WSNs protection is to protect the
wireless sensing element networks from any sorts of attack.
Completely different the various} application eventualities
provided within the sooner phase denote those WSNs may
additionally have terribly different residences. Thus,
considering the accepted protection necessities and
application state of affairs the algorithmic program is
developed to relaxed a WSN. The foremost homes that
created the security mechanism exhausting in WSNs are aid
constraints, operational surroundings and unreliable spoken
communication, which might be mentioned at a lower place.
Resource constraint Resource constraints: it is commonly
assumed that sensing element nodes are very resource
restricted. For associate degree example, the Berkeley
MICA2motes and TMotemini are offered in Table 1.3 [36]
[37]. Thus, protection protocols for WSNs need to be
possible supported to be had hardware and notably ought to
be terribly economical in phrases of strength consumption
and execution time.
II. PROPOSED WORK
Wireless sensor network (WSN) is a very fast evolving
technological platform having tremendous applications
scopes in several domains for examplehealth monitoring,
agriculture, military, structural monitoring, homenetworks
and many more.A WSN contains substantial number
ofsmall-size sensor nodes with low power consumption and
must be capable of detecting physical phenomena for
example constrained in energy supply, bandwidth and
processing power. In our work, we implemented Bacterial
Foraging Optimization (BFO) algorithm in a cluster-based
routing protocol based on Sugeno fuzzy inference system.As
in a given populations of nodes clustering can be done by
different techniques such as FCM, Kmeans, Cmeans etc. We
have used Kmeans for clustering as it is efficient and fast.
After clustering centroid of clusters chosen. In the cluster-
based protocols Cluster Heads (CHs) are generally selected
among all sensor nodes from pool of nodes who is reliable
to maintain cluster work, and then, clusters are made
byassigning each node to the nearest CH. The major
limitation is to generate an inappropriate distribution of CHs
over WSN. The main steps of our work can be summarized
as follows:
• An optimized Sugeno fuzzy inference system (FIS) is
proposed as an efficient and fast, application specific routing
protocol in Wireless Sensor Network environment. We have
designed three membershipfunctions with 27 set of rules in
Sugeno
• K-means algorithm is utilized to form balanced clusters
over the network.
• An objective function is made to calculate residual energy
(RE), distance of node from sink (DNS), distance of node
from centroid (DNC). Position of centroid is calculated by
Kmeans algorithm. Objective function also finds position of
Cluster Head on the basis of fuzzy inference system.
• Bacterial Foraging Optimization (BFO) algorithm is
implemented to optimize the fuzzy rules of FIS file in order
to prolong the network lifetime, based on the different
applicationspecifications.Flow chart of our work is given
below for easy understanding.
A. FUZZY LOGIC INFERENCE SYSTEM
As the fuzzy inference system FIS can achieve a better
combination of the all input parameters to obtain the optimal
output. So a Sugeno FIS is constructed in MATLAB. The
fuzzy controller consists of three parts: first is fuzzification
in which real environment variables are converted to fuzzy
variables, second is inference model which inherits the rule
sets or decision variables and third is defuzzifications which
reverse the fuzzy variables to environment variables. These
are:
1. Residual energy of node (RE)
2. Distance of node from sink of cluster (DNS)
3. Distance of node from centroid of cluster (DNC)
The three input signals are fuzzified and represented in
fuzzy set notations by membership functions. The defined
‗if … then …‘ rules produce the linguistic variables and
these variables are defuzzified into control signals for
comparison. Fuzzy logic control involves three steps:
fuzzification, decision-making using FIS and
defuzzification. Fuzzification transforms the non-fuzzy
(numeric) input variable measurements into the fuzzy set
(linguistic) variable that is a clearly defined boundary. In the
proposed controller, the RE, DNS and DNC are defined by
linguistic variables such as LOW, MED, HIGH
characterized by memberships. The memberships are curves
that define how each point in the input space is mapped to a
membership value between 0 to 1 for RE and -1 to 1 for
DNC and DNS. The membership functions belonging to the
other phases are trapezoidal Membership functions for the
inputs are shown in Fig.2.1.
3. International Journal on Recent and Innovation Trends in Computing and Communication ISSN: 2321-8169
Volume: 5 Issue: 8 93 – 98
_______________________________________________________________________________________________
95
IJRITCC | August 2017, Available @ http://www.ijritcc.org
_______________________________________________________________________________________
Figure 2.1: Membership function of input RE
1) Calculation of Residual Energy of each node
In every round, the nodes sense the WSN environment and
send the obtained information to the sink. The sink is
responsible for receiving the data from nodes, and sending
this information to the user end. All nodes have the same
capabilities of sensing, processing and communicating. Each
node can communicate directly with the sink and with other
nodes. All nodes are equipped with GPS devices, so they are
aware of their own location as well as the location of the
sink. The first order radio communication is used to model
the dissipated energy. In this model, a radio dissipates
𝐸𝑒𝑙𝑒𝑐 × 𝑙 to run either the transmitter or the receiver
circuitry. The energy consumption for transmitter and𝑙 bit
data packet with distance 𝑑 can be formulated as equation
15.
𝐸 𝑇𝐷(𝑙 × 𝑑) =
𝑙 × 𝐸𝑒𝑙𝑒𝑐 + 𝑙 × 𝜀𝑓𝑠 × 𝑑2
𝑖𝑓 𝑑 ≤ 𝑑0
𝑙 × 𝐸𝑒𝑙𝑒𝑐 + 𝑙 × 𝜀 𝑎𝑚𝑝 × 𝑑4
𝑖𝑓 𝑑 > 𝑑0
15
𝐸 𝑅𝑋 (𝑙) = 𝑙 × 𝐸𝑒𝑙𝑒𝑐
Where 𝐸𝑒𝑙𝑒 𝑐 is the dissipated energy (per bit) in every
transmitter and receiver circuit, and depends on such
electronics factors as digital coding, modulation, filtering
and spreading of the signal. The amplifier parameter used
for free space and multipath environment 𝜀𝑓𝑠 and
𝜀 𝑎𝑚𝑝 respectively. The distance threshold 𝑑0 is defined as
𝑑0 = 𝜀𝑓𝑠 /𝜀 𝑎𝑚𝑝
2) Performance evaluation:
An overall clustering is firstly performed via Kmeans and
then a CH is selected within the each cluster. In order to
demonstrate the effectiveness of the proposed, the maximum
and standard deviation of intra-cluster distance are used to
compare by BFO and ABC algorithms.The standard
deviation of intra-cluster distance can be expressed as
𝑆𝑇𝐷𝑐𝑙 =
1
𝑁
(𝑥𝑖
𝑁
𝑖=1
𝑀
𝐽=1
𝑎𝑖𝑗 − 𝑐𝑗 )2
Where,𝑎𝑖𝑗 is binary parameter determining whether node i
belongs to cluster j or not. In order to demonstrate the
effectiveness of the BFO, simulation results of the both
algorithm are compared for 50mx50m , 100mx100m and
200x200m geographical area. The base station located at the
centre of the network. All sensors have the same initial
energy. Table 1.1 presents the network details.
Table 1.1Network details
Parameter Value
Initial energy 1 J
𝐸𝑒𝑙𝑒𝑐 50 nJ/bit
𝐸𝑓𝑠 100 pJ/bit/𝑚2
𝐸𝑎𝑚𝑝 0.013pJ/bit/𝑚2
Data packet size 4000 bit
Control packet
size
50 bit
B. FUZZY LOGIC TUNED WITH BFO
1) Description
In previous section we discuss the fuzzy logic decided
output on the basis of three inputs RE, DNS, DNC
membership functions. In figures 2.2-2.4 membership range
of three inputs are defined. In the given fuzzy system, the
number of fuzzy memberships for the each input is 3 (Low,
Medium, and High). So, the number of fuzzy rules is
3×3×3=27.We tuned the membership function range based
on the input conditions and bacterial foraging optimization
(BFO algorithm. In BFO Bacteria move in random direction
in search of its food which takes time into convergence of
BFO.
2) Algorithm Steps
A step by step algorithm for the proposed work is given as:
STEP1. Initialize the node population random positions and
directions of bacteria.
STEP2. Apply Kmeans clustering technique to make
clusters of nodes and their centroids.
STEP3. Create an objective function which can calculate
RE, DNS. DNC and also choose CH on the basis of RE
and calculates mean RE of clusters and total node
population.
STEP4. Create a Fuzzy Inference System FIS using Sugeno
function for three inputs RE,DNS,DNC and make their
membership function and rule set to decide output.
STEP5. Initialize random positions and directions of
bacteria in BFO
STEP6. Consider the searching space dimension as number
of membership function values to be tuned which is 15
in our case.
STEP7. Initialize the chemotactic, swarming, reproduction
and dispersion steps. The initial step size of bacteria is
taken as 0.005.
STEP8. In each chemotactic step, for every bacteria fitness
function is and position of bacteria is updated by
position updating formula. It is
𝑛𝑒𝑤 𝑝𝑜𝑠 = 𝑜𝑙𝑑 𝑝𝑜𝑠 + 𝑠𝑡𝑒𝑝 𝑠𝑖𝑧𝑒
×
𝑑𝑖𝑟𝑒𝑐𝑡𝑖𝑜𝑛
𝑑𝑖𝑟𝑒𝑐𝑡𝑖𝑜𝑛 ∗ 𝑑𝑖𝑟𝑒𝑐𝑡𝑖𝑜𝑛′
STEP9. In swarming step the previous fitness function
output is compared with the next position output of same
bacteria. If found less then position of bacteria is
updated again by formula given in step 5.
4. International Journal on Recent and Innovation Trends in Computing and Communication ISSN: 2321-8169
Volume: 5 Issue: 8 93 – 98
_______________________________________________________________________________________________
96
IJRITCC | August 2017, Available @ http://www.ijritcc.org
_______________________________________________________________________________________
STEP10. The present position of bacteria is termed as
current values of membership functions.
STEP11. The chemo tactic and swarming loop continues till
all initialized steps are completed. In each loop BFO
updates the direction of bacteria and move the bacteria
into the direction of fast convergence.
STEP12. Reproduction steps take place for bacteria with
high fitness function values.
STEP13. To disperse or kill the weak bacteria, a probability
of 0.25 is defined as the deciding probability. If random
probability is higher than it, bacteria is dispersed or vice
versa.
STEP14. Result will be positions of bacteria with minimum
fitness function output. These positions are membership
function‘s tuned variables for fuzzy logic controller.
Following these steps in optimization of BFO, optimal
values of fuzzy controller membership function is achieved
in our work.
III. RESULTS & DISCUSSION
In our work we have proposed a technique for increasing the
lifetime of a wireless sensor network (WSN) using fuzzy
logic controller and BFO optimisation algorithm the
proposed work is implemented in MATLAB R 2016a. The
basic description of MATLAB is given in appendix. We
have developed our code in modules and are named as per
their functions.
Table 1.2: input variables set in GSA optimization
Input Value
Total number of nodes 100
Total no. of clusters 3
Range for RE [0,1]
Range for DNS [-1,0]
Range for DNC [-1,0]
1. Create X no of nodes in wireless sensor network to
make WSN environment. Divide in 3 clusters using
Kmeans clustering technique.
2. Create Fuzzy inference system (FIS) file using
three inputs and three membership functions of
each inputs with a set of 27 rules to choose output.
3. Apply BFO algorithm to tune input parameters of
FIS.
4. Apply ABC algorithm to tune input parameters of
FIS.
5. Comparison of results of both BFO and ABC.
Case-1 When Geographical area is 50mx50m
When geographical area is 50 m2
then we calculated and
observed imapct of BFO and ABC algorithm on increasing
the lifetime of WSN.
Here are results of this case:
Figure 3.1 Nodes in cluster in geographical area of 50 m2
Figure 3.2 RE plot of BFO and ABC
Figure 3.3 Standard deviation of cluster distance
Table1.3 Cluster-wise comparsion for BFO and ABC for
case-1
Case-
1
50m2
Cluster 1 Cluster 2 Cluster 3
BFO 8.75456456141063 13.6266384294770 26.4814014635824
ABC 8.00970696477768 11.3888740950478 23.3974753421539
Case-2 When Geographical area is 100mx100m
When geographical area is 100 m2
then we calculated and
observed imapct of BFO and ABC algorithm on increasing
the lifetime of WSN.
Here are results of this case:
5. International Journal on Recent and Innovation Trends in Computing and Communication ISSN: 2321-8169
Volume: 5 Issue: 8 93 – 98
_______________________________________________________________________________________________
97
IJRITCC | August 2017, Available @ http://www.ijritcc.org
_______________________________________________________________________________________
Figure 3.6 Nodes in cluster in geographical area of 100 m2
Figure 3.7 RE plot of BFO and ABC
Figure 3.8 Standard deviation of cluster distance
Table1.4 Cluster-wise comparsion for BFO and ABC for
case-2
Case-
2
100m2
Cluster 1 Cluster 2 Cluster 3
BFO 8.75456456141063 13.6266384294770 26.4814014635824
ABC 8.00970696477768 11.3888740950478 23.3974753421539
Case-3 When Geographical area is 200mx200m
When geographical area is 200 m2
then we calculated and
observed imapct of BFO and ABC algorithm on increasing
the lifetime of WSN.
Here are results of this case:
Figure 3.9 Nodes in cluster in geographical area of 200 m2
Figure 3.10 Standard deviation of cluster distance
Table 1.5 Cluster-wise comparsion for BFO and ABC for
case-3
Case-
3
200m2
Cluster 1 Cluster 2 Cluster 3
BFO 66.2532605617461 38.5725720516026 135.643533028712
ABC 88.0227760388700 28.2006211404531 75.2897030161919
Figure 3.11 RE plot of BFO and ABC
It can be observed that BFO is giving better performance in
comparison to ABC for same set of rules and WSN
environment. Further observation is that when geographical
area is large then results of BFO and ABC are comparable,
but for small geographical area BFO over perform the ABC
for same set of rules, WSN environment and conditions.
IV. RESULTS & DISCUSSION
A. Conclusion
Our thesis work includes the study of clustering, cluster
head (CH) selection and other energy efficient
communication protocols such as ABC and BFO
optimization algorithms for WSN, since it was proposed
earlier that clustering improves the network lifetime. We
used Fuzzy logic controller based approach for cluster head
choosing and compared performance of BFO and ABC for
6. International Journal on Recent and Innovation Trends in Computing and Communication ISSN: 2321-8169
Volume: 5 Issue: 8 93 – 98
_______________________________________________________________________________________________
98
IJRITCC | August 2017, Available @ http://www.ijritcc.org
_______________________________________________________________________________________
cluster head selection and improvement of network lifetime.
It was also found that the BFO tuned Fuzzy controller gives
better results than ABC tuned parameters. We used ABC as
a reference to compare the
performance of each of the clustering methods It is
concluded that for three different geographical sizes BFO
tuned fuzzy logic controller gives improved result in respect
of network lifetime in comparison to ABC algorithm. As
geographical size increases impact of BFO becomes
comparable to that of ABC but for smaller areas BFO
should be preferred over ABC for longer network lifetime.
B. Future Scope
In this work we focused on longer network life time which
is very important parameter of a WSN network. But for a
better and secure WSN environment, security from external
attacks is also main concern. These types of attacks can be
overcome by end to end encryption. Second is a malicious
attack where attacker node attracts packet by inserting false
routing protocol. Secondly Guard node can also be used
when transmitted data from high security level to low
security level of transmission. Similarly, Multi-Level
Security algorithm can be analyzed and modified for better
performance along with our proposed technique of
increasing network lifetime.
REFERENCES
[1] Q. Yu, Z. Luo and P. Min, "Intrusion detection in wireless
sensor networks for destructive intruders," 2015 Asia-
Pacific Signal and Information Processing Association
Annual Summit and Conference (APSIPA), Hong Kong,
2015, pp. 68-75.
[2] P. R. Vamsi and K. Kant, "Secure data aggregation and
intrusion detection in wireless sensor networks," 2015
International Conference on Signal Processing and
Communication (ICSC), Noida, 2015, pp. 127-131.
[3] Ajith Abraham, CrinaGrosan and Carlos Martin-Vide,
―Evolutionary Design of Intrusion Detection Programs,‖
International Journal of Network Security, Vol.4, No.3,
PP.328–339, Mar. 2007.
[4] IoannisKrontiris, ZinaidaBenenson, ThanassisGiannetsos,
Felix C. Freiling and TassosDimitriou, ―Cooperative
Intrusion Detection in Wireless Sensor Networks.
[5] DjallelEddineBoubiche and AzeddineBilami, ―CROSS
LAYER INTRUSION DETECTION SYSTEM FOR
WIRELESS SENSOR NETWORK,‖ International Journal
of Network Security & Its Applications (IJNSA), Vol.4,
No.2, March 2012.
[6] Shio Kumar Singh, M P Singh and D K Singh, ―Intrusion
Detection Based Security Solution for Cluster-Based
Wireless Sensor Networks,‖ International Journal of
Advanced Science and Technology, Vol.30, May,2011.
[7] A. Anbumozhi, K.Muneeswaran,Sivakasi, ―Detection of
Intruders in Wireless SensorNetworks Using Anomaly,‖
International Journal of Innovative Research in Science,
Engineering and Technology, Volume 3, Special Issue 3,
March 2014.
[8] Centric Intrusion Detection in Wireless Sensor
Networks," 2012 IEEE International Conference on Green
Computing and Communications, Besancon, 2012, pp. 325-
334.
[9] F. Bao, I. R. Chen, M. Chang and J. H. Cho, "Trust-Based
Intrusion Detection in Wireless Sensor Networks," 2011
IEEE International Conference on Communications (ICC),
Kyoto, 2011, pp. 1-6.
[10] G. S. Brar, S. Rani, V. Chopra, R. Malhotra, H. Song and S.
H. Ahmed, "Energy Efficient Direction-Based PDORP
Routing Protocol for WSN," in IEEE Access, vol. 4, no. ,
pp. 3182-3194, 2016.
[11] L. Coppolino, S. DAntonio, A. Garofalo and L. Romano,
"Applying Data Mining Techniques to Intrusion Detection
in Wireless Sensor Networks," 2013 Eighth International
Conference on P2P, Parallel, Grid, Cloud and Internet
Computing, Compiegne, 2013, pp. 247-254.
[12] R. Bhargavi, V. Vaidehi, P. T. V. Bhuvaneswari, P.
Balamuralidhar and M. G. Chandra, "Complex Event
Processing for object tracking and intrusion detection in
Wireless Sensor Networks," 2010 11th International
Conference on Control Automation Robotics & Vision,
Singapore, 2010, pp. 848-853.
[13] HarmandeepKaur, ―A Novel Approach To Prevent Black
Hole Attack In Wireless Sensor Network‖International
Journal For Advance Research In Engineering And
Technology, Vol. 2, Issue VI, June 2014.
[14] Anurag Singh Tomar, ―Optimized Positioning Of Multiple
Base Station for Black Hole Attack‖ International Journal
of Advanced Research in Computer Engineering &
Technology Volume 3 Issue 8, August 2014.
[15] Sowmya K.S, ―Detection and Prevention of Blackhole
Attack in MANET Using ACO‖ International Journal of
Computer Science and Network Security, VOL.12 No.5,
May 2012.