SlideShare a Scribd company logo
1 of 9
Download to read offline
International Journal of Electronics and Communication Engineering Research and Development
(IJECERD), ISSN 2248-9525(Print), ISSN- 2248-9533 (Online) Volume 4, Number 2, April-June (2014)
36
FAULTY NODE RECOVERY AND REPLACEMENT ALGORITHM
FOR WIRELESS SENSOR NETWORK
Triveni C.L1
Rashmi T.S2
P.C Srikanth3
1
Assistant Professor, Department of ECE, Malnad College of Engineering, Hassan, India
2
Department of ECE, Malnad College of Engineering, Hassan, India
3
Professor and Head, Department of ECE, Malnad College of Engineering, Hassan, India
ABSTRACT
This paper proposes an algorithm by combining grade diffusion and genetic algorithm
to enhance the lifetime of a wireless sensor network. The algorithm is named as Fault Node
Recovery and Replacement algorithm. The algorithm enhances the lifetime of the wireless
sensor network with fewer replacements of sensor nodes. In the simulation it is shown that
the proposed algorithm increases the number of active node, reduces the rate of data loss,
increases the life time of the wireless sensor network and reduces the rate of energy
consumption.
Keywords: Grade Diffusion (GD), Genetic Algorithm (GA), Fault Node Recovery and
Replacement (FNRR), Wireless Sensor Networks (WSN).
1. INTRODUCTION
Recent advances in micro processing, wireless and battery technology, and smart
sensors have enhanced data processing [1], [2], [3], wireless communication, and detection
capability. In sensor networks, each sensor node has limited wireless computational power to
process and transfer the live data to the base station or data collection center [4], [5], [6].
Therefore, to increase the sensor area and the transmission area [7], [8], the wireless sensor
network usually contains many sensor nodes. Generally, each sensor node has a low level of
battery power that cannot be replenished. When the energy of a sensor node is exhausted,
wireless sensor network leaks will appear, and the failed nodes will not relay data to the other
nodes during transmission processing. Thus, the other sensor nodes will be burdened with
increased transmission processing.
This paper proposes an algorithm by combining grade diffusion (GD) and Genetic
Algorithm (GA) to enhance the lifetime of a wireless sensor network (WSN) when some of
the sensor nodes shut down because they no longer have battery energy. Existing algorithms
IJECERD
© PRJ
PUBLICATION
International Journal of Electronics and Communication
Engineering Research and Development
(IJECERD)
ISSN 2248– 9525 (Print)
ISSN 2248 –9533 (Online)
Volume 4, Number 2, April- June (2014), pp. 36-44
© PRJ Publication, http://www.prjpublication.com/IJECERD.asp
International Journal of Electronics and Communication Engineering Research and Development
(IJECERD), ISSN 2248-9525(Print), ISSN- 2248-9533 (Online) Volume 4, Number 2, April-June (2014)
37
for recovery and replacement are costlier and implementation is difficult. The algorithm
proposed in the paper is easier to implement and since it replaces some of the sensor nodes it
is not much expensive. The proposed algorithm can result in fewer replacements of sensor
nodes. Thus, the algorithm enhances the WSN lifetime and also reduces the cost of replacing
the sensor nodes.
2. RELATED WORK
The traditional approaches to sensor network routing include the directed diffusion
(DD) [9] algorithm and the grade diffusion (GD) [3] algorithm. The algorithm proposed in
this paper is based on the GD algorithm, with the goal of replacing fewer sensor nodes that
are inoperative or have depleted batteries. These optimizations will ultimately enhance the
WSN lifetime and reduce sensor node replacement cost.
2.1 Directed Diffusion Algorithm
A series of routing algorithms [10], [11] for wireless sensor networks have been
proposed in recent years. C. Intanagonwiwat et al. presented the Directed Diffusion (DD)
algorithm [10]. The goal of the DD algorithm is to reduce the data relay transmission counts
for power management. The DD algorithm is a query-driven transmission protocol. The
collected data is transmitted only if it matches the query from the sink node. In the DD
algorithm, the sink node provides the queries in the form of attribute-value pairs to the other
sensor nodes by broadcasting the query packets to the whole network. Subsequently, the
sensor nodes send the data back to the sink node only when it fits the queries.
2.2 Fault Recovery Techniques
Fault recovery techniques enable systems to continue operating according to their
specifications even if faults of a certain type are present. The most widely used fault recovery
techniques are as follows. Replication of components is one of the most widely used fault
recovery technique. Although redundancy has several advantages in terms of high reliability
and availability, it also increases the costs of a deployment. There are two types in replication
of nodes.
2.2.1 Active replication in WSN
Active replication in wireless sensor networks is naturally applied in scenarios where
all, or many, nodes provide the same functionality. Nodes that run this service activate their
sensors and forward their readings to an aggregation service or to a base station. When some
nodes fail to provide that information, the recipient still gets the results from other nodes,
which is often sufficient. Fault recovery in the presence of active replicas is relatively
straightforward. Some of these approaches are: 1) Multipath routing 2) Sensor value
aggregation 3) Ignore values from faulty nodes.
2.2.2 Passive replication in WSN
When passive replication is applied, the primary replica receives all requests and
processes them. In order to maintain consistency between replicas, the state of the primary
replica and the request information are transferred to the backup replicas. Given the
constraints of WSNs, applications should be designed to have only little or no state at all,
which minimizes the overhead for transferring state information between nodes or eliminates
it altogether. The process of recovering from a fault when using passive replication consists
of three main steps: fault detection, primary selection and service distribution.
International Journal of Electronics and Communication Engineering Research and Development
(IJECERD), ISSN 2248-9525(Print), ISSN- 2248-9533 (Online) Volume 4, Number 2, April-June (2014)
38
3. FAULT NODE RECOVERY AND REPLACEMENT (FNRR) ALGORITHM
The power consumption of the sensor nodes in WSNs is unavoidable. This paper,
however, proposes an algorithm to search for and replace fewer sensor nodes and to reuse the
most routing paths. Conventional search techniques are often incapable of optimizing
nonlinear functions with multiple variables. One scheme, the genetic algorithm (GA) [12], is
a directed random search technique developed in 1975, based on the concept of natural
genetics. The current paper proposes a fault node recovery and replacement (FNRR)
algorithm based on the GD algorithm combined with the GA. The FNRR algorithm creates a
routing table using the GD algorithm and replaces sensor nodes using the GA when the
number of sensor nodes that are not functioning. This algorithm not only reuses the most
routing paths to enhance the WSN lifetime but also reduces the replacement cost.
3.1 Grade Diffusion Algorithm
Grade Diffusion Algorithm is proposed to solve the power consumption and
transmission routing problems in wireless sensor networks [13]. In the grade diffusion
algorithm the first step is to assign the grade for the sensor nodes and to update the routing
table for each node. The data transmission takes place from higher grade nodes to lower
grade nodes and hence it is named as grade diffusion algorithm. The GD algorithm is fast and
completely creates the grade table in each sensor node based on the entire wireless sensor
network by issuing the grade create packet that is created from the sink node. The process of
grade diffusion is as follows.
First, the sink node broadcasts the grade-creating package with the grade value of
zero. A grade value of one means that the sensor node receiving this grade-creating package
transmits data to the sink node requires only one hop. The sensor nodes ‘‘b’’ and ‘‘c’’ receive
a ladder-creating package with a grade value of one from sink node ‘‘a’’. Then sensor nodes
‘‘b’’ and ‘‘c’’ increase the grade value of the ladder-creating package to two and broadcast
the modified ladder-creating package. A grade value of two means that the sensor node
receiving this ladder-creating package sends data to the sink node requires two hops count.
The sensor nodes ‘‘d’’, ‘‘e’’, and ‘‘f’’ receive ladder-creating packages with a grade value of
two from nodes ‘‘b’’ and ‘‘c’’.
Sensor nodes ‘‘d’’, ‘‘e’’ and ‘‘f’’ increase the grade value of the ladder-creating
package to three and broadcast the modified package again. Sensor nodes ‘‘b’’, ‘‘g’’ and ‘‘h’’
receive this ladder-creating package, but node ‘‘b’’ discards the package because the grade
value of this package is three, which is higher than the recording value in the ladder table for
node ‘‘b’’. Moreover, if many sensor nodes simultaneously broadcast ladder-creating
packages with the same grade value, the sensor nodes receive and record the packages in their
respective ladder tables as back-up nodes. Thus, node ‘‘h’’ recording nodes ‘‘d’’ and ‘‘f’’ in
the ladder table.
Finally, sensor nodes ‘‘g’’ and ‘‘h’’ increase the grade value of the ladder-creating
package to four and broadcast the ladder-creating package. But the sensor nodes discard the
package because the grade value of the sensor nodes surrounding nodes ‘‘g’’ and ‘‘h’’ are
less than four. The process of ladder diffusion is thus complete, as shown in Fig. 1.
International Journal of Electronics and Communication Engineering Research and Development
(IJECERD), ISSN 2248-9525(Print), ISSN- 2248-9533 (Online) Volume 4, Number 2, April-June (2014)
39
Fig 1: Grade Diffusion Process
The data transmission takes place from higher grade node to lower grade node as
shown in Fig 2. Each sensor node records the grade value in the ladder table when the ladder
diffusion algorithm is applied. The sensor node can record more than one node as relay nodes
in the ladder table when receiving the ladder-creating package with a grade value less than
itself.
Fig 2: Data transfer route of sensor nodes
3.2 Genetic Algorithm for Fault Node Replacement
Grade Diffusion Algorithm is used for data transmission in the network. Genetic
Algorithm is used to replace the faulty nodes in the network. Genetic Algorithm has to run
once after 30 iterations for fault node recovery. The steps for faulty node replacement are as
follows.
International Journal of Electronics and Communication Engineering Research and Development
(IJECERD), ISSN 2248-9525(Print), ISSN- 2248-9533 (Online) Volume 4, Number 2, April-June (2014)
40
3.2.1 Initialization
At this step the chromosomes are generated. All the faulty nodes in the network
whose energy is less than the threshold level must be listed. The length of the chromosome is
equal to the number of faulty nodes in the network. The elements in the genes are either 0 or
1. A 1 means the node should be replaced and a 0 means that the node will not be replaced.
Here population size is limited to only 4.
Fig. 3 represents a chromosome. The chromosome length is 10 and the gene is 0 or 1,
chosen randomly in the initialization step. In this case, there are 10 sensor nodes not
functioning, and their node numbers are 9, 7, 10, 81, 23, 57, 34, 46, 66, and 70.
Fig 3: Chromosome and its gene
3.2.2 Evaluation
The chromosomes are evaluated based upon how many lower grade nodes will be
replaced by the chromosome.
3.3.3 Selection
Out of the above four chromosomes choose the two chromosomes which replaces
many lower grade sensor nodes. This is shown in the Fig. 4.
Fig 4: Selection Step
3.3.4 Crossover
The crossover step is used in the genetic algorithm to change the individual
chromosome. In this algorithm, one-point crossover strategy is used to create new
chromosomes, as shown in Fig. 5. Two chromosomes chosen in the selection are used to
produce two new offspring. A crossover point is selected between the first and last genes of
the parent individuals. Then, the fraction of each individual on either side of the crossover
point is exchanged and concatenated.
International Journal of Electronics and Communication Engineering Research and Development
(IJECERD), ISSN 2248-9525(Print), ISSN- 2248-9533 (Online) Volume 4, Number 2, April-June (2014)
41
Fig 5: Crossover Step
3.3.5 Mutation
The mutation step can introduce traits not found in the original individuals and
prevents the GA from converging too fast. In this algorithm, simply a gene is randomly
flipped. The chromosome is as shown in Fig. 6.
Fig 6: Mutation Step
The FNR algorithm will replace the sensor nodes in the chromosome with genes of 1
to extend the WSN lifetime.
4. SIMULATION
In the simulation the sensor nodes are uniformly distributed over 100*100 area in grid
manner. The radio ranges (transmission range) of the nodes were set to 15 units. The data
packages were exchanged between random source/destination pairs with 100 event data
packages. The power of each sensor node is set to 3000 W that is the actual available energy.
Each sensor consumed 50W when it conducts a data transformation.
The active sensor nodes, total energy consumption and total dead nodes after 120
events are shown in Figs. 7, 8 and 9. The active nodes mean that the sensor node has enough
energy to transfer data to other nodes, but some sensor nodes can be deleted from the active
nodes list if their routing tables do not have a sensor node that can be used as a relay node, or
if they are not in the routing table of any other sensor nodes.
International Journal of Electronics and Communication Engineering Research and Development
(IJECERD), ISSN 2248-9525(Print), ISSN- 2248-9533 (Online) Volume 4, Number 2, April-June (2014)
42
Fig 7: Number of Alive Nodes
As shown in fig 7 FNRR algorithm recovers the faulty nodes for every 30 iterations
and hence keeps most of the nodes alive. As shown in fig 7 even after 100 data events
number of alive nodes is greater than 60. In grade diffusion algorithm only 50% of the nodes
are alive after 40 data transmissions.
Fig 8: Number of dead nodes
As shown in fig 8 throughout the data transmission number of dead nodes is less than
five whereas with grade diffusion algorithm more than 50% of the nodes are dead by 40 data
events. So FNRR algorithm reduces the number of dead nodes by 96% as compared to grade
diffusion.
International Journal of Electronics and Communication Engineering Research and Development
(IJECERD), ISSN 2248-9525(Print), ISSN- 2248-9533 (Online) Volume 4, Number 2, April-June (2014)
43
Fig 9: Power Consumption
Power consumed for data transmission from source to sink for different iterations is
shown in fig 9. Power consumption of FNRR algorithm is around 20mJ. The power
consumed by the grade diffusion algorithm is around 110mJ. Hence power consumption for
data transmission of fault node recovery is lesser compared to grade diffusion algorithm.
As shown in fig 10 number of hops required for data transmission is lesser for FNRR
algorithm compared to grade diffusion algorithm. Since the number of hops required for data
transmission is lesser it takes lesser time for data transmission.
Fig 10: Number of Hops for Data Transmission
International Journal of Electronics and Communication Engineering Research and Development
(IJECERD), ISSN 2248-9525(Print), ISSN- 2248-9533 (Online) Volume 4, Number 2, April-June (2014)
44
5. CONCLUSION
In real wireless sensor networks, the sensor nodes use battery power supplies and thus
have limited energy resources. In addition to the routing, it is important to research the
optimization of sensor node replacement, reducing the replacement cost.
This paper proposes a faulty node recovery and replacement algorithm for WSN based on the
grade diffusion algorithm combined with a genetic algorithm. The FNRR algorithm requires
replacing fewer sensor nodes and reuses the most routing paths, increasing the WSN lifetime
and reducing the replacement cost.
In the simulation, the proposed algorithm increases the number of active nodes
reduces the rate of energy consumption. Therefore, the FNRR algorithm not only replaces
sensor nodes, but also reduces the replacement cost.
6. REFERENCES
[1] S. Corson and J. Macker, Mobile Ad Hoc Networking (MANET): Routing Protocol
Performance Issues and Evaluation Considerations. New York, NY, USA: ACM,
1999.
[2] T. H. Liu, S. C. Yi, and X. W. Wang, “A fault management protocol for low-energy
and efficient wireless sensor networks,” J. Inf. Hiding Multimedia Signal Process.,
vol. 4, no. 1, pp. 34–45, 2013.
[3] E. M. Royer and C. K. Toh, “A review of current routing protocols for ad-hoc mobile
networks,” IEEE Personal Commun., vol. 6, no. 2, pp. 46–55, Apr. 1999.
[4] F. C. Chang and H. C. Huang, “A refactoring method for cache-efficient swarm
intelligence algorithms,” Inf. Sci., vol. 192, no. 1, pp. 39–49, Jun. 2012.
[5] Z. He, B. S. Lee, and X. S. Wang, “Aggregation in sensor networks with a user-
provided quality of service goal,” Inf. Sci., vol. 178, no. 9, pp. 2128–2149, 2008.
[6] J. H. Ho, H. C. Shih, B. Y. Liao, and S. C. Chu, “A ladder diffusion algorithm using
ant colony optimization for wireless sensor networks,” Inf. Sci., vol. 192, pp. 204–
212, Jun. 2012.
[7] J. A. Carballido, I. Ponzoni, and N. B. Brignole, “CGD-GA: A graphbased genetic
algorithm for sensor network design,” Inf. Sci., vol. 177, no. 22, pp. 5091–5102,
2007.
[8] J. Pan, Y. Hou, L. Cai, Y. Shi, and X. Shen, “Topology control for wireless sensor
networks,” in Proc. 9th ACM Int. Conf. Mobile Comput. Netw., 2003, pp. 286–299.
[9] T. P. Hong and C. H. Wu, “An improved weighted clustering algorithm for
determination of application nodes in heterogeneous sensor networks,” J. Inf. Hiding
Multimedia Signal Process, vol. 2, no. 2, pp. 173–184, 2011.
[10] C. Intanagonwiwat, R. Govindan, D. Estrin, J. Heidemann, and F. Silva, “Directed
diffusion for wireless sensor networking,” IEEE/ACM Trans. Netw., vol. 11, no. 1,
pp. 2–16, Feb. 2003.
[11] W. H. Liao, Y. Kao, and C. M. Fan, “Data aggregation in wireless sensor networks
using ant colony algorithm,” J. Netw. Comput. Appl., vol. 31, no. 4, pp. 387–401,
2008.
[12] M. Gen and R. Cheng, Genetic Algorithms and Engineering Design. New York, NY,
USA: Wiley, 1997.
[13] J. H. Ho, H. C. Shih, B. Y. Liao, and J. S. Pan, “Grade diffusion algorithm,” in Proc.
2nd Int. Conf. Eng. Technol. Innov., 2012, pp. 2064–2068.

More Related Content

What's hot

FTTCP: Fault Tolerant Two-level Clustering Protocol for WSN
FTTCP: Fault Tolerant Two-level Clustering Protocol for WSNFTTCP: Fault Tolerant Two-level Clustering Protocol for WSN
FTTCP: Fault Tolerant Two-level Clustering Protocol for WSNIDES Editor
 
IRJET- Chaos based Secured Communication in Energy Efficient Wireless Sensor...
IRJET-	 Chaos based Secured Communication in Energy Efficient Wireless Sensor...IRJET-	 Chaos based Secured Communication in Energy Efficient Wireless Sensor...
IRJET- Chaos based Secured Communication in Energy Efficient Wireless Sensor...IRJET Journal
 
False Node Recovery Algorithm for a Wireless Sensor Network
False Node Recovery Algorithm for a Wireless Sensor NetworkFalse Node Recovery Algorithm for a Wireless Sensor Network
False Node Recovery Algorithm for a Wireless Sensor NetworkRadita Apriana
 
Qos group based optimal retransmission medium access protocol for wireless se...
Qos group based optimal retransmission medium access protocol for wireless se...Qos group based optimal retransmission medium access protocol for wireless se...
Qos group based optimal retransmission medium access protocol for wireless se...IJCNCJournal
 
Neural network based energy efficient clustering and routing
Neural network based energy efficient clustering and routingNeural network based energy efficient clustering and routing
Neural network based energy efficient clustering and routingambitlick
 
COMPARISON OF ENERGY OPTIMIZATION CLUSTERING ALGORITHMS IN WIRELESS SENSOR NE...
COMPARISON OF ENERGY OPTIMIZATION CLUSTERING ALGORITHMS IN WIRELESS SENSOR NE...COMPARISON OF ENERGY OPTIMIZATION CLUSTERING ALGORITHMS IN WIRELESS SENSOR NE...
COMPARISON OF ENERGY OPTIMIZATION CLUSTERING ALGORITHMS IN WIRELESS SENSOR NE...IJCSIT Journal
 
IRJET - Energy Efficient Enhanced K-Means Cluster-Based Routing Protocol for WSN
IRJET - Energy Efficient Enhanced K-Means Cluster-Based Routing Protocol for WSNIRJET - Energy Efficient Enhanced K-Means Cluster-Based Routing Protocol for WSN
IRJET - Energy Efficient Enhanced K-Means Cluster-Based Routing Protocol for WSNIRJET Journal
 
Based on Heterogeneity and Electing Probability of Nodes Improvement in LEACH
Based on Heterogeneity and Electing Probability of Nodes Improvement in LEACHBased on Heterogeneity and Electing Probability of Nodes Improvement in LEACH
Based on Heterogeneity and Electing Probability of Nodes Improvement in LEACHijsrd.com
 
Energy efficient clustering in heterogeneous
Energy efficient clustering in heterogeneousEnergy efficient clustering in heterogeneous
Energy efficient clustering in heterogeneousIJCNCJournal
 
ENERGY EFFICIENCY IN AD HOC NETWORKS
ENERGY EFFICIENCY IN AD HOC NETWORKSENERGY EFFICIENCY IN AD HOC NETWORKS
ENERGY EFFICIENCY IN AD HOC NETWORKSijasuc
 
Hierarchical clustering algo for wsn
Hierarchical clustering algo for wsnHierarchical clustering algo for wsn
Hierarchical clustering algo for wsnSamruddhi Gaikwad
 
IRJET- Underwater Acoustic Wsn:Routing Protocol
IRJET- Underwater Acoustic Wsn:Routing ProtocolIRJET- Underwater Acoustic Wsn:Routing Protocol
IRJET- Underwater Acoustic Wsn:Routing ProtocolIRJET Journal
 

What's hot (17)

FTTCP: Fault Tolerant Two-level Clustering Protocol for WSN
FTTCP: Fault Tolerant Two-level Clustering Protocol for WSNFTTCP: Fault Tolerant Two-level Clustering Protocol for WSN
FTTCP: Fault Tolerant Two-level Clustering Protocol for WSN
 
Ijcnc050207
Ijcnc050207Ijcnc050207
Ijcnc050207
 
IRJET- Chaos based Secured Communication in Energy Efficient Wireless Sensor...
IRJET-	 Chaos based Secured Communication in Energy Efficient Wireless Sensor...IRJET-	 Chaos based Secured Communication in Energy Efficient Wireless Sensor...
IRJET- Chaos based Secured Communication in Energy Efficient Wireless Sensor...
 
False Node Recovery Algorithm for a Wireless Sensor Network
False Node Recovery Algorithm for a Wireless Sensor NetworkFalse Node Recovery Algorithm for a Wireless Sensor Network
False Node Recovery Algorithm for a Wireless Sensor Network
 
Qos group based optimal retransmission medium access protocol for wireless se...
Qos group based optimal retransmission medium access protocol for wireless se...Qos group based optimal retransmission medium access protocol for wireless se...
Qos group based optimal retransmission medium access protocol for wireless se...
 
Neural network based energy efficient clustering and routing
Neural network based energy efficient clustering and routingNeural network based energy efficient clustering and routing
Neural network based energy efficient clustering and routing
 
Kanchan ppt
Kanchan pptKanchan ppt
Kanchan ppt
 
COMPARISON OF ENERGY OPTIMIZATION CLUSTERING ALGORITHMS IN WIRELESS SENSOR NE...
COMPARISON OF ENERGY OPTIMIZATION CLUSTERING ALGORITHMS IN WIRELESS SENSOR NE...COMPARISON OF ENERGY OPTIMIZATION CLUSTERING ALGORITHMS IN WIRELESS SENSOR NE...
COMPARISON OF ENERGY OPTIMIZATION CLUSTERING ALGORITHMS IN WIRELESS SENSOR NE...
 
IRJET - Energy Efficient Enhanced K-Means Cluster-Based Routing Protocol for WSN
IRJET - Energy Efficient Enhanced K-Means Cluster-Based Routing Protocol for WSNIRJET - Energy Efficient Enhanced K-Means Cluster-Based Routing Protocol for WSN
IRJET - Energy Efficient Enhanced K-Means Cluster-Based Routing Protocol for WSN
 
Based on Heterogeneity and Electing Probability of Nodes Improvement in LEACH
Based on Heterogeneity and Electing Probability of Nodes Improvement in LEACHBased on Heterogeneity and Electing Probability of Nodes Improvement in LEACH
Based on Heterogeneity and Electing Probability of Nodes Improvement in LEACH
 
F017544247
F017544247F017544247
F017544247
 
Energy efficient clustering in heterogeneous
Energy efficient clustering in heterogeneousEnergy efficient clustering in heterogeneous
Energy efficient clustering in heterogeneous
 
eeca
eecaeeca
eeca
 
ENERGY EFFICIENCY IN AD HOC NETWORKS
ENERGY EFFICIENCY IN AD HOC NETWORKSENERGY EFFICIENCY IN AD HOC NETWORKS
ENERGY EFFICIENCY IN AD HOC NETWORKS
 
Hierarchical clustering algo for wsn
Hierarchical clustering algo for wsnHierarchical clustering algo for wsn
Hierarchical clustering algo for wsn
 
IRJET- Underwater Acoustic Wsn:Routing Protocol
IRJET- Underwater Acoustic Wsn:Routing ProtocolIRJET- Underwater Acoustic Wsn:Routing Protocol
IRJET- Underwater Acoustic Wsn:Routing Protocol
 
D031202018023
D031202018023D031202018023
D031202018023
 

Similar to Faulty node recovery and replacement algorithm for wireless sensor network

A Fault Tolerant Approach to Enhances Wsn Lifetime in Star Topology
A Fault Tolerant Approach to Enhances Wsn Lifetime in Star TopologyA Fault Tolerant Approach to Enhances Wsn Lifetime in Star Topology
A Fault Tolerant Approach to Enhances Wsn Lifetime in Star TopologyIRJET Journal
 
A Fault Tolerant Approach To Enhances WSN Lifetime In Star Topology
A Fault Tolerant Approach To Enhances WSN Lifetime In Star TopologyA Fault Tolerant Approach To Enhances WSN Lifetime In Star Topology
A Fault Tolerant Approach To Enhances WSN Lifetime In Star TopologyIRJET Journal
 
Implementation and analysis of multiple criteria decision routing algorithm f...
Implementation and analysis of multiple criteria decision routing algorithm f...Implementation and analysis of multiple criteria decision routing algorithm f...
Implementation and analysis of multiple criteria decision routing algorithm f...prjpublications
 
Energy Efficient Zone Divided and Energy Balanced Clustering Routing Protocol...
Energy Efficient Zone Divided and Energy Balanced Clustering Routing Protocol...Energy Efficient Zone Divided and Energy Balanced Clustering Routing Protocol...
Energy Efficient Zone Divided and Energy Balanced Clustering Routing Protocol...csijjournal
 
Energy Efficient Zone Divided and Energy Balanced Clustering Routing Protocol...
Energy Efficient Zone Divided and Energy Balanced Clustering Routing Protocol...Energy Efficient Zone Divided and Energy Balanced Clustering Routing Protocol...
Energy Efficient Zone Divided and Energy Balanced Clustering Routing Protocol...csijjournal
 
Enhancement of Routing Performance for Energy Efficiency and Critical Event M...
Enhancement of Routing Performance for Energy Efficiency and Critical Event M...Enhancement of Routing Performance for Energy Efficiency and Critical Event M...
Enhancement of Routing Performance for Energy Efficiency and Critical Event M...iosrjce
 
ENERGY EFFICIENT AGGREGATION WITH DIVERGENT SINK PLACEMENT FOR WIRELESS SENSO...
ENERGY EFFICIENT AGGREGATION WITH DIVERGENT SINK PLACEMENT FOR WIRELESS SENSO...ENERGY EFFICIENT AGGREGATION WITH DIVERGENT SINK PLACEMENT FOR WIRELESS SENSO...
ENERGY EFFICIENT AGGREGATION WITH DIVERGENT SINK PLACEMENT FOR WIRELESS SENSO...ijasuc
 
Energy efficient routing in wireless sensor network based on mobile sink guid...
Energy efficient routing in wireless sensor network based on mobile sink guid...Energy efficient routing in wireless sensor network based on mobile sink guid...
Energy efficient routing in wireless sensor network based on mobile sink guid...IJECEIAES
 
Energy Efficient Wireless Sensor Network Using Network Coding Based Multipath...
Energy Efficient Wireless Sensor Network Using Network Coding Based Multipath...Energy Efficient Wireless Sensor Network Using Network Coding Based Multipath...
Energy Efficient Wireless Sensor Network Using Network Coding Based Multipath...IJERA Editor
 
An algorithm for fault node recovery of wireless sensor network
An algorithm for fault node recovery of wireless sensor networkAn algorithm for fault node recovery of wireless sensor network
An algorithm for fault node recovery of wireless sensor networkeSAT Publishing House
 
A Review Paper on Power Consumption Improvements in WSN
A Review Paper on Power Consumption Improvements in WSNA Review Paper on Power Consumption Improvements in WSN
A Review Paper on Power Consumption Improvements in WSNIJERA Editor
 
Ijarcet vol-2-issue-2-576-581
Ijarcet vol-2-issue-2-576-581Ijarcet vol-2-issue-2-576-581
Ijarcet vol-2-issue-2-576-581Editor IJARCET
 
Ameliorate the performance using soft computing approaches in wireless networks
Ameliorate the performance using soft computing approaches  in wireless networksAmeliorate the performance using soft computing approaches  in wireless networks
Ameliorate the performance using soft computing approaches in wireless networksIJECEIAES
 
Enhanced DV Hop Localization Algorithm for Wireless Sensor Networks
Enhanced DV Hop Localization Algorithm for Wireless Sensor NetworksEnhanced DV Hop Localization Algorithm for Wireless Sensor Networks
Enhanced DV Hop Localization Algorithm for Wireless Sensor Networksijtsrd
 
Node Deployment Technique using Wireless Sensor Networks
Node Deployment Technique using Wireless Sensor NetworksNode Deployment Technique using Wireless Sensor Networks
Node Deployment Technique using Wireless Sensor NetworksIRJET Journal
 
CODE AWARE DYNAMIC SOURCE ROUTING FOR DISTRIBUTED SENSOR NETWORK
CODE AWARE DYNAMIC SOURCE ROUTING FOR DISTRIBUTED SENSOR NETWORKCODE AWARE DYNAMIC SOURCE ROUTING FOR DISTRIBUTED SENSOR NETWORK
CODE AWARE DYNAMIC SOURCE ROUTING FOR DISTRIBUTED SENSOR NETWORKIJNSA Journal
 

Similar to Faulty node recovery and replacement algorithm for wireless sensor network (20)

2nd fast.pptx
2nd fast.pptx2nd fast.pptx
2nd fast.pptx
 
A Fault Tolerant Approach to Enhances Wsn Lifetime in Star Topology
A Fault Tolerant Approach to Enhances Wsn Lifetime in Star TopologyA Fault Tolerant Approach to Enhances Wsn Lifetime in Star Topology
A Fault Tolerant Approach to Enhances Wsn Lifetime in Star Topology
 
A Fault Tolerant Approach To Enhances WSN Lifetime In Star Topology
A Fault Tolerant Approach To Enhances WSN Lifetime In Star TopologyA Fault Tolerant Approach To Enhances WSN Lifetime In Star Topology
A Fault Tolerant Approach To Enhances WSN Lifetime In Star Topology
 
Implementation and analysis of multiple criteria decision routing algorithm f...
Implementation and analysis of multiple criteria decision routing algorithm f...Implementation and analysis of multiple criteria decision routing algorithm f...
Implementation and analysis of multiple criteria decision routing algorithm f...
 
Energy Efficient Zone Divided and Energy Balanced Clustering Routing Protocol...
Energy Efficient Zone Divided and Energy Balanced Clustering Routing Protocol...Energy Efficient Zone Divided and Energy Balanced Clustering Routing Protocol...
Energy Efficient Zone Divided and Energy Balanced Clustering Routing Protocol...
 
Energy Efficient Zone Divided and Energy Balanced Clustering Routing Protocol...
Energy Efficient Zone Divided and Energy Balanced Clustering Routing Protocol...Energy Efficient Zone Divided and Energy Balanced Clustering Routing Protocol...
Energy Efficient Zone Divided and Energy Balanced Clustering Routing Protocol...
 
Enhancement of Routing Performance for Energy Efficiency and Critical Event M...
Enhancement of Routing Performance for Energy Efficiency and Critical Event M...Enhancement of Routing Performance for Energy Efficiency and Critical Event M...
Enhancement of Routing Performance for Energy Efficiency and Critical Event M...
 
M017358794
M017358794M017358794
M017358794
 
ENERGY EFFICIENT AGGREGATION WITH DIVERGENT SINK PLACEMENT FOR WIRELESS SENSO...
ENERGY EFFICIENT AGGREGATION WITH DIVERGENT SINK PLACEMENT FOR WIRELESS SENSO...ENERGY EFFICIENT AGGREGATION WITH DIVERGENT SINK PLACEMENT FOR WIRELESS SENSO...
ENERGY EFFICIENT AGGREGATION WITH DIVERGENT SINK PLACEMENT FOR WIRELESS SENSO...
 
Wsn ppt
Wsn pptWsn ppt
Wsn ppt
 
Energy efficient routing in wireless sensor network based on mobile sink guid...
Energy efficient routing in wireless sensor network based on mobile sink guid...Energy efficient routing in wireless sensor network based on mobile sink guid...
Energy efficient routing in wireless sensor network based on mobile sink guid...
 
Energy Efficient Wireless Sensor Network Using Network Coding Based Multipath...
Energy Efficient Wireless Sensor Network Using Network Coding Based Multipath...Energy Efficient Wireless Sensor Network Using Network Coding Based Multipath...
Energy Efficient Wireless Sensor Network Using Network Coding Based Multipath...
 
An algorithm for fault node recovery of wireless sensor network
An algorithm for fault node recovery of wireless sensor networkAn algorithm for fault node recovery of wireless sensor network
An algorithm for fault node recovery of wireless sensor network
 
A Review Paper on Power Consumption Improvements in WSN
A Review Paper on Power Consumption Improvements in WSNA Review Paper on Power Consumption Improvements in WSN
A Review Paper on Power Consumption Improvements in WSN
 
Ijarcet vol-2-issue-2-576-581
Ijarcet vol-2-issue-2-576-581Ijarcet vol-2-issue-2-576-581
Ijarcet vol-2-issue-2-576-581
 
Ameliorate the performance using soft computing approaches in wireless networks
Ameliorate the performance using soft computing approaches  in wireless networksAmeliorate the performance using soft computing approaches  in wireless networks
Ameliorate the performance using soft computing approaches in wireless networks
 
Enhanced DV Hop Localization Algorithm for Wireless Sensor Networks
Enhanced DV Hop Localization Algorithm for Wireless Sensor NetworksEnhanced DV Hop Localization Algorithm for Wireless Sensor Networks
Enhanced DV Hop Localization Algorithm for Wireless Sensor Networks
 
Node Deployment Technique using Wireless Sensor Networks
Node Deployment Technique using Wireless Sensor NetworksNode Deployment Technique using Wireless Sensor Networks
Node Deployment Technique using Wireless Sensor Networks
 
CODE AWARE DYNAMIC SOURCE ROUTING FOR DISTRIBUTED SENSOR NETWORK
CODE AWARE DYNAMIC SOURCE ROUTING FOR DISTRIBUTED SENSOR NETWORKCODE AWARE DYNAMIC SOURCE ROUTING FOR DISTRIBUTED SENSOR NETWORK
CODE AWARE DYNAMIC SOURCE ROUTING FOR DISTRIBUTED SENSOR NETWORK
 
C011131925
C011131925C011131925
C011131925
 

More from prjpublications

Mems based optical sensor for salinity measurement
Mems based optical sensor for salinity measurementMems based optical sensor for salinity measurement
Mems based optical sensor for salinity measurementprjpublications
 
An approach to design a rectangular microstrip patch antenna in s band by tlm...
An approach to design a rectangular microstrip patch antenna in s band by tlm...An approach to design a rectangular microstrip patch antenna in s band by tlm...
An approach to design a rectangular microstrip patch antenna in s band by tlm...prjpublications
 
A design and simulation of optical pressure sensor based on photonic crystal ...
A design and simulation of optical pressure sensor based on photonic crystal ...A design and simulation of optical pressure sensor based on photonic crystal ...
A design and simulation of optical pressure sensor based on photonic crystal ...prjpublications
 
Pattern recognition using video surveillance for wildlife applications
Pattern recognition using video surveillance for wildlife applicationsPattern recognition using video surveillance for wildlife applications
Pattern recognition using video surveillance for wildlife applicationsprjpublications
 
Precision face image retrieval by extracting the face features and comparing ...
Precision face image retrieval by extracting the face features and comparing ...Precision face image retrieval by extracting the face features and comparing ...
Precision face image retrieval by extracting the face features and comparing ...prjpublications
 
Keyless approach of separable hiding data into encrypted image
Keyless approach of separable hiding data into encrypted imageKeyless approach of separable hiding data into encrypted image
Keyless approach of separable hiding data into encrypted imageprjpublications
 
Encryption based multi user manner secured data sharing and storing in cloud
Encryption based multi user manner secured data sharing and storing in cloudEncryption based multi user manner secured data sharing and storing in cloud
Encryption based multi user manner secured data sharing and storing in cloudprjpublications
 
A secure payment scheme in multihop wireless network by trusted node identifi...
A secure payment scheme in multihop wireless network by trusted node identifi...A secure payment scheme in multihop wireless network by trusted node identifi...
A secure payment scheme in multihop wireless network by trusted node identifi...prjpublications
 
Preparation gade and idol model for preventing multiple spoofing attackers in...
Preparation gade and idol model for preventing multiple spoofing attackers in...Preparation gade and idol model for preventing multiple spoofing attackers in...
Preparation gade and idol model for preventing multiple spoofing attackers in...prjpublications
 
Study on gis simulated water quality model
Study on gis simulated water quality modelStudy on gis simulated water quality model
Study on gis simulated water quality modelprjpublications
 
Smes role in reduction of the unemployment problem in the area located in sa...
Smes  role in reduction of the unemployment problem in the area located in sa...Smes  role in reduction of the unemployment problem in the area located in sa...
Smes role in reduction of the unemployment problem in the area located in sa...prjpublications
 
Review of three categories of fingerprint recognition
Review of three categories of fingerprint recognitionReview of three categories of fingerprint recognition
Review of three categories of fingerprint recognitionprjpublications
 
Reduction of executive stress by development of emotional intelligence a stu...
Reduction of executive stress by development of emotional intelligence  a stu...Reduction of executive stress by development of emotional intelligence  a stu...
Reduction of executive stress by development of emotional intelligence a stu...prjpublications
 
Mathematical modeling approach for flood management
Mathematical modeling approach for flood managementMathematical modeling approach for flood management
Mathematical modeling approach for flood managementprjpublications
 
Influences of child endorsers on the consumers
Influences of child endorsers on the consumersInfluences of child endorsers on the consumers
Influences of child endorsers on the consumersprjpublications
 
Impact of stress management by development of emotional intelligence in cmts,...
Impact of stress management by development of emotional intelligence in cmts,...Impact of stress management by development of emotional intelligence in cmts,...
Impact of stress management by development of emotional intelligence in cmts,...prjpublications
 
Extended information technology enabled service quality model for life insura...
Extended information technology enabled service quality model for life insura...Extended information technology enabled service quality model for life insura...
Extended information technology enabled service quality model for life insura...prjpublications
 
Employee spirituality and job engagement a correlational study across organi...
Employee spirituality and job engagement  a correlational study across organi...Employee spirituality and job engagement  a correlational study across organi...
Employee spirituality and job engagement a correlational study across organi...prjpublications
 
Anempirical study on the performance of self financing engineering colleges (...
Anempirical study on the performance of self financing engineering colleges (...Anempirical study on the performance of self financing engineering colleges (...
Anempirical study on the performance of self financing engineering colleges (...prjpublications
 
Studies on removal of acid orange 7 by advanced oxidation process using uv an...
Studies on removal of acid orange 7 by advanced oxidation process using uv an...Studies on removal of acid orange 7 by advanced oxidation process using uv an...
Studies on removal of acid orange 7 by advanced oxidation process using uv an...prjpublications
 

More from prjpublications (20)

Mems based optical sensor for salinity measurement
Mems based optical sensor for salinity measurementMems based optical sensor for salinity measurement
Mems based optical sensor for salinity measurement
 
An approach to design a rectangular microstrip patch antenna in s band by tlm...
An approach to design a rectangular microstrip patch antenna in s band by tlm...An approach to design a rectangular microstrip patch antenna in s band by tlm...
An approach to design a rectangular microstrip patch antenna in s band by tlm...
 
A design and simulation of optical pressure sensor based on photonic crystal ...
A design and simulation of optical pressure sensor based on photonic crystal ...A design and simulation of optical pressure sensor based on photonic crystal ...
A design and simulation of optical pressure sensor based on photonic crystal ...
 
Pattern recognition using video surveillance for wildlife applications
Pattern recognition using video surveillance for wildlife applicationsPattern recognition using video surveillance for wildlife applications
Pattern recognition using video surveillance for wildlife applications
 
Precision face image retrieval by extracting the face features and comparing ...
Precision face image retrieval by extracting the face features and comparing ...Precision face image retrieval by extracting the face features and comparing ...
Precision face image retrieval by extracting the face features and comparing ...
 
Keyless approach of separable hiding data into encrypted image
Keyless approach of separable hiding data into encrypted imageKeyless approach of separable hiding data into encrypted image
Keyless approach of separable hiding data into encrypted image
 
Encryption based multi user manner secured data sharing and storing in cloud
Encryption based multi user manner secured data sharing and storing in cloudEncryption based multi user manner secured data sharing and storing in cloud
Encryption based multi user manner secured data sharing and storing in cloud
 
A secure payment scheme in multihop wireless network by trusted node identifi...
A secure payment scheme in multihop wireless network by trusted node identifi...A secure payment scheme in multihop wireless network by trusted node identifi...
A secure payment scheme in multihop wireless network by trusted node identifi...
 
Preparation gade and idol model for preventing multiple spoofing attackers in...
Preparation gade and idol model for preventing multiple spoofing attackers in...Preparation gade and idol model for preventing multiple spoofing attackers in...
Preparation gade and idol model for preventing multiple spoofing attackers in...
 
Study on gis simulated water quality model
Study on gis simulated water quality modelStudy on gis simulated water quality model
Study on gis simulated water quality model
 
Smes role in reduction of the unemployment problem in the area located in sa...
Smes  role in reduction of the unemployment problem in the area located in sa...Smes  role in reduction of the unemployment problem in the area located in sa...
Smes role in reduction of the unemployment problem in the area located in sa...
 
Review of three categories of fingerprint recognition
Review of three categories of fingerprint recognitionReview of three categories of fingerprint recognition
Review of three categories of fingerprint recognition
 
Reduction of executive stress by development of emotional intelligence a stu...
Reduction of executive stress by development of emotional intelligence  a stu...Reduction of executive stress by development of emotional intelligence  a stu...
Reduction of executive stress by development of emotional intelligence a stu...
 
Mathematical modeling approach for flood management
Mathematical modeling approach for flood managementMathematical modeling approach for flood management
Mathematical modeling approach for flood management
 
Influences of child endorsers on the consumers
Influences of child endorsers on the consumersInfluences of child endorsers on the consumers
Influences of child endorsers on the consumers
 
Impact of stress management by development of emotional intelligence in cmts,...
Impact of stress management by development of emotional intelligence in cmts,...Impact of stress management by development of emotional intelligence in cmts,...
Impact of stress management by development of emotional intelligence in cmts,...
 
Extended information technology enabled service quality model for life insura...
Extended information technology enabled service quality model for life insura...Extended information technology enabled service quality model for life insura...
Extended information technology enabled service quality model for life insura...
 
Employee spirituality and job engagement a correlational study across organi...
Employee spirituality and job engagement  a correlational study across organi...Employee spirituality and job engagement  a correlational study across organi...
Employee spirituality and job engagement a correlational study across organi...
 
Anempirical study on the performance of self financing engineering colleges (...
Anempirical study on the performance of self financing engineering colleges (...Anempirical study on the performance of self financing engineering colleges (...
Anempirical study on the performance of self financing engineering colleges (...
 
Studies on removal of acid orange 7 by advanced oxidation process using uv an...
Studies on removal of acid orange 7 by advanced oxidation process using uv an...Studies on removal of acid orange 7 by advanced oxidation process using uv an...
Studies on removal of acid orange 7 by advanced oxidation process using uv an...
 

Recently uploaded

My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024The Digital Insurer
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Wonjun Hwang
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Enterprise Knowledge
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxhariprasad279825
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyAlfredo García Lavilla
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clashcharlottematthew16
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr LapshynFwdays
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfRankYa
 

Recently uploaded (20)

My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptx
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clash
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdf
 

Faulty node recovery and replacement algorithm for wireless sensor network

  • 1. International Journal of Electronics and Communication Engineering Research and Development (IJECERD), ISSN 2248-9525(Print), ISSN- 2248-9533 (Online) Volume 4, Number 2, April-June (2014) 36 FAULTY NODE RECOVERY AND REPLACEMENT ALGORITHM FOR WIRELESS SENSOR NETWORK Triveni C.L1 Rashmi T.S2 P.C Srikanth3 1 Assistant Professor, Department of ECE, Malnad College of Engineering, Hassan, India 2 Department of ECE, Malnad College of Engineering, Hassan, India 3 Professor and Head, Department of ECE, Malnad College of Engineering, Hassan, India ABSTRACT This paper proposes an algorithm by combining grade diffusion and genetic algorithm to enhance the lifetime of a wireless sensor network. The algorithm is named as Fault Node Recovery and Replacement algorithm. The algorithm enhances the lifetime of the wireless sensor network with fewer replacements of sensor nodes. In the simulation it is shown that the proposed algorithm increases the number of active node, reduces the rate of data loss, increases the life time of the wireless sensor network and reduces the rate of energy consumption. Keywords: Grade Diffusion (GD), Genetic Algorithm (GA), Fault Node Recovery and Replacement (FNRR), Wireless Sensor Networks (WSN). 1. INTRODUCTION Recent advances in micro processing, wireless and battery technology, and smart sensors have enhanced data processing [1], [2], [3], wireless communication, and detection capability. In sensor networks, each sensor node has limited wireless computational power to process and transfer the live data to the base station or data collection center [4], [5], [6]. Therefore, to increase the sensor area and the transmission area [7], [8], the wireless sensor network usually contains many sensor nodes. Generally, each sensor node has a low level of battery power that cannot be replenished. When the energy of a sensor node is exhausted, wireless sensor network leaks will appear, and the failed nodes will not relay data to the other nodes during transmission processing. Thus, the other sensor nodes will be burdened with increased transmission processing. This paper proposes an algorithm by combining grade diffusion (GD) and Genetic Algorithm (GA) to enhance the lifetime of a wireless sensor network (WSN) when some of the sensor nodes shut down because they no longer have battery energy. Existing algorithms IJECERD © PRJ PUBLICATION International Journal of Electronics and Communication Engineering Research and Development (IJECERD) ISSN 2248– 9525 (Print) ISSN 2248 –9533 (Online) Volume 4, Number 2, April- June (2014), pp. 36-44 © PRJ Publication, http://www.prjpublication.com/IJECERD.asp
  • 2. International Journal of Electronics and Communication Engineering Research and Development (IJECERD), ISSN 2248-9525(Print), ISSN- 2248-9533 (Online) Volume 4, Number 2, April-June (2014) 37 for recovery and replacement are costlier and implementation is difficult. The algorithm proposed in the paper is easier to implement and since it replaces some of the sensor nodes it is not much expensive. The proposed algorithm can result in fewer replacements of sensor nodes. Thus, the algorithm enhances the WSN lifetime and also reduces the cost of replacing the sensor nodes. 2. RELATED WORK The traditional approaches to sensor network routing include the directed diffusion (DD) [9] algorithm and the grade diffusion (GD) [3] algorithm. The algorithm proposed in this paper is based on the GD algorithm, with the goal of replacing fewer sensor nodes that are inoperative or have depleted batteries. These optimizations will ultimately enhance the WSN lifetime and reduce sensor node replacement cost. 2.1 Directed Diffusion Algorithm A series of routing algorithms [10], [11] for wireless sensor networks have been proposed in recent years. C. Intanagonwiwat et al. presented the Directed Diffusion (DD) algorithm [10]. The goal of the DD algorithm is to reduce the data relay transmission counts for power management. The DD algorithm is a query-driven transmission protocol. The collected data is transmitted only if it matches the query from the sink node. In the DD algorithm, the sink node provides the queries in the form of attribute-value pairs to the other sensor nodes by broadcasting the query packets to the whole network. Subsequently, the sensor nodes send the data back to the sink node only when it fits the queries. 2.2 Fault Recovery Techniques Fault recovery techniques enable systems to continue operating according to their specifications even if faults of a certain type are present. The most widely used fault recovery techniques are as follows. Replication of components is one of the most widely used fault recovery technique. Although redundancy has several advantages in terms of high reliability and availability, it also increases the costs of a deployment. There are two types in replication of nodes. 2.2.1 Active replication in WSN Active replication in wireless sensor networks is naturally applied in scenarios where all, or many, nodes provide the same functionality. Nodes that run this service activate their sensors and forward their readings to an aggregation service or to a base station. When some nodes fail to provide that information, the recipient still gets the results from other nodes, which is often sufficient. Fault recovery in the presence of active replicas is relatively straightforward. Some of these approaches are: 1) Multipath routing 2) Sensor value aggregation 3) Ignore values from faulty nodes. 2.2.2 Passive replication in WSN When passive replication is applied, the primary replica receives all requests and processes them. In order to maintain consistency between replicas, the state of the primary replica and the request information are transferred to the backup replicas. Given the constraints of WSNs, applications should be designed to have only little or no state at all, which minimizes the overhead for transferring state information between nodes or eliminates it altogether. The process of recovering from a fault when using passive replication consists of three main steps: fault detection, primary selection and service distribution.
  • 3. International Journal of Electronics and Communication Engineering Research and Development (IJECERD), ISSN 2248-9525(Print), ISSN- 2248-9533 (Online) Volume 4, Number 2, April-June (2014) 38 3. FAULT NODE RECOVERY AND REPLACEMENT (FNRR) ALGORITHM The power consumption of the sensor nodes in WSNs is unavoidable. This paper, however, proposes an algorithm to search for and replace fewer sensor nodes and to reuse the most routing paths. Conventional search techniques are often incapable of optimizing nonlinear functions with multiple variables. One scheme, the genetic algorithm (GA) [12], is a directed random search technique developed in 1975, based on the concept of natural genetics. The current paper proposes a fault node recovery and replacement (FNRR) algorithm based on the GD algorithm combined with the GA. The FNRR algorithm creates a routing table using the GD algorithm and replaces sensor nodes using the GA when the number of sensor nodes that are not functioning. This algorithm not only reuses the most routing paths to enhance the WSN lifetime but also reduces the replacement cost. 3.1 Grade Diffusion Algorithm Grade Diffusion Algorithm is proposed to solve the power consumption and transmission routing problems in wireless sensor networks [13]. In the grade diffusion algorithm the first step is to assign the grade for the sensor nodes and to update the routing table for each node. The data transmission takes place from higher grade nodes to lower grade nodes and hence it is named as grade diffusion algorithm. The GD algorithm is fast and completely creates the grade table in each sensor node based on the entire wireless sensor network by issuing the grade create packet that is created from the sink node. The process of grade diffusion is as follows. First, the sink node broadcasts the grade-creating package with the grade value of zero. A grade value of one means that the sensor node receiving this grade-creating package transmits data to the sink node requires only one hop. The sensor nodes ‘‘b’’ and ‘‘c’’ receive a ladder-creating package with a grade value of one from sink node ‘‘a’’. Then sensor nodes ‘‘b’’ and ‘‘c’’ increase the grade value of the ladder-creating package to two and broadcast the modified ladder-creating package. A grade value of two means that the sensor node receiving this ladder-creating package sends data to the sink node requires two hops count. The sensor nodes ‘‘d’’, ‘‘e’’, and ‘‘f’’ receive ladder-creating packages with a grade value of two from nodes ‘‘b’’ and ‘‘c’’. Sensor nodes ‘‘d’’, ‘‘e’’ and ‘‘f’’ increase the grade value of the ladder-creating package to three and broadcast the modified package again. Sensor nodes ‘‘b’’, ‘‘g’’ and ‘‘h’’ receive this ladder-creating package, but node ‘‘b’’ discards the package because the grade value of this package is three, which is higher than the recording value in the ladder table for node ‘‘b’’. Moreover, if many sensor nodes simultaneously broadcast ladder-creating packages with the same grade value, the sensor nodes receive and record the packages in their respective ladder tables as back-up nodes. Thus, node ‘‘h’’ recording nodes ‘‘d’’ and ‘‘f’’ in the ladder table. Finally, sensor nodes ‘‘g’’ and ‘‘h’’ increase the grade value of the ladder-creating package to four and broadcast the ladder-creating package. But the sensor nodes discard the package because the grade value of the sensor nodes surrounding nodes ‘‘g’’ and ‘‘h’’ are less than four. The process of ladder diffusion is thus complete, as shown in Fig. 1.
  • 4. International Journal of Electronics and Communication Engineering Research and Development (IJECERD), ISSN 2248-9525(Print), ISSN- 2248-9533 (Online) Volume 4, Number 2, April-June (2014) 39 Fig 1: Grade Diffusion Process The data transmission takes place from higher grade node to lower grade node as shown in Fig 2. Each sensor node records the grade value in the ladder table when the ladder diffusion algorithm is applied. The sensor node can record more than one node as relay nodes in the ladder table when receiving the ladder-creating package with a grade value less than itself. Fig 2: Data transfer route of sensor nodes 3.2 Genetic Algorithm for Fault Node Replacement Grade Diffusion Algorithm is used for data transmission in the network. Genetic Algorithm is used to replace the faulty nodes in the network. Genetic Algorithm has to run once after 30 iterations for fault node recovery. The steps for faulty node replacement are as follows.
  • 5. International Journal of Electronics and Communication Engineering Research and Development (IJECERD), ISSN 2248-9525(Print), ISSN- 2248-9533 (Online) Volume 4, Number 2, April-June (2014) 40 3.2.1 Initialization At this step the chromosomes are generated. All the faulty nodes in the network whose energy is less than the threshold level must be listed. The length of the chromosome is equal to the number of faulty nodes in the network. The elements in the genes are either 0 or 1. A 1 means the node should be replaced and a 0 means that the node will not be replaced. Here population size is limited to only 4. Fig. 3 represents a chromosome. The chromosome length is 10 and the gene is 0 or 1, chosen randomly in the initialization step. In this case, there are 10 sensor nodes not functioning, and their node numbers are 9, 7, 10, 81, 23, 57, 34, 46, 66, and 70. Fig 3: Chromosome and its gene 3.2.2 Evaluation The chromosomes are evaluated based upon how many lower grade nodes will be replaced by the chromosome. 3.3.3 Selection Out of the above four chromosomes choose the two chromosomes which replaces many lower grade sensor nodes. This is shown in the Fig. 4. Fig 4: Selection Step 3.3.4 Crossover The crossover step is used in the genetic algorithm to change the individual chromosome. In this algorithm, one-point crossover strategy is used to create new chromosomes, as shown in Fig. 5. Two chromosomes chosen in the selection are used to produce two new offspring. A crossover point is selected between the first and last genes of the parent individuals. Then, the fraction of each individual on either side of the crossover point is exchanged and concatenated.
  • 6. International Journal of Electronics and Communication Engineering Research and Development (IJECERD), ISSN 2248-9525(Print), ISSN- 2248-9533 (Online) Volume 4, Number 2, April-June (2014) 41 Fig 5: Crossover Step 3.3.5 Mutation The mutation step can introduce traits not found in the original individuals and prevents the GA from converging too fast. In this algorithm, simply a gene is randomly flipped. The chromosome is as shown in Fig. 6. Fig 6: Mutation Step The FNR algorithm will replace the sensor nodes in the chromosome with genes of 1 to extend the WSN lifetime. 4. SIMULATION In the simulation the sensor nodes are uniformly distributed over 100*100 area in grid manner. The radio ranges (transmission range) of the nodes were set to 15 units. The data packages were exchanged between random source/destination pairs with 100 event data packages. The power of each sensor node is set to 3000 W that is the actual available energy. Each sensor consumed 50W when it conducts a data transformation. The active sensor nodes, total energy consumption and total dead nodes after 120 events are shown in Figs. 7, 8 and 9. The active nodes mean that the sensor node has enough energy to transfer data to other nodes, but some sensor nodes can be deleted from the active nodes list if their routing tables do not have a sensor node that can be used as a relay node, or if they are not in the routing table of any other sensor nodes.
  • 7. International Journal of Electronics and Communication Engineering Research and Development (IJECERD), ISSN 2248-9525(Print), ISSN- 2248-9533 (Online) Volume 4, Number 2, April-June (2014) 42 Fig 7: Number of Alive Nodes As shown in fig 7 FNRR algorithm recovers the faulty nodes for every 30 iterations and hence keeps most of the nodes alive. As shown in fig 7 even after 100 data events number of alive nodes is greater than 60. In grade diffusion algorithm only 50% of the nodes are alive after 40 data transmissions. Fig 8: Number of dead nodes As shown in fig 8 throughout the data transmission number of dead nodes is less than five whereas with grade diffusion algorithm more than 50% of the nodes are dead by 40 data events. So FNRR algorithm reduces the number of dead nodes by 96% as compared to grade diffusion.
  • 8. International Journal of Electronics and Communication Engineering Research and Development (IJECERD), ISSN 2248-9525(Print), ISSN- 2248-9533 (Online) Volume 4, Number 2, April-June (2014) 43 Fig 9: Power Consumption Power consumed for data transmission from source to sink for different iterations is shown in fig 9. Power consumption of FNRR algorithm is around 20mJ. The power consumed by the grade diffusion algorithm is around 110mJ. Hence power consumption for data transmission of fault node recovery is lesser compared to grade diffusion algorithm. As shown in fig 10 number of hops required for data transmission is lesser for FNRR algorithm compared to grade diffusion algorithm. Since the number of hops required for data transmission is lesser it takes lesser time for data transmission. Fig 10: Number of Hops for Data Transmission
  • 9. International Journal of Electronics and Communication Engineering Research and Development (IJECERD), ISSN 2248-9525(Print), ISSN- 2248-9533 (Online) Volume 4, Number 2, April-June (2014) 44 5. CONCLUSION In real wireless sensor networks, the sensor nodes use battery power supplies and thus have limited energy resources. In addition to the routing, it is important to research the optimization of sensor node replacement, reducing the replacement cost. This paper proposes a faulty node recovery and replacement algorithm for WSN based on the grade diffusion algorithm combined with a genetic algorithm. The FNRR algorithm requires replacing fewer sensor nodes and reuses the most routing paths, increasing the WSN lifetime and reducing the replacement cost. In the simulation, the proposed algorithm increases the number of active nodes reduces the rate of energy consumption. Therefore, the FNRR algorithm not only replaces sensor nodes, but also reduces the replacement cost. 6. REFERENCES [1] S. Corson and J. Macker, Mobile Ad Hoc Networking (MANET): Routing Protocol Performance Issues and Evaluation Considerations. New York, NY, USA: ACM, 1999. [2] T. H. Liu, S. C. Yi, and X. W. Wang, “A fault management protocol for low-energy and efficient wireless sensor networks,” J. Inf. Hiding Multimedia Signal Process., vol. 4, no. 1, pp. 34–45, 2013. [3] E. M. Royer and C. K. Toh, “A review of current routing protocols for ad-hoc mobile networks,” IEEE Personal Commun., vol. 6, no. 2, pp. 46–55, Apr. 1999. [4] F. C. Chang and H. C. Huang, “A refactoring method for cache-efficient swarm intelligence algorithms,” Inf. Sci., vol. 192, no. 1, pp. 39–49, Jun. 2012. [5] Z. He, B. S. Lee, and X. S. Wang, “Aggregation in sensor networks with a user- provided quality of service goal,” Inf. Sci., vol. 178, no. 9, pp. 2128–2149, 2008. [6] J. H. Ho, H. C. Shih, B. Y. Liao, and S. C. Chu, “A ladder diffusion algorithm using ant colony optimization for wireless sensor networks,” Inf. Sci., vol. 192, pp. 204– 212, Jun. 2012. [7] J. A. Carballido, I. Ponzoni, and N. B. Brignole, “CGD-GA: A graphbased genetic algorithm for sensor network design,” Inf. Sci., vol. 177, no. 22, pp. 5091–5102, 2007. [8] J. Pan, Y. Hou, L. Cai, Y. Shi, and X. Shen, “Topology control for wireless sensor networks,” in Proc. 9th ACM Int. Conf. Mobile Comput. Netw., 2003, pp. 286–299. [9] T. P. Hong and C. H. Wu, “An improved weighted clustering algorithm for determination of application nodes in heterogeneous sensor networks,” J. Inf. Hiding Multimedia Signal Process, vol. 2, no. 2, pp. 173–184, 2011. [10] C. Intanagonwiwat, R. Govindan, D. Estrin, J. Heidemann, and F. Silva, “Directed diffusion for wireless sensor networking,” IEEE/ACM Trans. Netw., vol. 11, no. 1, pp. 2–16, Feb. 2003. [11] W. H. Liao, Y. Kao, and C. M. Fan, “Data aggregation in wireless sensor networks using ant colony algorithm,” J. Netw. Comput. Appl., vol. 31, no. 4, pp. 387–401, 2008. [12] M. Gen and R. Cheng, Genetic Algorithms and Engineering Design. New York, NY, USA: Wiley, 1997. [13] J. H. Ho, H. C. Shih, B. Y. Liao, and J. S. Pan, “Grade diffusion algorithm,” in Proc. 2nd Int. Conf. Eng. Technol. Innov., 2012, pp. 2064–2068.