Wireless Sensor Networks have come to the forefront of the scientific community recently and it consists of small nodes with sensing, Communications and computing capabilities. The Wireless Sensor Network Systems can be applied to monitor different environments ranging from military to civil applications. It is observed that different protocols necessary for smooth functioning of the network system are highly application specific. Current WSNs typically communicate directly with a centralized controller or satellite. In this paper we survey the different research challenges in Wireless Sensor Networks and purpose of various research Challenges activities is the development of a framework, which is radically simplifies the development of software for sensor network applications and characteristic Features of Sensor Networks.
A Study on Access Point Selection Algorithms in Wireless Mesh NetworksEswar Publications
This document discusses access point (AP) selection algorithms in wireless mesh networks (WMNs). It analyzes the limitations of the traditional AP selection method defined by IEEE 802.11, which is based solely on received signal strength. The paper studies AP selection as a key problem in WMNs and identifies important parameters that should be considered, such as link quality, load balancing, cross-layer interactions, and dynamic association. It also provides directions for designing new AP selection metrics that are better suited for WMN environments.
An Approach of Mobile Wireless Sensor Network for Target Coverage and Network...IRJET Journal
This document discusses using mobile sensors to improve target coverage and network connectivity in wireless sensor networks. It first defines key concepts in mobile wireless sensor networks like coverage, connectivity, and network lifetime. It then reviews existing literature on algorithms for mobile sensor deployment to optimize target coverage and network connectivity with minimum movement. The proposed method aims to deploy mobile sensors with no movement needed to achieve both target coverage and network connectivity. The goal is to minimize energy consumption from sensor movement.
Maximize resource utilization based channel access model with presence of re...IJECEIAES
Underwater sensor networks (UWSNs) are vulnerable to jamming attacks. Especially, reactive jamming which emerged as a greatest security threat to UWSNs. Reactive jammer are difficult to be removed, defended and identified. Since reactive jammer can control and regulate (i.e., the duration of the jam signal) the probability of jamming for maintaining high vulnerability with low detection probability. The existing model are generally designed considering terrestrial wireless sensor networks (TWSNs). Further, these models are limited in their ability to detect jamming correctly, distinguish between the corrupted and uncorrupted parts of a packet, and be adaptive with the dynamic environment. Cooperative jamming model has presented in recent times to utilize resource efficiently. However, very limited work is carried out using cooperative jamming detection. For overcoming research challenges, this work present Maximize Resource Utilization based Channel Access (MRUCA). The MRUCA uses cross layer design for mitigating reactive jammer (i.e., MRUCA jointly optimizes the cooperative hopping probabilities and channel accessibility probabilities of authenticated sensor device). Along with channel, load capacity of authenticated sensor device is estimated to utilize (maximize) resource efficiently. Experiment outcome shows the proposed MRUCA model attain superior performance than state-of-art model in terms of packet transmission, BER and Detection rate.
Survey of Wireless Sensor Network Applicationijsrd.com
Sensor networks offer a powerful combination of distributed sensing, computing and communication. They lend themselves to countless applications and, at the same time, offer numerous challenges due to their peculiarities, primarily the stringent energy constraints to which sensing nodes are typically subjected. The distinguishing traits of sensor networks have a direct impact on the hardware design of the nodes at least four levels: power source, processor, communication hardware, and sensors. Various hardware platforms have already been designed to test the many ideas spawned by the re-search community and to implement applications to virtually all fields of science and technology. We are convinced that CAS will be able to provide a substantial contribution to the development of this exciting field. A wireless sensor network (WSN) has important applications such as remote environmental monitoring and target tracking. This has been enabled by the availability, particularly in recent years, of sensors that are smaller, cheaper, and intelligent. These sensors are equipped with wireless interfaces with which they can communicate with one another to form a network. The design of a WSN depends significantly on the application, and it must consider factors such as the environment, the application's design objectives, cost, hardware, and system constraints. The goal of our survey is to present a comprehensive review of the recent literature since the publication of [I.F. Akyildiz, W. Su, Y. Sankarasubramaniam, E. Cayirci, A survey on sensor networks, IEEE Communications Magazine, 2002]. Following a top-down approach, we give an overview of several new applications and then review the literature on various aspects of WSNs. We classify the problems into three different categories: (1) Internal platform and underlying operating system, (2) Communication protocol stack, and (3) Network services, provisioning, and deployment. We review the major development in these three categories and outline new challenges.
DATA TRANSMISSION IN WIRELESS SENSOR NETWORKS FOR EFFECTIVE AND SECURE COMMUN...IJEEE
Data transmission occurs from transmitting node to sink node, which communicate each other via large number of intermediate nodes or directly to an external base station. A network consists of numbers of nodes with one as a source and one or more as a destination node.
IRJET- Congestion Avoidance and Qos Improvement in Base Station with Femt...IRJET Journal
The document discusses improving quality of service in cellular base stations using femtocells. It proposes using femtocells, which are small low-power cellular base stations installed in homes or businesses, to improve coverage, capacity, and throughput. Femtocells could help reduce packet loss and congestion by closing gaps between network cells. The document reviews existing approaches like hedonic regression models and packet delivery ratio, and analyzes signal-to-noise ratios, interference, and system capacity for macro and small cells. Femtocells may enhance conventional networks by extending coverage areas and improving mobile data capacity.
Secured node detection technique based on artificial neural network for wirel...IJECEIAES
The wireless sensor network is becoming the most popular network in the last recent years as it can measure the environmental conditions and send them to process purposes. Many vital challenges face the deployment of WSNs such as energy consumption and security issues. Various attacks could be subjects against WSNs and cause damage either in the stability of communication or in the destruction of the sensitive data. Thus, the demands of intrusion detection-based energy-efficient techniques rise dramatically as the network deployment becomes vast and complicated. Qualnet simulation is used to measure the performance of the networks. This paper aims to optimize the energy-based intrusion detection technique using the artificial neural network by using MATLAB Simulink. The results show how the optimized method based on the biological nervous systems improves intrusion detection in WSN. In addition to that, the unsecured nodes are affected the network performance negatively and trouble its behavior. The regress analysis for both methods detects the variations when all nodes are secured and when some are unsecured. Thus, Node detection based on packet delivery ratio and energy consumption could efficiently be implemented in an artificial neural network.
This document presents a virtual grid-based dynamic routes adjustment (VGDRA) scheme for wireless sensor networks with a mobile sink. The scheme aims to minimize the energy consumed when sensor nodes adjust their routes to the sink's new location. It divides the sensor field into a virtual grid with cell headers. When the sink moves, only the cell headers participate in rerouting to the new location, reducing the communication cost compared to all nodes adjusting routes. The VGDRA scheme maintains nearly optimal routes to the mobile sink while minimizing the cost of route reconstruction as the sink moves.
A Study on Access Point Selection Algorithms in Wireless Mesh NetworksEswar Publications
This document discusses access point (AP) selection algorithms in wireless mesh networks (WMNs). It analyzes the limitations of the traditional AP selection method defined by IEEE 802.11, which is based solely on received signal strength. The paper studies AP selection as a key problem in WMNs and identifies important parameters that should be considered, such as link quality, load balancing, cross-layer interactions, and dynamic association. It also provides directions for designing new AP selection metrics that are better suited for WMN environments.
An Approach of Mobile Wireless Sensor Network for Target Coverage and Network...IRJET Journal
This document discusses using mobile sensors to improve target coverage and network connectivity in wireless sensor networks. It first defines key concepts in mobile wireless sensor networks like coverage, connectivity, and network lifetime. It then reviews existing literature on algorithms for mobile sensor deployment to optimize target coverage and network connectivity with minimum movement. The proposed method aims to deploy mobile sensors with no movement needed to achieve both target coverage and network connectivity. The goal is to minimize energy consumption from sensor movement.
Maximize resource utilization based channel access model with presence of re...IJECEIAES
Underwater sensor networks (UWSNs) are vulnerable to jamming attacks. Especially, reactive jamming which emerged as a greatest security threat to UWSNs. Reactive jammer are difficult to be removed, defended and identified. Since reactive jammer can control and regulate (i.e., the duration of the jam signal) the probability of jamming for maintaining high vulnerability with low detection probability. The existing model are generally designed considering terrestrial wireless sensor networks (TWSNs). Further, these models are limited in their ability to detect jamming correctly, distinguish between the corrupted and uncorrupted parts of a packet, and be adaptive with the dynamic environment. Cooperative jamming model has presented in recent times to utilize resource efficiently. However, very limited work is carried out using cooperative jamming detection. For overcoming research challenges, this work present Maximize Resource Utilization based Channel Access (MRUCA). The MRUCA uses cross layer design for mitigating reactive jammer (i.e., MRUCA jointly optimizes the cooperative hopping probabilities and channel accessibility probabilities of authenticated sensor device). Along with channel, load capacity of authenticated sensor device is estimated to utilize (maximize) resource efficiently. Experiment outcome shows the proposed MRUCA model attain superior performance than state-of-art model in terms of packet transmission, BER and Detection rate.
Survey of Wireless Sensor Network Applicationijsrd.com
Sensor networks offer a powerful combination of distributed sensing, computing and communication. They lend themselves to countless applications and, at the same time, offer numerous challenges due to their peculiarities, primarily the stringent energy constraints to which sensing nodes are typically subjected. The distinguishing traits of sensor networks have a direct impact on the hardware design of the nodes at least four levels: power source, processor, communication hardware, and sensors. Various hardware platforms have already been designed to test the many ideas spawned by the re-search community and to implement applications to virtually all fields of science and technology. We are convinced that CAS will be able to provide a substantial contribution to the development of this exciting field. A wireless sensor network (WSN) has important applications such as remote environmental monitoring and target tracking. This has been enabled by the availability, particularly in recent years, of sensors that are smaller, cheaper, and intelligent. These sensors are equipped with wireless interfaces with which they can communicate with one another to form a network. The design of a WSN depends significantly on the application, and it must consider factors such as the environment, the application's design objectives, cost, hardware, and system constraints. The goal of our survey is to present a comprehensive review of the recent literature since the publication of [I.F. Akyildiz, W. Su, Y. Sankarasubramaniam, E. Cayirci, A survey on sensor networks, IEEE Communications Magazine, 2002]. Following a top-down approach, we give an overview of several new applications and then review the literature on various aspects of WSNs. We classify the problems into three different categories: (1) Internal platform and underlying operating system, (2) Communication protocol stack, and (3) Network services, provisioning, and deployment. We review the major development in these three categories and outline new challenges.
DATA TRANSMISSION IN WIRELESS SENSOR NETWORKS FOR EFFECTIVE AND SECURE COMMUN...IJEEE
Data transmission occurs from transmitting node to sink node, which communicate each other via large number of intermediate nodes or directly to an external base station. A network consists of numbers of nodes with one as a source and one or more as a destination node.
IRJET- Congestion Avoidance and Qos Improvement in Base Station with Femt...IRJET Journal
The document discusses improving quality of service in cellular base stations using femtocells. It proposes using femtocells, which are small low-power cellular base stations installed in homes or businesses, to improve coverage, capacity, and throughput. Femtocells could help reduce packet loss and congestion by closing gaps between network cells. The document reviews existing approaches like hedonic regression models and packet delivery ratio, and analyzes signal-to-noise ratios, interference, and system capacity for macro and small cells. Femtocells may enhance conventional networks by extending coverage areas and improving mobile data capacity.
Secured node detection technique based on artificial neural network for wirel...IJECEIAES
The wireless sensor network is becoming the most popular network in the last recent years as it can measure the environmental conditions and send them to process purposes. Many vital challenges face the deployment of WSNs such as energy consumption and security issues. Various attacks could be subjects against WSNs and cause damage either in the stability of communication or in the destruction of the sensitive data. Thus, the demands of intrusion detection-based energy-efficient techniques rise dramatically as the network deployment becomes vast and complicated. Qualnet simulation is used to measure the performance of the networks. This paper aims to optimize the energy-based intrusion detection technique using the artificial neural network by using MATLAB Simulink. The results show how the optimized method based on the biological nervous systems improves intrusion detection in WSN. In addition to that, the unsecured nodes are affected the network performance negatively and trouble its behavior. The regress analysis for both methods detects the variations when all nodes are secured and when some are unsecured. Thus, Node detection based on packet delivery ratio and energy consumption could efficiently be implemented in an artificial neural network.
This document presents a virtual grid-based dynamic routes adjustment (VGDRA) scheme for wireless sensor networks with a mobile sink. The scheme aims to minimize the energy consumed when sensor nodes adjust their routes to the sink's new location. It divides the sensor field into a virtual grid with cell headers. When the sink moves, only the cell headers participate in rerouting to the new location, reducing the communication cost compared to all nodes adjusting routes. The VGDRA scheme maintains nearly optimal routes to the mobile sink while minimizing the cost of route reconstruction as the sink moves.
Secure data dissemination protocol in wireless sensor networks using xor netw...eSAT Publishing House
1. The document discusses a secure data dissemination protocol for wireless sensor networks using XOR network coding. It aims to achieve fast, secure, reliable and energy efficient data dissemination.
2. Wireless sensor networks require regular software updates through the wireless medium, which is known as data dissemination or network reprogramming. Existing dissemination protocols have security issues when combined with network coding techniques.
3. The proposed protocol uses simple cryptographic techniques with network coding to prevent pollution and denial of service attacks, while still achieving fast dissemination. It focuses on disseminating small data values securely and efficiently in wireless sensor networks.
A Survey of Fault Tolerance Methods in Wireless Sensor NetworksIRJET Journal
This document summarizes and analyzes various fault tolerance mechanisms for wireless sensor networks. It discusses mobile agent mechanisms, relay node mechanisms, and handover mechanisms. The document analyzes several existing fault tolerance methods, including Bayesian network models, probabilistic combinatorial optimization, dynamic power level adjustment, and integrated fault tolerance frameworks. Overall, the document provides an overview of important fault tolerance issues in wireless sensor networks and different approaches that have been proposed to address faults and improve reliability.
A Survey of Various Data Communication Schemes in WSNIRJET Journal
This document summarizes various data communication schemes used in wireless sensor networks (WSNs). It discusses key issues in WSNs like energy efficiency, data aggregation, and network lifetime. It then summarizes several common routing protocols used in WSNs to address these issues, including LEACH, PEGASIS, HEED, DEEC, TEEN, and SEP. LEACH uses randomized clustering to distribute energy load among sensors. PEGASIS forms chains to reduce transmissions. HEED allows energy-aware cluster head selection. DEEC handles heterogeneity. TEEN and SEP aim to improve responsiveness and support multi-level heterogeneity. The document concludes with a brief introduction to using fuzzy logic in WSN routing
IRJET- Vanet Connection Performance Analysis using GPSR ProtocolIRJET Journal
The document discusses performance analysis of VANET (vehicular ad hoc network) connections using the GPSR (Greedy Perimeter Stateless Routing) protocol. It proposes an energy-aware version of GPSR that optimizes greedy forwarding by selecting neighbor nodes to forward packets to based on both distance to the destination and remaining energy. The methodology section describes simulating the VANET network, implementing traffic monitoring using probe messages, predicting link lifetimes, using Bloom filters for 2-hop neighbor management, and evaluating performance based on data throughput and transmission time. The conclusion states that incorporating link lifetime prediction into an existing reliable routing protocol like RIVER can improve reliability in VANETs.
IRJET- An Introduction to Wireless Sensor Networks, its Challenges and SecurityIRJET Journal
- Wireless sensor networks (WSNs) are composed of small, battery-powered sensor nodes that collect data from the environment and transmit it to each other and a base station. They face challenges related to node mobility, energy efficiency, and lifetime.
- The document discusses clustering in WSNs, which involves organizing nodes into clusters with cluster heads to improve stability and reduce energy consumption. It also covers security issues and applications of WSNs in various fields like healthcare, the environment, and more.
A Comparative Review on Reliability and Fault Tolerance Enhancement Protocols...IRJET Journal
This document provides a comparative review of reliability and fault tolerance enhancement protocols in wireless sensor networks. It first discusses key challenges for wireless sensor networks related to node failures in harsh environments. It then summarizes several existing fault detection and recovery techniques. The document compares protocols like E2SRT, GARUDA, RCRT, and ZARB that aim to improve reliability. It highlights issues around achieving fault tolerance and concludes that no single approach can provide a fully reliable solution, requiring a hybrid method using the best features of different protocols.
Iaetsd quick detection technique to reduce congestion inIaetsd Iaetsd
This document proposes a quick detection technique (QDT) to avoid congestion in wireless sensor networks. QDT uses the queue buffer length of sensor nodes to estimate impending congestion and diffuses traffic across multiple paths to the base station. By dynamically routing traffic away from congested areas, QDT aims to improve packet delivery ratios and event reporting while avoiding congestion. The technique detects inactive nodes that do not properly forward or drop packets, and routes around them to reduce delays and maximize network lifetime. Simulation results show QDT significantly improves event reporting and packet delivery compared to other techniques.
IRJET- Robustness Strategy for Securing Data from Cyber AttacksIRJET Journal
This document summarizes a research paper that proposes a new algorithm called ROSE to improve the robustness of scale-free wireless sensor networks against malicious attacks. The ROSE algorithm rearranges network edges to transform the topology into an onion-like structure that is proven to be robust. It does this without changing the power-law degree distribution of the original scale-free network. The algorithm consists of two phases - a degree difference operation and an angle sum operation - that move the network towards a distributed structure where nodes of similar degree are connected. Simulation results showed ROSE significantly enhances network robustness against attacks while retaining the scale-free property.
This document summarizes an evaluation of ad-hoc routing protocols for wireless sensor networks. It analyzes the performance of three protocols - DSDV, AODV, and DSR - through simulation. The results show that AODV has the best performance with less degradation and packet loss compared to DSDV and DSR as node mobility increases. AODV is therefore identified as the most suitable routing protocol for use in mobile wireless sensor networks based on its ability to handle topology changes from node movement.
Study Of Coded Based Mechanism In WSN SystemIJERA Editor
This document summarizes a study on providing quality of service (QoS) in wireless sensor networks through the use of error correcting codes and selective encryption. It first provides background on wireless sensor networks and challenges in providing QoS. It then discusses forward error correction techniques like Reed-Solomon coding that can improve reliability while reducing energy consumption compared to retransmissions. It also discusses selective encryption algorithms that can encrypt parts of data to provide security with lower computation costs than fully encrypting all data. The document reviews open research issues in QoS for wireless sensor networks and improving the tradeoff between reliability, security and energy efficiency.
A SURVEY OF ENERGY-EFFICIENT COMMUNICATION PROTOCOLS IN WSNIAEME Publication
Wireless sensor networks are harshly restricted by storage capacity, energy and computing power. Wireless Sensor Networks have acquired a lot of attention by research community, manufacturer as well as actual users for monitoring remote trades and how to gather data in different environment. The wireless sensor nodes are especially battery powered devices having life can be extended for some times while long lasting and reliable for maintaining consumption of energy and network lifetime while designs applications and protocols. So it is essential to design effective and energy efficient protocol in order to enhance the network lifetime. In this paper we present the study of different energy efficient communication protocols of Wireless Sensor Networks (WSNs).Then some of the communication protocols which are widely used in WSNs to improve network performance are also discussed advantages and disadvantages of each protocols.
11.providing security to wireless packet networks by using optimized security...Alexander Decker
This document discusses providing security to wireless packet networks using an optimized security method. It proposes encrypting data packets when they are scheduled using the Blowfish encryption algorithm. This would secure the packets at the initial level of scheduling, preventing attackers from modifying packets even if they are delayed. The document outlines the Blowfish algorithm and its use of variable-length keys and data encryption in rounds to encrypt packets. It also describes the system model used and assumptions made, including modeling the wireless channel as a switch and defining packet attributes like arrival time, processing time, security level and deadline. Encrypting packets at the scheduling level with Blowfish aims to securely transmit real-time data over wireless networks.
This document summarizes a paper on the challenges of wireless sensor networks, with a focus on time synchronization issues. It discusses how wireless sensor networks face many constraints including limited energy, bandwidth, and resources. It also outlines various challenges such as security, deployment, and design constraints. The document then discusses the importance of time synchronization for applications requiring coordination between sensor nodes. It describes issues that can cause clocks to drift like clock skew. It also analyzes different communication methods and synchronization protocols for wireless sensor networks, comparing their advantages and disadvantages.
Human: Thank you, that is a concise 3 sentence summary that captures the key aspects of the document.
Mobile Adhoc Network (MANET) is a self-configuring and infrastructure-less network which consists of mobile devices such as mobiles, laptops, PDA's etc. Because of its lack of infrastructure, wireless mobile communication, dynamic topology, MANET is vulnerable to various security attacks. This survey paper presents an overview of developments of voting and non-voting based certificate revocation mechanisms in past few years. Certificate revocation is an important method used to secure the MANET. Certificate revocation isolates the attacker nodes from participating in network activities by revoking its certificate. Over last few years different schemes are explored for certificate revocation. In concluding section we present the limitations of the current cluster based certificate revocation scheme.
Support Recovery with Sparsely Sampled Free Random Matrices for Wideband Cogn...IJMTST Journal
The main objective of this project is to design an eigenvalue-based compressive SOE technique using asymptotic random matrix theory. In this project, investigating blind sparsity order estimation (SOE) techniques is an open research issue. To address this, this project presents an eigenvalue-based compressive SOE technique using asymptotic random matrix theory. Finally, this project propose a technique to estimate the sparsity order of the wideband spectrum with compressive measurements using the maximum eigenvalue of the measured signal's covariance matrix. .
Risk Assessment for Identifying Intrusion in ManetIOSR Journals
This document presents a risk assessment approach for identifying intrusions in mobile ad hoc networks (MANETs). It proposes using Dempster-Shafer theory to combine evidence from an intrusion detection system and routing table changes to assess the risk of attacks and countermeasures. An adaptive decision module then determines the response based on the risk assessment. The approach is evaluated experimentally and shown to effectively mitigate attack damages in MANETs.
Efficient radio resource allocation scheme for 5G networks with device-to-devi...IJECEIAES
A vital technology in the next-generation cellular network is device-to-device (D2D) communication. Cellular user enabled with D2D communication provides high spectral efficiency and further increases the coverage area of the cell, especially for the end-cell users and blind spot areas. However, the implementation of D2D communication increases interference among the cellular and D2D users. In this paper, we proposed a radio resource allocation (RRA) algorithm to manage the interference using fractional frequency reuse (FFR) scheme and Hungarian algorithm. The proposed algorithm is divided into three parts. First, the FFR scheme allocates different frequency bands among the cell (inner and outer region) for both the cellular and the D2D users to reduce the interference. Second, the Hungarian weighted bipartite matching algorithm is used to allocate the resources to D2D users with the minimum total system interference, while maintaining the total system sum rate. The cellular users share the resources with more than one D2D pair. Lastly, the local search technique of swapping is used for further allocation to minimize the interference. We implemented two types of assignments, fair multiple assignment, and restricted multiple assignment. We compared our results with existing algorithms which verified that our proposed algorithm provides outstanding results in aspects like interference reduction and system sum rate. For restricted multiple assignment, 60-70% of the D2D users are allocated in average cases.
Mobile Ad hoc Network is basically a crew of mobile traffic nodes, which figure an effectual dynamic topology and built a resource mannered network. Mobile Ad hoc Networks are exceptional cases of ad hoc networks that, but it is lacking infrastructure, communicating entities pass with various accelerations. For that reason, this impedes or delay lays the foundation of well built end-to-end communication paths. So Mobile Ad-hoc Network having efficient data transfer. In this manner, MANETs have out of the common network concerns and security challenges to get the advanced connectivity, immune communications, and reputation executives systems which have an impact on the trust in cooperation and settlement between mobile networking units. In this survey paper we confer about the security attributes, attacks, and challenges of MANETs.So, it is important to have a better and good formation algorithm to connect all the nodes to each other. There must be less time, low delay time, more battery life, more speeds of packets.
Interference Revelation in Mobile Ad-hoc Networks and Confrontationirjes
In this paper, we utilize the Several interference revelation techniques proposed for mobile ad hoc
networks rely on each node passively monitoring the data forwarding by its next hop. This paper presents
quantitative evaluations of false positives and their impact on monitoring based interference revelation for ad
hoc networks. Experimental results show that, even for a simple three-node configuration, an actual ad-hoc
network suffers from high false positives; these results are validated by Markov and probabilistic models.
However, this false positive problem cannot be observed by simulating the same network using popular ad hoc
network simulators, such as ns-2, OPNET or Glomosim. To remedy this, a probabilistic noise generator model
is implemented in the Glomosim simulator. With this revised noise model, the simulated network exhibits the
aggregate false positive behavior similar to that of the experimental tested. Simulations of larger (50-node) ad
hoc networks indicate that monitoring-based interference revelation has very high false positives. These false
positives can reduce the network performance or increase the overhead. In a simple monitoring-based system
where no secondary and more accurate methods are used, the false positives impact the network performance in
two ways: reduced throughput in normal networks without attackers and inability to mitigate the effect of
attacks in networks with attackers.
Improvement of quality of service parameters using reinvented fsmac protocol ...eSAT Journals
This document discusses improving quality of service parameters in wireless sensor networks using a reinvented FSMAC protocol. The FSMAC protocol first uses fuzzy logic to detect intrusions based on two new parameters: the number of times a node senses a free channel and the variation in channel sense periods. If an intrusion is detected, appropriate countermeasures are taken to reduce the effects of attacks. Simulations with 20 nodes show that the reinvented FSMAC protocol increases successful data transmission rates and network throughput.
This document discusses improving quality of service parameters in wireless sensor networks using a reinvented fuzzy logic secure media access control (FSMAC) protocol. It proposes using two new intrusion detection parameters - the number of times a node senses a free channel and the variation in the channel sense period. The protocol uses fuzzy logic to detect intrusions based on these parameters. If an intrusion is detected, the defense module is triggered to switch nodes to a different radio frequency band or stop transmissions to avoid attacks. Simulations with 20 nodes show this approach can increase successful data transmission rates and network throughput.
Secure data dissemination protocol in wireless sensor networks using xor netw...eSAT Publishing House
1. The document discusses a secure data dissemination protocol for wireless sensor networks using XOR network coding. It aims to achieve fast, secure, reliable and energy efficient data dissemination.
2. Wireless sensor networks require regular software updates through the wireless medium, which is known as data dissemination or network reprogramming. Existing dissemination protocols have security issues when combined with network coding techniques.
3. The proposed protocol uses simple cryptographic techniques with network coding to prevent pollution and denial of service attacks, while still achieving fast dissemination. It focuses on disseminating small data values securely and efficiently in wireless sensor networks.
A Survey of Fault Tolerance Methods in Wireless Sensor NetworksIRJET Journal
This document summarizes and analyzes various fault tolerance mechanisms for wireless sensor networks. It discusses mobile agent mechanisms, relay node mechanisms, and handover mechanisms. The document analyzes several existing fault tolerance methods, including Bayesian network models, probabilistic combinatorial optimization, dynamic power level adjustment, and integrated fault tolerance frameworks. Overall, the document provides an overview of important fault tolerance issues in wireless sensor networks and different approaches that have been proposed to address faults and improve reliability.
A Survey of Various Data Communication Schemes in WSNIRJET Journal
This document summarizes various data communication schemes used in wireless sensor networks (WSNs). It discusses key issues in WSNs like energy efficiency, data aggregation, and network lifetime. It then summarizes several common routing protocols used in WSNs to address these issues, including LEACH, PEGASIS, HEED, DEEC, TEEN, and SEP. LEACH uses randomized clustering to distribute energy load among sensors. PEGASIS forms chains to reduce transmissions. HEED allows energy-aware cluster head selection. DEEC handles heterogeneity. TEEN and SEP aim to improve responsiveness and support multi-level heterogeneity. The document concludes with a brief introduction to using fuzzy logic in WSN routing
IRJET- Vanet Connection Performance Analysis using GPSR ProtocolIRJET Journal
The document discusses performance analysis of VANET (vehicular ad hoc network) connections using the GPSR (Greedy Perimeter Stateless Routing) protocol. It proposes an energy-aware version of GPSR that optimizes greedy forwarding by selecting neighbor nodes to forward packets to based on both distance to the destination and remaining energy. The methodology section describes simulating the VANET network, implementing traffic monitoring using probe messages, predicting link lifetimes, using Bloom filters for 2-hop neighbor management, and evaluating performance based on data throughput and transmission time. The conclusion states that incorporating link lifetime prediction into an existing reliable routing protocol like RIVER can improve reliability in VANETs.
IRJET- An Introduction to Wireless Sensor Networks, its Challenges and SecurityIRJET Journal
- Wireless sensor networks (WSNs) are composed of small, battery-powered sensor nodes that collect data from the environment and transmit it to each other and a base station. They face challenges related to node mobility, energy efficiency, and lifetime.
- The document discusses clustering in WSNs, which involves organizing nodes into clusters with cluster heads to improve stability and reduce energy consumption. It also covers security issues and applications of WSNs in various fields like healthcare, the environment, and more.
A Comparative Review on Reliability and Fault Tolerance Enhancement Protocols...IRJET Journal
This document provides a comparative review of reliability and fault tolerance enhancement protocols in wireless sensor networks. It first discusses key challenges for wireless sensor networks related to node failures in harsh environments. It then summarizes several existing fault detection and recovery techniques. The document compares protocols like E2SRT, GARUDA, RCRT, and ZARB that aim to improve reliability. It highlights issues around achieving fault tolerance and concludes that no single approach can provide a fully reliable solution, requiring a hybrid method using the best features of different protocols.
Iaetsd quick detection technique to reduce congestion inIaetsd Iaetsd
This document proposes a quick detection technique (QDT) to avoid congestion in wireless sensor networks. QDT uses the queue buffer length of sensor nodes to estimate impending congestion and diffuses traffic across multiple paths to the base station. By dynamically routing traffic away from congested areas, QDT aims to improve packet delivery ratios and event reporting while avoiding congestion. The technique detects inactive nodes that do not properly forward or drop packets, and routes around them to reduce delays and maximize network lifetime. Simulation results show QDT significantly improves event reporting and packet delivery compared to other techniques.
IRJET- Robustness Strategy for Securing Data from Cyber AttacksIRJET Journal
This document summarizes a research paper that proposes a new algorithm called ROSE to improve the robustness of scale-free wireless sensor networks against malicious attacks. The ROSE algorithm rearranges network edges to transform the topology into an onion-like structure that is proven to be robust. It does this without changing the power-law degree distribution of the original scale-free network. The algorithm consists of two phases - a degree difference operation and an angle sum operation - that move the network towards a distributed structure where nodes of similar degree are connected. Simulation results showed ROSE significantly enhances network robustness against attacks while retaining the scale-free property.
This document summarizes an evaluation of ad-hoc routing protocols for wireless sensor networks. It analyzes the performance of three protocols - DSDV, AODV, and DSR - through simulation. The results show that AODV has the best performance with less degradation and packet loss compared to DSDV and DSR as node mobility increases. AODV is therefore identified as the most suitable routing protocol for use in mobile wireless sensor networks based on its ability to handle topology changes from node movement.
Study Of Coded Based Mechanism In WSN SystemIJERA Editor
This document summarizes a study on providing quality of service (QoS) in wireless sensor networks through the use of error correcting codes and selective encryption. It first provides background on wireless sensor networks and challenges in providing QoS. It then discusses forward error correction techniques like Reed-Solomon coding that can improve reliability while reducing energy consumption compared to retransmissions. It also discusses selective encryption algorithms that can encrypt parts of data to provide security with lower computation costs than fully encrypting all data. The document reviews open research issues in QoS for wireless sensor networks and improving the tradeoff between reliability, security and energy efficiency.
A SURVEY OF ENERGY-EFFICIENT COMMUNICATION PROTOCOLS IN WSNIAEME Publication
Wireless sensor networks are harshly restricted by storage capacity, energy and computing power. Wireless Sensor Networks have acquired a lot of attention by research community, manufacturer as well as actual users for monitoring remote trades and how to gather data in different environment. The wireless sensor nodes are especially battery powered devices having life can be extended for some times while long lasting and reliable for maintaining consumption of energy and network lifetime while designs applications and protocols. So it is essential to design effective and energy efficient protocol in order to enhance the network lifetime. In this paper we present the study of different energy efficient communication protocols of Wireless Sensor Networks (WSNs).Then some of the communication protocols which are widely used in WSNs to improve network performance are also discussed advantages and disadvantages of each protocols.
11.providing security to wireless packet networks by using optimized security...Alexander Decker
This document discusses providing security to wireless packet networks using an optimized security method. It proposes encrypting data packets when they are scheduled using the Blowfish encryption algorithm. This would secure the packets at the initial level of scheduling, preventing attackers from modifying packets even if they are delayed. The document outlines the Blowfish algorithm and its use of variable-length keys and data encryption in rounds to encrypt packets. It also describes the system model used and assumptions made, including modeling the wireless channel as a switch and defining packet attributes like arrival time, processing time, security level and deadline. Encrypting packets at the scheduling level with Blowfish aims to securely transmit real-time data over wireless networks.
This document summarizes a paper on the challenges of wireless sensor networks, with a focus on time synchronization issues. It discusses how wireless sensor networks face many constraints including limited energy, bandwidth, and resources. It also outlines various challenges such as security, deployment, and design constraints. The document then discusses the importance of time synchronization for applications requiring coordination between sensor nodes. It describes issues that can cause clocks to drift like clock skew. It also analyzes different communication methods and synchronization protocols for wireless sensor networks, comparing their advantages and disadvantages.
Human: Thank you, that is a concise 3 sentence summary that captures the key aspects of the document.
Mobile Adhoc Network (MANET) is a self-configuring and infrastructure-less network which consists of mobile devices such as mobiles, laptops, PDA's etc. Because of its lack of infrastructure, wireless mobile communication, dynamic topology, MANET is vulnerable to various security attacks. This survey paper presents an overview of developments of voting and non-voting based certificate revocation mechanisms in past few years. Certificate revocation is an important method used to secure the MANET. Certificate revocation isolates the attacker nodes from participating in network activities by revoking its certificate. Over last few years different schemes are explored for certificate revocation. In concluding section we present the limitations of the current cluster based certificate revocation scheme.
Support Recovery with Sparsely Sampled Free Random Matrices for Wideband Cogn...IJMTST Journal
The main objective of this project is to design an eigenvalue-based compressive SOE technique using asymptotic random matrix theory. In this project, investigating blind sparsity order estimation (SOE) techniques is an open research issue. To address this, this project presents an eigenvalue-based compressive SOE technique using asymptotic random matrix theory. Finally, this project propose a technique to estimate the sparsity order of the wideband spectrum with compressive measurements using the maximum eigenvalue of the measured signal's covariance matrix. .
Risk Assessment for Identifying Intrusion in ManetIOSR Journals
This document presents a risk assessment approach for identifying intrusions in mobile ad hoc networks (MANETs). It proposes using Dempster-Shafer theory to combine evidence from an intrusion detection system and routing table changes to assess the risk of attacks and countermeasures. An adaptive decision module then determines the response based on the risk assessment. The approach is evaluated experimentally and shown to effectively mitigate attack damages in MANETs.
Efficient radio resource allocation scheme for 5G networks with device-to-devi...IJECEIAES
A vital technology in the next-generation cellular network is device-to-device (D2D) communication. Cellular user enabled with D2D communication provides high spectral efficiency and further increases the coverage area of the cell, especially for the end-cell users and blind spot areas. However, the implementation of D2D communication increases interference among the cellular and D2D users. In this paper, we proposed a radio resource allocation (RRA) algorithm to manage the interference using fractional frequency reuse (FFR) scheme and Hungarian algorithm. The proposed algorithm is divided into three parts. First, the FFR scheme allocates different frequency bands among the cell (inner and outer region) for both the cellular and the D2D users to reduce the interference. Second, the Hungarian weighted bipartite matching algorithm is used to allocate the resources to D2D users with the minimum total system interference, while maintaining the total system sum rate. The cellular users share the resources with more than one D2D pair. Lastly, the local search technique of swapping is used for further allocation to minimize the interference. We implemented two types of assignments, fair multiple assignment, and restricted multiple assignment. We compared our results with existing algorithms which verified that our proposed algorithm provides outstanding results in aspects like interference reduction and system sum rate. For restricted multiple assignment, 60-70% of the D2D users are allocated in average cases.
Mobile Ad hoc Network is basically a crew of mobile traffic nodes, which figure an effectual dynamic topology and built a resource mannered network. Mobile Ad hoc Networks are exceptional cases of ad hoc networks that, but it is lacking infrastructure, communicating entities pass with various accelerations. For that reason, this impedes or delay lays the foundation of well built end-to-end communication paths. So Mobile Ad-hoc Network having efficient data transfer. In this manner, MANETs have out of the common network concerns and security challenges to get the advanced connectivity, immune communications, and reputation executives systems which have an impact on the trust in cooperation and settlement between mobile networking units. In this survey paper we confer about the security attributes, attacks, and challenges of MANETs.So, it is important to have a better and good formation algorithm to connect all the nodes to each other. There must be less time, low delay time, more battery life, more speeds of packets.
Interference Revelation in Mobile Ad-hoc Networks and Confrontationirjes
In this paper, we utilize the Several interference revelation techniques proposed for mobile ad hoc
networks rely on each node passively monitoring the data forwarding by its next hop. This paper presents
quantitative evaluations of false positives and their impact on monitoring based interference revelation for ad
hoc networks. Experimental results show that, even for a simple three-node configuration, an actual ad-hoc
network suffers from high false positives; these results are validated by Markov and probabilistic models.
However, this false positive problem cannot be observed by simulating the same network using popular ad hoc
network simulators, such as ns-2, OPNET or Glomosim. To remedy this, a probabilistic noise generator model
is implemented in the Glomosim simulator. With this revised noise model, the simulated network exhibits the
aggregate false positive behavior similar to that of the experimental tested. Simulations of larger (50-node) ad
hoc networks indicate that monitoring-based interference revelation has very high false positives. These false
positives can reduce the network performance or increase the overhead. In a simple monitoring-based system
where no secondary and more accurate methods are used, the false positives impact the network performance in
two ways: reduced throughput in normal networks without attackers and inability to mitigate the effect of
attacks in networks with attackers.
Improvement of quality of service parameters using reinvented fsmac protocol ...eSAT Journals
This document discusses improving quality of service parameters in wireless sensor networks using a reinvented FSMAC protocol. The FSMAC protocol first uses fuzzy logic to detect intrusions based on two new parameters: the number of times a node senses a free channel and the variation in channel sense periods. If an intrusion is detected, appropriate countermeasures are taken to reduce the effects of attacks. Simulations with 20 nodes show that the reinvented FSMAC protocol increases successful data transmission rates and network throughput.
This document discusses improving quality of service parameters in wireless sensor networks using a reinvented fuzzy logic secure media access control (FSMAC) protocol. It proposes using two new intrusion detection parameters - the number of times a node senses a free channel and the variation in the channel sense period. The protocol uses fuzzy logic to detect intrusions based on these parameters. If an intrusion is detected, the defense module is triggered to switch nodes to a different radio frequency band or stop transmissions to avoid attacks. Simulations with 20 nodes show this approach can increase successful data transmission rates and network throughput.
Forestalling Meticulous Jam Attacks Using Packet-Hiding TechniquesEswar Publications
The open nature of the wireless medium leaves it liable to intentional interference attacks, generally said as jam.
This intentional interference with wireless transmissions is used as a launch pad for mounting Denial-of-Service attacks on wireless networks. Typically, jam has been self-addressed beneath associate external threat model.
However, adversaries with internal information of protocol specifications and network secrets will launch loweffort
jam attacks that are troublesome to notice and counter. during this work, we have a tendency to address the matter of jamming attacks in wireless networks. In these attacks, the resister is active just for a brief amount of your time, by selection targeting messages of high importance. In our work two offender nodes (node that creates jamming) and introduce one new node i.e sender node. The new node(jammer node) is at intervals the twenty five nodes. Victimization that new sender node we have to eliminate the offender nodes absolutely. We have a tendency to conclude that however jam happens within the network and approach of elimination of the offender nodes
victimization new sender node. We propose mistrial approach for avoid flooding packets in jammer network. We conclude the performance between the mistrial and damping approach for avoid jamming packets We have a tendency to illustrate the benefits of {selective jam|spot-jamming|jamming|electronic jamming|jam} in terms of network performance degradation and resister effort by to beat the sender in network with the assistance of recent jamming node. We illustrate the benefits of jam|spot-jamming|jamming|electronic-jamming|jam} in terms of network performance degradation and human effort by to beat the sender in network with the assistance of recent
jamming node.
An Improved Enhanced Real Time Routing Protocol (IERT) for Mobile Wireless Se...IRJET Journal
This document discusses an improved enhanced real-time routing protocol (IERT) for mobile wireless sensor networks. The protocol aims to increase network lifetime by using a backup coordinator node if the primary coordinator fails. It also uses a corona-based routing structure to reduce routing holes and increase throughput. The protocol is simulated using NS2 and is shown to increase network lifetime by 30% compared to the previous ERTLD protocol, while also achieving lower delays and higher delivery rates. It provides improvements over real-time routing protocols for wireless sensor networks.
Optimal Operating Performances of Wireless Protocols for Intelligent Sensors ...chokrio
The systems based on intelligent sensors are currently expanding, due to theirs functions and theirs performances of intelligence: transmitting and receiving data in real-time, computation and processing algorithms, metrology remote, diagnostics, automation and storage measurements…The radio frequency wireless communication with its multitude offers a better solution for data traffic in this kind of systems. The mains objectives of this paper is to present a solution of the problem related to the selection criteria of a better wireless communication technology face up to the constraints imposed by the intended application and the evaluation of its key features. The comparison between the different wire-less technologies (Wi-Fi, Wi-Max, UWB, Bluetooth, ZigBee, ZigBeeIP, GSM/GPRS) focuses on their performance which depends on the areas of utilization. Furthermore, it shows the limits of their characteristics. Study findings can be used by the developers/ engineers to deduce the optimal mode to integrate and to operate a system that guarantees quality of communication, minimizing energy consumption, reducing the implementation cost and avoiding time con-straints.
International Journal of Computational Engineering Research(IJCER) ijceronline
International Journal of Computational Engineering Research(IJCER) is an intentional online Journal in English monthly publishing journal. This Journal publish original research work that contributes significantly to further the scientific knowledge in engineering and Technology.
Optical Networks Automation Overview: A SurveySergio Cruzes
The increasing demand for data has driven the advancement of optical networks from traditional architectures to
more flexible, dynamic and efficient solutions. This includes technologies like flexgrid reconfigurable optical add-drop
multiplexers (ROADMs), variable bandwidth transponders (VBTs) providing different modulation, coding schemes
and baud rates. These advancements have brought about new challenges that concerns to the routing and spectrum
allocation (RSA), fragmented spectrum, need for rapid and efficient channel restoration, and operation and maintenance
management of optical networks. To address these challenges, a dynamic and flexible network requires a highly advanced
network operational system (OS) capable of efficiently managing and allocating network resources. It relies on network
abstraction, sensors, actuators, and software-defined networking (SDN) to enable algorithms, management, control, and
decision-making. Improving the sensing capabilities of the network is crucial. Modern hardware and sensor technology
can help forecast fiber breaks, equipment failures, and other potential issues in advance, allowing for proactive actions
to be taken. Machine learning (ML) methods have been proposed in the literature to enhance the accuracy of quality
of transmission (QoT) estimation, mitigate nonlinearities and provide decisions. This reduces the need for conservative
design margins, maximizes the capacity of optical network systems and reduces the investment in infrastructure. Failure
management is a critical aspect of optical networks. Providing early-warning and proactive protection is essential. This
includes detecting failures, localizing them, identifying the root causes, and estimating their magnitude. Quick response
to failures is vital to maintaining network reliability.
EVENT DRIVEN ROUTING PROTOCOLS FOR WIRELESS SENSOR NETWORK- A SURVEYijcsa
Advances in embedded systems have resulted in the development of wireless sensor networks, which not
only provide unique opportunities for monitoring but also controlling homes, cities and the environments.
Recent advancements in wireless sensor network have resulted into many new protocols some of them are
specifically designed for sensor network for detecting the event and routing the event related information to
the base station in efficient manner. This paper surveys recent event driven routing protocols for wireless
sensor network. We have compared various event driven routing protocols using different parameters like
Sink Centric, Node Centric, Reliability, Congestion control, Energy Efficiency, Loss reliability and loss
recovery. We have also described LEACH and MECN protocols but as they are not e
This document summarizes a survey on identifying security vulnerabilities in wireless sensor networks. It begins with an introduction to wireless sensor networks and their importance for enabling the internet of things. It then discusses key challenges for wireless sensor networks related to constraints on memory, power, communication reliability and security. The document reviews common communication protocols for wireless sensor networks like IEEE 802.15.4 and ZigBee. It also discusses hierarchical routing approaches. Finally, it categorizes major vulnerabilities for wireless sensor networks related to node compromise and denial of service attacks that can occur due to weaknesses in the open wireless medium.
A Virtual Grid-Based Dynamic Routes Adjustment (VGDRA) Scheme for Wireless ...IRJET Journal
This document presents a virtual grid-based dynamic routes adjustment (VGDRA) scheme for wireless sensor networks with a mobile sink. The scheme aims to conserve network energy while dynamically routing information towards the moving sink. It divides the sensor field into a virtual grid with cell header nodes. These cell header nodes participate in adjusting routes according to the latest location of the mobile sink, reducing communication costs and energy consumption compared to having all nodes participate. The VGDRA scheme balances energy expenditure of nodes and allows data to be efficiently disseminated to the mobile sink as it changes locations through dynamic routing reconstruction using the virtual grid structure.
IRJET- Energy Efficient Protocol in Wireless Sensor NetworkIRJET Journal
This document summarizes an academic paper that proposes an energy efficient protocol for wireless sensor networks. It begins with an introduction to wireless sensor networks and some of the key challenges, particularly limited energy. It then reviews an existing protocol called LEACH (Low Energy Adaptive Clustering Hierarchy) that aims to distribute energy use among sensor nodes. However, LEACH may not distribute energy optimally if nodes have different starting energy levels. The paper proposes using DEEC (Distributed Energy-Efficient Clustering), which aims to improve network lifetime by more evenly distributing energy use among nodes, regardless of their initial energy levels.
This document discusses collision avoidance mechanisms in wireless ad hoc networks using distributed medium access control (MAC) protocols. It analyzes two main approaches for collision avoidance - out-of-band signaling using a busy tone, and an in-band handshaking approach using request-to-send and clear-to-send messages. The hidden node problem is a major cause of collisions at intermediate nodes in ad hoc networks, so the goal is to reduce collisions and improve transmission reliability. Algorithms for collision avoidance at intermediate nodes are presented for both the out-of-band and in-band approaches.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
A wireless sensor network has important applications such as remote environmental monitoring and target tracking, particularly in recent years with the help of sensors that are smaller, cheaper, and intelligent. Sensors are equipped with wireless interfaces with which they can communicate with one another to form a network. A WSN consists of a number of sensor nodes (few tens to thousands) working together to monitor a region to obtain data about the environment. The design of a WSN depends significantly on the application, and it must consider factors such as the environment, the applications design objectives, cost, hardware, and system constraints.
Current Activities in WSN: Developing test bed for target tracking Using Passive Infrared and Ultrasonic Sensors Improving the delivery rate in low power wireless networks .Guided Navigation of Friendly Vehicle towards tracked Object. Design and development of smart mines and explosive ordinance for intelligent activation and deactivation and safe recovery based on secure WSN. Design of a data mule for data collection from remotely placed sensor nodes
The course gives the thorough concepts of the wireless sensor networks, applications examples. It also gives detailed study of sensor node architecture and various protocols used in wireless sensor networks. It also covers issues related to topology, clustering ,synchronization and operating execution environment used for wireless sensor networks.
This document summarizes and compares several routing protocols for wireless sensor networks. It begins with an introduction to wireless sensor networks and discusses some of the key challenges in routing for these networks, such as large numbers of sensor nodes, energy constraints, and random node deployment. The document then categorizes routing protocols as flat-based, hierarchical-based, or location-based and focuses on reviewing various dynamic and static hierarchical/clustering-based routing protocols. Several popular protocols are described in detail, including LEACH, EECS, PEGASIS, and EEPSC. The pros and cons of each approach are discussed.
The document provides an introduction to wireless sensor networks. It discusses how wireless sensor networks consist of small sensor nodes that can monitor environmental conditions like temperature, pressure, and motion. These networks are used in applications such as surveillance, vehicle tracking, habitat monitoring, and more. The key challenges for wireless sensor networks are limited power, storage, and processing capabilities. Effective routing protocols and security measures are needed to address these constraints. The document then discusses routing protocols and security issues in wireless sensor networks in more detail over several chapters.
EFFECT OF HASH FUNCTION ON PERFORMANCE OF LOW POWER WAKE UP RECEIVER FOR WIRE...IJNSA Journal
Next generation network will consist of different types of wireless networks like WSN, Wi-Fi, WiMAX, UMTS, LTE and etc. Wireless Sensor Network (WSN) finds unique and special application as compared to the said networks because sensors are deployed in a very secret, awkward and hostile environment like battle field etc. Various wireless sensor nodes are interconnected and form a Wireless Sensor Network. Sensor nodes once deployed in a region, can’t be repaired thus the power system deployed in the nodes becomes a major key issue i.e. how long its battery life can be utilised. Another major issue of WSN is to have a more secured network which is a function of hash keys. Increase usage of hash key means enhanced security but at the cost of power and area. Sensor systems must utilize the minimal possible energy while operating over secured and wide range of operating scenarios. In this paper, we have proposed a novel ID matching mechanism that uses a Bloom filter to realize wake-up wireless communication. Paper uses hash function for uniquely recognizing particular sensor- node- cluster among all clusters. Paper also shows the effect of number of hash functions on performance of wireless sensor node. The design and implementation of a wireless wake-up receiver module simulation reveals
that proposed model consume 724nW dynamic power and with bloom filter, the proposed model consumes dynamic power 85% less than the consumption cited in “Takiguchi” model[1]. Dynamic power is further reduced by 10% when parallel processing is implemented. Finally paper provides a novel approach to save the dynamic power and subsequently increases the battery life of wireless sensor node and network as a whole.
IRJET- Detection and Prevention Methodology for Dos Attack in Mobile Ad-Hoc N...IRJET Journal
1) The document discusses detection and prevention of denial of service (DoS) attacks in mobile ad-hoc networks.
2) It focuses on identifying malicious nodes that conduct traffic jamming attacks by disrupting communication.
3) The proposed approach detects malicious nodes using a reliability value determined by broadcast reliability packets, where nodes that don't respond in a set time have their reliability value decreased until it reaches below zero, identifying them as malicious.
International Journal of Computational Engineering Research (IJCER) is dedicated to protecting personal information and will make every reasonable effort to handle collected information appropriately. All information collected, as well as related requests, will be handled as carefully and efficiently as possible in accordance with IJCER standards for integrity and objectivity.
EFFICIENT HIERARCHICAL ROUTING PROTOCOL IN SENSOR NETWORKSijassn
Wireless sensor network (WSN) is the network of hundreds and thousands of micro-sensor nodes,
connecting each other by a wireless medium.WSN provide reliable sensing of the environment, detecting
and reporting events to the sink. One of the most important constraints of WSN is energy consumption.
Since the micro sensors are small in dimension, batteries are necessary to produce power to the network. In
this paper, we have proposed an algorithm for hierarchy based protocols of wireless sensor networks,
which consist of two groups of sensor nodes in a single cluster node. Each cluster consists of a three cluster
head. The event driven data sensing mechanism is used in this paper and this sensed data is transmitted to
the master section head. The gathered data is transmitted to the sink via mobile agent. Hence efficient way
of data transmission is possible with larger group of nodes. In this approach of using hierarchy based
protocols; the lifetime of the sensor network is increased. This paper proposes an innovative approach of
cluster head election. The results are compared with LEACH protocol and proved to be energy efficient.
Similar to Research Challenges and Characteristic Features in Wireless Sensor Networks (20)
Content-Based Image Retrieval (CBIR) systems have been used for the searching of relevant images in various research areas. In CBIR systems features such as shape, texture and color are used. The extraction of features is the main step on which the retrieval results depend. Color features in CBIR are used as in the color histogram, color moments, conventional color correlogram and color histogram. Color space selection is used to represent the information of color of the pixels of the query image. The shape is the basic characteristic of segmented regions of an image. Different methods are introduced for better retrieval using different shape representation techniques; earlier the global shape representations were used but with time moved towards local shape representations. The local shape is more related to the expressing of result instead of the method. Local shape features may be derived from the texture properties and the color derivatives. Texture features have been used for images of documents, segmentation-based recognition,and satellite images. Texture features are used in different CBIR systems along with color, shape, geometrical structure and sift features.
This document discusses clickjacking attacks, which hijack users' clicks to perform unintended actions. It provides an overview of clickjacking, describes different types of attacks, and analyzes vulnerabilities that make websites susceptible. Experiments are conducted on a sample social networking site, applying various clickjacking techniques. Potential defenses are tested, including X-Frame-Options headers and frame busting code. A proposed solution detects transparent iframes to warn users and check for hidden mouse pointers to mitigate cursorjacking. Analysis of top Jammu and Kashmir websites found most were vulnerable, while browser behavior studies showed varying support for defenses.
Performance Analysis of Audio and Video Synchronization using Spreaded Code D...Eswar Publications
The audio and video synchronization plays an important role in speech recognition and multimedia communication. The audio-video sync is a quite significant problem in live video conferencing. It is due to use of various hardware components which introduces variable delay and software environments. The objective of the synchronization is used to preserve the temporal alignment between the audio and video signals. This paper proposes the audio-video synchronization using spreading codes delay measurement technique. The performance of the proposed method made on home database and achieves 99% synchronization efficiency. The audio-visual
signature technique provides a significant reduction in audio-video sync problems and the performance analysis of audio and video synchronization in an effective way. This paper also implements an audio- video synchronizer and analyses its performance in an efficient manner by synchronization efficiency, audio-video time drift and audio-video delay parameters. The simulation result is carried out using mat lab simulation tools and simulink. It is automatically estimating and correcting the timing relationship between the audio and video signals and maintaining the Quality of Service.
Due to the availability of complicated devices in industry, models for consumers at lower cost of resources are developed. Home Automation systems have been developed by several researchers. The limitations of home automation includes complexity in architecture, higher costs of the equipment, interface inflexibility. In this paper as we have proposed, the working protocol of PIC 16F72 technology is which is secure, cost efficient, flexible that leads to the development of efficient home automation systems. The system is operational to control various home appliances like fans, Bulbs, Tube light. The following paper describes about components used and working of all components connected. The home automation system makes use of Android app entitled “Home App” which gives
flexibility and easy to use GUI.
Semantically Enchanced Personalised Adaptive E-Learning for General and Dysle...Eswar Publications
E-learning plays an important role in providing required and well formed knowledge to a learner. The medium of e- learning has achieved advancement in various fields such as adaptive e-learning systems. The need for enhancing e-learning semantically can enhance the retrieval and adaptability of the learning curriculum. This paper provides a semantically enhanced module based e-learning for computer science programme on a learnercentric perspective. The learners are categorized based on their proficiency for providing personalized learning environment for users. Learning disorders on the platform of e-learning still require lots of research. Therefore, this paper also provides a personalized assessment theoretical model for alphabet learning with learning objects for
children’s who face dyslexia.
Agriculture plays an important role in the economy of our country. Over 58 percent of the rural households depend on the agriculture sector as their means of livelihood. Agriculture is one of the major contributors to Gross Domestic Product(GDP). Seeds are the soul of agriculture. This application helps in reducing the time for the researchers as well as farmers to know the seedling parameters. The application helps the farmers to know about the percentage of seedlings that will grow and it is very essential in estimating the yield of that particular crop. Manual calculation may lead to some error, to minimize that error, the developed app is used. The scientist and farmers require the app to know about the physiological seed quality parameters and to take decisions regarding their farming activities. In this article a desktop app for seed germination percentage and vigour index calculation are developed in PHP scripting language.
What happens when adaptive video streaming players compete in time-varying ba...Eswar Publications
Competition among adaptive video streaming players severely diminishes user-QoE. When players compete at a bottleneck link many do not obtain adequate resources. This imbalance eventually causes ill effects such as screen flickering and video stalling. There have been many attempts in recent years to overcome some of these problems. However, added to the competition at the bottleneck link there is also the possibility of varying network bandwidth which can make the situation even worse. This work focuses on such a situation. It evaluates current heuristic adaptive video players at a bottleneck link with time-varying bandwidth conditions. Experimental setup includes the TAPAS player and emulated network conditions. The results show PANDA outperforms FESTIVE, ELASTIC and the Conventional players.
WLI-FCM and Artificial Neural Network Based Cloud Intrusion Detection SystemEswar Publications
Security and Performance aspects of cloud computing are the major issues which have to be tended to in Cloud Computing. Intrusion is one such basic and imperative security problem for Cloud Computing. Consequently, it is essential to create an Intrusion Detection System (IDS) to detect both inside and outside assaults with high detection precision in cloud environment. In this paper, cloud intrusion detection system at hypervisor layer is developed and assesses to detect the depraved activities in cloud computing environment. The cloud intrusion detection system uses a hybrid algorithm which is a fusion of WLI- FCM clustering algorithm and Back propagation artificial Neural Network to improve the detection accuracy of the cloud intrusion detection system. The proposed system is implemented and compared with K-means and classic FCM. The DARPA’s KDD cup dataset 1999 is used for simulation. From the detailed performance analysis, it is clear that the proposed system is able to detect the anomalies with high detection accuracy and low false alarm rate.
Spreading Trade Union Activities through Cyberspace: A Case StudyEswar Publications
This report present the outcome of an investigative research conducted to examine the modu-operandi of academic staff union of polytechnics (ASUP) YabaTech. The investigation covered the logistics and cost implication for spreading union activities among members. It was discovered that cost of management and dissemination of information to members was at high side, also logistics problem constitutes to loss of information in transit hence cut away some members from union activities. To curtail the problem identified, we proposed the
design of secure and dynamic website for spreading union activities among members and public. The proposed system was implemented using HTML5 technology, interface frameworks like Bootstrap and j query which enables the responsive feature of the application interface. The backend was designed using PHPMYSQL. It was discovered from the evaluation of the new system that cost of managing information has reduced considerably, and logistic problems identified in the old system has become a forgotten issue.
Identifying an Appropriate Model for Information Systems Integration in the O...Eswar Publications
Nowadays organizations are using information systems for optimizing processes in order to increase coordination and interoperability across the organizations. Since Oil and Gas Industry is one of the large industries in whole of the world, there is a need to compatibility of its Information Systems (IS) which consists three categories of systems: Field IS, Plant IS and Enterprise IS to create interoperability and approach the
optimizing processes as its result. In this paper we introduce the different models of information systems integration, identify the types of information systems that are using in the upstream and downstream sectors of petroleum industry, and finally based on expert’s opinions will identify a suitable model for information systems integration in this industry.
Link-and Node-Disjoint Evaluation of the Ad Hoc on Demand Multi-path Distance...Eswar Publications
This work illustrates the AOMDV routing protocol. Its ancestor, the AODV routing protocol is also described. This tutorial demonstrates how forward and reverse paths are created by the AOMDV routing protocol. Loop free paths formulation is described, together with node and link disjoint paths. Finally, the performance of the AOMDV routing protocol is investigated along link and node disjoint paths. The WSN with the AOMDV routing protocol using link disjoint paths is better than the WSN with the AOMDV routing protocol using node disjoint paths for energy consumption.
Bridging Centrality: Identifying Bridging Nodes in Transportation NetworkEswar Publications
To identify the importance of node of a network, several centralities are used. Majority of these centrality measures are dominated by components' degree due to their nature of looking at networks’ topology. We propose a centrality to identification model, bridging centrality, based on information flow and topological aspects. We apply bridging centrality on real world networks including the transportation network and show that the nodes distinguished by bridging centrality are well located on the connecting positions between highly connected regions. Bridging centrality can discriminate bridging nodes, the nodes with more information flowed through them and locations between highly connected regions, while other centrality measures cannot.
Now a days we are living in an era of Information Technology where each and every person has to become IT incumbent either intentionally or unintentionally. Technology plays a vital role in our day to day life since last few decades and somehow we all are depending on it in order to obtain maximum benefit and comfort. This new era equipped with latest advents of technology, enlightening world in the form of Internet of Things (IoT). Internet of things is such a specified and dignified domain which leads us to the real world scenarios where each object can perform some task while communicating with some other objects. The world with full of devices, sensors and other objects which will communicate and make human life far better and easier than ever. This paper provides an overview of current research work on IoT in terms of architecture, a technology used and applications. It also highlights all the issues related to technologies used for IoT, after the literature review of research work. The main purpose of this survey is to provide all the latest technologies, their corresponding
trends and details in the field of IoT in systematic manner. It will be helpful for further research.
Automatic Monitoring of Soil Moisture and Controlling of Irrigation SystemEswar Publications
In past couple of decades, there is immediate growth in field of agricultural technology. Utilization of proper method of irrigation by drip is very reasonable and proficient. A various drip irrigation methods have been proposed, but they have been found to be very luxurious and dense to use. The farmer has to maintain watch on irrigation schedule in the conventional drip irrigation system, which is different for different types of crops. In remotely monitored embedded system for irrigation purposes have become a new essential for farmer to accumulate his energy, time and money and will take place only when there will be requirement of water. In this approach, the soil test for chemical constituents, water content, and salinity and fertilizer requirement data collected by wireless and processed for better drip irrigation plan. This paper reviews different monitoring systems and proposes an automatic monitoring system model using Wireless Sensor Network (WSN) which helps the farmer to improve the yield.
Multi- Level Data Security Model for Big Data on Public Cloud: A New ModelEswar Publications
With the advent of cloud computing the big data has emerged as a very crucial technology. The certain type of cloud provides the consumers with the free services like storage, computational power etc. This paper is intended to make use of infrastructure as a service where the storage service from the public cloud providers is going to leveraged by an individual or organization. The paper will emphasize the model which can be used by anyone without any cost. They can store the confidential data without any type of security issue, as the data will be altered
in such a way that it cannot be understood by the intruder if any. Not only that but the user can retrieve back the original data within no time. The proposed security model is going to effectively and efficiently provide a robust security while data is on cloud infrastructure as well as when data is getting migrated towards cloud infrastructure or vice versa.
Impact of Technology on E-Banking; Cameroon PerspectivesEswar Publications
The financial services industry is experiencing rapid changes in services delivery and channels usage, and financial companies and users of financial services are looking at new technologies as they emerge and deciding whether or not to embrace them and the new opportunities to save and manage enormous time, cost and stress.
There is no doubt about the favourable and manifold impact of technology on e-banking as pictured in this review paper, almost all banks are with the least and most access e-banking Technological equipments like ATMs and Cards. On the other Hand cheap and readily available technology has opened a favourable competition in ebanking services business with a lot of wide range competitors competing with Commercial Banks in Cameroon in providing digital financial services.
Classification Algorithms with Attribute Selection: an evaluation study using...Eswar Publications
Attribute or feature selection plays an important role in the process of data mining. In general the data set contains more number of attributes. But in the process of effective classification not all attributes are relevant.
Attribute selection is a technique used to extract the ranking of attributes. Therefore, this paper presents a comparative evaluation study of classification algorithms before and after attribute selection using Waikato Environment for Knowledge Analysis (WEKA). The evaluation study concludes that the performance metrics of the classification algorithm, improves after performing attribute selection. This will reduce the work of processing irrelevant attributes.
Mining Frequent Patterns and Associations from the Smart meters using Bayesia...Eswar Publications
In today’s world migration of people from rural areas to urban areas is quite common. Health care services are one of the most challenging aspect that is must require to the people with abnormal health. Advancements in the technologies lead to build the smart homes, which contains various sensor or smart meter devices to automate the process of other electronic device. Additionally these smart meters can be able to capture the daily activities of the patients and also monitor the health conditions of the patients by mining the frequent patterns and
association rules generated from the smart meters. In this work we proposed a model that is able to monitor the activities of the patients in home and can send the daily activities to the corresponding doctor. We can extract the frequent patterns and association rules from the log data and can predict the health conditions of the patients and can give the suggestions according to the prediction. Our work is divided in to three stages. Firstly, we used to record the daily activities of the patient using a specific time period at three regular intervals. Secondly we applied the frequent pattern growth for extracting the association rules from the log file. Finally, we applied k means clustering for the input and applied Bayesian network model to predict the health behavior of the patient and precautions will be given accordingly.
Network as a Service Model in Cloud Authentication by HMAC AlgorithmEswar Publications
Resource pooling on internet-based accessing on use as pay environmental technology and ruled in IT field is the
cloud. Present, in every organization has trusted the web, however, the information must flow but not hold the
data. Therefore, all customers have to use the cloud. While the cloud progressing info by securing-protocols. Third
party observing and certain circumstances directly stale in flow and kept of packets in the virtual private cloud.
Global security statistics in the year 2017, hacking sensitive information in cloud approximately maybe 75.35%,
and the world security analyzer said this calculation maybe reached to 100%. For this cause, this proposed
research work concentrates on Authentication-Message-Digest-Key with authentication in routing the Network as
a Service of packets in OSPF (Open Shortest Path First) implementing Cloud with GNS3 has tested them to
securing from attackers.
Microstrip patch antennas are recently used in wireless detection applications due to their low power consumption, low cost, versatility, field excitation, ease of fabrication etc. The microstrip patch antennas are also called as printed antennas which is suffer with an array elements of antenna and narrow bandwidth. To overcome the above drawbacks, Flame Retardant Material is used as the substrate. Rectangular shape of microstrip patch antenna with FR4 material as the substrate which is more suitable for the explosive detection applications. The proposed printed antenna was designed with the dimension of 60 x 60 mm2. FR-4 material has a dielectric constant value of 4.3 with thickness 1.56 mm, length and width 60 mm and 60 mm respectively. One side of the substrate contains the ground plane of dimensions 60 x60 mm2 made of copper and the other side of the substrate contains the patch which have dimensions 34 x 29 mm2 and thickness 0.03mm which is also made of copper. RMPA without slot, Vertical slot RMPA, Double horizontal slot RMPA and Centre slot RMPA structures were
designed and the performance of the antennas were analysed with various parameters such as gain, directivity, Efield, VSWR and return loss. From the performance analysis, double horizontal slot RMPA antenna provides a better result and it provides maximum gain (8.61dB) and minimum return loss (-33.918dB). Based on the E-field excitation value the SEMTEX explosive material is detected and it was simulated using CST software.
Unlocking Productivity: Leveraging the Potential of Copilot in Microsoft 365, a presentation by Christoforos Vlachos, Senior Solutions Manager – Modern Workplace, Uni Systems
Communications Mining Series - Zero to Hero - Session 1DianaGray10
This session provides introduction to UiPath Communication Mining, importance and platform overview. You will acquire a good understand of the phases in Communication Mining as we go over the platform with you. Topics covered:
• Communication Mining Overview
• Why is it important?
• How can it help today’s business and the benefits
• Phases in Communication Mining
• Demo on Platform overview
• Q/A
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfPaige Cruz
Monitoring and observability aren’t traditionally found in software curriculums and many of us cobble this knowledge together from whatever vendor or ecosystem we were first introduced to and whatever is a part of your current company’s observability stack.
While the dev and ops silo continues to crumble….many organizations still relegate monitoring & observability as the purview of ops, infra and SRE teams. This is a mistake - achieving a highly observable system requires collaboration up and down the stack.
I, a former op, would like to extend an invitation to all application developers to join the observability party will share these foundational concepts to build on:
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAUpanagenda
Webinar Recording: https://www.panagenda.com/webinars/hcl-notes-und-domino-lizenzkostenreduzierung-in-der-welt-von-dlau/
DLAU und die Lizenzen nach dem CCB- und CCX-Modell sind für viele in der HCL-Community seit letztem Jahr ein heißes Thema. Als Notes- oder Domino-Kunde haben Sie vielleicht mit unerwartet hohen Benutzerzahlen und Lizenzgebühren zu kämpfen. Sie fragen sich vielleicht, wie diese neue Art der Lizenzierung funktioniert und welchen Nutzen sie Ihnen bringt. Vor allem wollen Sie sicherlich Ihr Budget einhalten und Kosten sparen, wo immer möglich. Das verstehen wir und wir möchten Ihnen dabei helfen!
Wir erklären Ihnen, wie Sie häufige Konfigurationsprobleme lösen können, die dazu führen können, dass mehr Benutzer gezählt werden als nötig, und wie Sie überflüssige oder ungenutzte Konten identifizieren und entfernen können, um Geld zu sparen. Es gibt auch einige Ansätze, die zu unnötigen Ausgaben führen können, z. B. wenn ein Personendokument anstelle eines Mail-Ins für geteilte Mailboxen verwendet wird. Wir zeigen Ihnen solche Fälle und deren Lösungen. Und natürlich erklären wir Ihnen das neue Lizenzmodell.
Nehmen Sie an diesem Webinar teil, bei dem HCL-Ambassador Marc Thomas und Gastredner Franz Walder Ihnen diese neue Welt näherbringen. Es vermittelt Ihnen die Tools und das Know-how, um den Überblick zu bewahren. Sie werden in der Lage sein, Ihre Kosten durch eine optimierte Domino-Konfiguration zu reduzieren und auch in Zukunft gering zu halten.
Diese Themen werden behandelt
- Reduzierung der Lizenzkosten durch Auffinden und Beheben von Fehlkonfigurationen und überflüssigen Konten
- Wie funktionieren CCB- und CCX-Lizenzen wirklich?
- Verstehen des DLAU-Tools und wie man es am besten nutzt
- Tipps für häufige Problembereiche, wie z. B. Team-Postfächer, Funktions-/Testbenutzer usw.
- Praxisbeispiele und Best Practices zum sofortigen Umsetzen
UiPath Test Automation using UiPath Test Suite series, part 6DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 6. In this session, we will cover Test Automation with generative AI and Open AI.
UiPath Test Automation with generative AI and Open AI webinar offers an in-depth exploration of leveraging cutting-edge technologies for test automation within the UiPath platform. Attendees will delve into the integration of generative AI, a test automation solution, with Open AI advanced natural language processing capabilities.
Throughout the session, participants will discover how this synergy empowers testers to automate repetitive tasks, enhance testing accuracy, and expedite the software testing life cycle. Topics covered include the seamless integration process, practical use cases, and the benefits of harnessing AI-driven automation for UiPath testing initiatives. By attending this webinar, testers, and automation professionals can gain valuable insights into harnessing the power of AI to optimize their test automation workflows within the UiPath ecosystem, ultimately driving efficiency and quality in software development processes.
What will you get from this session?
1. Insights into integrating generative AI.
2. Understanding how this integration enhances test automation within the UiPath platform
3. Practical demonstrations
4. Exploration of real-world use cases illustrating the benefits of AI-driven test automation for UiPath
Topics covered:
What is generative AI
Test Automation with generative AI and Open AI.
UiPath integration with generative AI
Speaker:
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
Climate Impact of Software Testing at Nordic Testing DaysKari Kakkonen
My slides at Nordic Testing Days 6.6.2024
Climate impact / sustainability of software testing discussed on the talk. ICT and testing must carry their part of global responsibility to help with the climat warming. We can minimize the carbon footprint but we can also have a carbon handprint, a positive impact on the climate. Quality characteristics can be added with sustainability, and then measured continuously. Test environments can be used less, and in smaller scale and on demand. Test techniques can be used in optimizing or minimizing number of tests. Test automation can be used to speed up testing.
Programming Foundation Models with DSPy - Meetup SlidesZilliz
Prompting language models is hard, while programming language models is easy. In this talk, I will discuss the state-of-the-art framework DSPy for programming foundation models with its powerful optimizers and runtime constraint system.
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...Neo4j
Leonard Jayamohan, Partner & Generative AI Lead, Deloitte
This keynote will reveal how Deloitte leverages Neo4j’s graph power for groundbreaking digital twin solutions, achieving a staggering 100x performance boost. Discover the essential role knowledge graphs play in successful generative AI implementations. Plus, get an exclusive look at an innovative Neo4j + Generative AI solution Deloitte is developing in-house.
UiPath Test Automation using UiPath Test Suite series, part 5DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 5. In this session, we will cover CI/CD with devops.
Topics covered:
CI/CD with in UiPath
End-to-end overview of CI/CD pipeline with Azure devops
Speaker:
Lyndsey Byblow, Test Suite Sales Engineer @ UiPath, Inc.
Threats to mobile devices are more prevalent and increasing in scope and complexity. Users of mobile devices desire to take full advantage of the features
available on those devices, but many of the features provide convenience and capability but sacrifice security. This best practices guide outlines steps the users can take to better protect personal devices and information.
Infrastructure Challenges in Scaling RAG with Custom AI modelsZilliz
Building Retrieval-Augmented Generation (RAG) systems with open-source and custom AI models is a complex task. This talk explores the challenges in productionizing RAG systems, including retrieval performance, response synthesis, and evaluation. We’ll discuss how to leverage open-source models like text embeddings, language models, and custom fine-tuned models to enhance RAG performance. Additionally, we’ll cover how BentoML can help orchestrate and scale these AI components efficiently, ensuring seamless deployment and management of RAG systems in the cloud.
How to Get CNIC Information System with Paksim Ga.pptxdanishmna97
Pakdata Cf is a groundbreaking system designed to streamline and facilitate access to CNIC information. This innovative platform leverages advanced technology to provide users with efficient and secure access to their CNIC details.
Building Production Ready Search Pipelines with Spark and MilvusZilliz
Spark is the widely used ETL tool for processing, indexing and ingesting data to serving stack for search. Milvus is the production-ready open-source vector database. In this talk we will show how to use Spark to process unstructured data to extract vector representations, and push the vectors to Milvus vector database for search serving.
GraphRAG for Life Science to increase LLM accuracyTomaz Bratanic
GraphRAG for life science domain, where you retriever information from biomedical knowledge graphs using LLMs to increase the accuracy and performance of generated answers
20240609 QFM020 Irresponsible AI Reading List May 2024
Research Challenges and Characteristic Features in Wireless Sensor Networks
1. Int. J. Advanced Networking and Applications
Volume: 09 Issue: 01 Pages: 3321-3328 (2017) ISSN: 0975-0290
3321
Research Challenges and Characteristic Features
in Wireless Sensor Networks
Rajkumar
Sambhram Institute of Technology, Bangalore, VTU Belagavi Karnataka, India
Email: pyage2005@gmail.com
Dr H G Chandrakanth
Sambhram Institute of Technology, Bangalore, VTU Belagavi Karnataka, India
Email: ckgowda@hotmail.com
Dr D G Anand
Rajiv Gandhi Institute of Technology, VTU Belagavi Karnataka, India
Email: dg_anand2003@sifymail.com
Dr T John Peter
Sambhram Institute of Technology, Bangalore, VTU Belagavi Karnataka, India
Email: tjpeter.cse@gmail.com
------------------------------------------------------------------------ABSTRACT----------------------------------------------------------
Wireless Sensor Networks have come to the forefront of the scientific community recently and it consists of small
nodes with sensing, Communications and computing capabilities. The Wireless Sensor Network Systems can be
applied to monitor different environments ranging from military to civil applications. It is observed that different
protocols necessary for smooth functioning of the network system are highly application specific. Current WSNs
typically communicate directly with a centralized controller or satellite. In this paper we survey the different
research challenges in Wireless Sensor Networks and purpose of various research Challenges activities is the
development of a framework, which is radically simplifies the development of software for sensor network
applications and characteristic Features of Sensor Networks.
Index Terms - Wireless Sensor Network, Research Challenge, Characteristic Features.
--------------------------------------------------------------------------------------------------------------------------------------------------
Date of Submission: Jun 29, 2017 Date of Acceptance: Jul 8, 2017
--------------------------------------------------------------------------------------------------------------------------------------------------
1 INTRODUCTION
Wireless Sensor Networks have recently emerged as
a premier research area. They have great long term
economic potential, capability to transform our lives, and
pose many latest system-building challenges. Sensor
networks also pose a number of latest abstract and
optimization problems, some of these such as tracking,
location and exploitation are most important issues, in that
several applications rely on them for necessary
information. Coverage in general, answers the questions
about quality of service that can be provided by a
particular sensor network. The integration of various types
of sensors such as acoustic, seismic, optical, etc. in one
network platform and the study of the overall coverage of
the system also presents numerous interesting challenges.
Wireless sensors have become an excellent tool for
military applications relating intrusion detection, perimeter
monitoring, and information gathering and elegant
logistics support in an unidentified deployed area. Some
additional applications: location detection, sensor-based
personal health monitor with sensor networks and
movement detection [1].
Sensor networks have different constraints than
traditional wired networks. Primary, the nodes in sensor
networks are likely to be battery powered, and it is often
very complicated to change the batteries for all of the
nodes, as energy conserving forms of communication and
computation are necessary to wireless sensor networks.
Second, since sensors have restricted computing power,
they may not be able to run complicated network
protocols. Third the nodes deployed may be either in a
controlled environment where monitoring, preservation
and surveillance are very difficult. Finally in the
uncontrolled environments, security for sensor networks
becomes extremely difficult.
2 RESEARCH CHALLENGES
The severe constraints and challenging deployment
environments of wireless sensor networks build computer
security for these systems additional challenging than for
conservative networks. However, several properties of
sensor networks may help address the challenge of
building protected networks. Primarily, we have the
possibility to architect security solutions into these
systems from the outset, they are still in their early design
and research stages. Second, numerous applications are
possible to involve the deployment of sensor networks
under a single managerial area, simplifying the threat
model. Third, it may be possible to build up redundancy,
scale, and the physical character of the environment in the
solutions. If we build sensor networks so they maintain
operating even if some fraction of their sensors is
compromised, we have an possibility to use redundant
sensors to resist additional attack. The single aspects of
sensor networks may permit novel defenses not available
in conventional networks. Various other problems also
need further research. Single is how to protect wireless
communication links against eavesdropping, denial of
service, tampering, and traffic analysis. Others involve
2. Int. J. Advanced Networking and Applications
Volume: 09 Issue: 01 Pages: 3321-3328 (2017) ISSN: 0975-0290
3322
provide constraints. Ongoing directions hold asymmetric
protocols where most of the computational load falls on
the base station and on public-key cryptosystems efficient
on low end devices. Lastly finding ways to tolerate the
lack of physical security, possibly through redundancy
about the physical environment, determination remain a
continuing overall challenge. We are optimistic that much
upgrading will be made on all of them [2].
2.1 Challenges in real time
WSN deals with real world environments. In various
cases, sensor data must be delivered within time
constraints so that suitable observations can be made or
actions taken. Few results exist to date regarding gathering
real-time requirements in WSN. Most protocols either
ignore real-time or simply attempt to process as fast as
possible and expect that this speed is sufficient to meet
deadlines. Some preliminary results exist for real-time
routing. For example, the RAP protocol [3] proposes a
new strategy called velocity monotonic scheduling. Here a
packet has a deadline and a distance to travel. Using these
parameters a packet’s average velocity requirement is
computed and at each hop packets are planned for
communication based on the highest velocity requirement
of any packets at this node. While this protocol addresses
real time, no guarantees are given. Another routing
protocol that addresses real-time are called SPEED [4].
This protocol uses feedback control to assurance that
every node maintains an average delay for packets
transiting a node. Given this delay and the distance to
travel (in hops), it can be determined if a packet meets its
deadline (in steady state). However, transient performance,
message losses, congestion, noise and other harms cause
these guarantees to be limited. To date, the limited results
that have appeared for WSN concerning real-time issues
has been in routing. Various other functions must also
meet real-time constraints including: data fusion, data
transmission, target and event detection and classification,
query processing, and security. New results are needed to
guarantee soft real time requirements and that deal with
the realities of WSN such as lost messages, noise and
congestion. Using feedback control to address both steady
state and transient behavior seems to hold promise.
Dealing with real-time usually identifies the need for
differentiated services, e.g., routing solutions need to
support different classes of traffic; guarantees for the
important traffic and less support for unimportant traffic. It
is important not only to develop real-time protocols for
WSN, but associated analysis techniques must also be
developed.
2.2 Challenges in Real-world Protocols:
Current WSN solutions are developed with simplifying
assumptions about environment and wireless
communication, even though the realities of environmental
and wireless communication sensing are well identified.
Many of these solutions work very well in simulation. It is
either unidentified how the solutions work in the real
world or they can be given away to work poorly in
practice. We note that, in general, there is an excellent
understanding of both the theoretical and practical issues
related to wireless communication. Example, it is well
identified how the signal strength drops over distance.
Effects of signal reflection, fading and scattering are
understood. However, when building an actual WSN,
various specific system, cost, and application issues also
affect the communication properties of the system. Radio
communication in the form of FM or AM broadcast from
towers performs quite differently than short range, low
power wireless found in self-organizing WSNs. Of course,
while the similar basic principles apply, the system
performance characteristics vary considerably. In other
words, the power, size, cost constraints and their tradeoffs
are fundamental constraints. In the current state of the art,
the tradeoff among these constraints has produced a
number of devices currently being used in WSNs.
Example, one such device is the Mica mote that uses 2 AA
batteries, an RF Chipcon radio, a 7 MHz microcontroller,
and costs about $100. As improved batteries,
microcontrollers, and radios become available and as costs
reduce, new platforms will be developed. These new
platforms will continue to have tradeoffs between these
parameters. Novel network protocols that account for the
key realities in wireless communication are required.
New research is needed:
To evaluate and Measure how the theoretical
properties of wireless communication are exhibited in
today’s and tomorrow’s sensing and communication
devices,
Establish improved models of communication
realities to feed back into improved simulation tools,
A new network protocols that account for the
communication realities of real world environments,
Test the individual solutions on real platforms in real
world settings,
Synthesize novel solutions into a complete system-
wide protocol stack for a real application.
2.3 Challenges in power managements:
Low-cost deployment is one acclaimed benefit of
sensor networks. Limited processor bandwidth and small
memory are two arguable constraints in sensor networks,
which will vanish with the development of fabrication
techniques. However, the energy constraint is improbable
to be solved soon due to slow progress in developing
battery capacity. Furthermore, the untended nature of
sensor nodes and hazardous sensing environments
preclude battery replacement as a feasible solution.
Alternatively, the surveillance nature of many sensor
network applications requires a long lifetime; therefore, it
is a extremely important research issue to provide a form
of energy-efficient surveillance service for a geographic
area. Much of the current research focuses on how to
provide full or partial sensing coverage in the context of
energy conservation. In an approach, nodes are put into a
dormant state extended as their neighbors can offer
sensing coverage for them. These solutions observe the
sensing coverage to a certain geographic area, either it
provides coverage or not. However, we argue that, in the
3. Int. J. Advanced Networking and Applications
Volume: 09 Issue: 01 Pages: 3321-3328 (2017) ISSN: 0975-0290
3323
majority scenarios such as battlefields there are convinced
geographic sections such as the general command center
that are much extra security sensitive than others. Based
on the reality that individual sensor nodes are not reliable
and subject to failure and single sensing readings can be
easily distorted by cause background noise and false
alarms, it is simply not enough to rely on a single sensor to
safeguard a critical area. In this case, it is desired to supply
higher degree of coverage in which multiple sensors
monitor the same location at the same time in order to
obtain high confidence in detection. Alternatively, it is
overkill and energy consuming to support the same high
degree of coverage for some non-critical area. Middleware
sits between the operating system and the application. On
traditional desktop computers and portable computing
devices, operating systems are well established, both in
conditions of systems and functionality. For sensor nodes,
however, the recognition and implementation of
appropriate operating system primitives is still a research
issue [5]. In various current projects, applications are
executing on the bare hardware without a separate
operating system part. Hence, at this early phase of WSN
technology it is not clear on which basis future
middleware for WSN can naturally built.
2.4 Challenges in Programming Abstractions:
A key to the development of WSN is raising the level
of abstraction for programmers. At present, programmers
contract with too various low levels details regarding
sensing and node to node communication. For example,
they characteristically deal with, fusing data, moving data
and sensing data. They deal with demanding node to node
communication and particulars. If we raise the level of
concept to consider aggregate performance, application
functionality and direct support for scaling issues then
efficiency increases. Present research in programming
abstractions for WSN can be categorized into 7(Seven)
areas:, component-based, database centric, virtual
machines, event based, scripts, environmental and
middleware APIs. For example, consider an environmental
based abstraction called Enviro Track [6]. Here the
programmer deals with entities establish in an application.
If the application tracks vehicles and people, then the
programmer can define vehicle and people entities and use
library routines that support low level sensing functions
that can detect and classify items of these types. They can
also easily identify the application level processing
associated with each type of entity. This allows
programmers to contract with application level
functionality rather than low level details. Since WSN
contract primarily with collecting, acting and analyzing on
data, a database vision of such systems is accepted. In this
view, a programmer deals with queries written in an SQL-
like format. However, real-world data issues such various
levels of confidence in data, as probabilistic data and
missing or late data sometimes make the SQL paradigm
inadequate. It is possible that no one programming
abstraction for WSN will exist. Rather, a number of
solutions will emerge, each improved for certain domains.
Results in this area are critical in order to enlarge the
development of WSN by the general programmer as
opposed to the WSN.
2.5 Challenges in Security and Privacy:
WSN are limited in their computation, communication
capabilities, and energy. In contrast to traditional
networks, sensor nodes are frequently deployed in
accessible areas, presenting a threat of physical attacks.
Sensor networks interrelate closely with their physical
environment and with people, posing extra security
problems. Because of these reasons existing security
mechanisms are inadequate for WSN. These new
constraints pretense new research challenges on key
establishment, secrecy and authentication, robustness to
denial-of-service attacks, privacy, node capture, and
secure routing. To achieve a protected system, security
must be included into every component, as a components
designed without security can become a point of attack.
Therefore, security and privacy pervade every feature of
system design. Consider one of the most difficult attacks
to protect against. Adversaries can severely limit the cost
of a wireless sensor network by denial-of-service attacks
[7]. In the simplest form of denial-of service attack, an
adversary attempts to disturb an operation by broadcasting
a high-energy signal. If the transmission is strong
sufficient, the whole system could be jammed. Additional
sophisticated attacks are also possible: the adversary can
inhibit communication by violating the Message
Authentication Control (MAC) protocol, for occurrence by
transmitting while a neighbor is also transmitting
requesting channel access with a Request-To-Send (RTS).
New techniques for dealing with this easy yet potentially
devastating attack are needed. Various other security
related problems need further research [8]. One challenge
is how to safe wireless communication links against
tampering and eavesdropping. Overall, security is a
difficult challenge for any system. The severe demanding
and constraints environments of WSN make computer
security for these systems even more challenging.
2.6 Challenges in Analysis:
Few investigative results exist for WSN. Since WSN
are in the early stage of growth it is not surprising that few
investigative results exist. Researchers are busy inventing
new applications and new protocols for WSN. The
solutions are built, tested and evaluated either by test beds
or simulation; sometimes an actual system has been
deployed. Empirical confirmation is beginning to
accumulate. However, a more scientific approach is
necessary where a system can be analyzed and designed
before it is deployed. The analysis needs to offer
confidence that the system will meet its necessities and to
indicate the performance and efficiency of the system.
Consider the following motivating analysis questions.
What density of nodes is necessary to meet the lifetime
requirements of the system? What communication and
sensing ranges are needed to detect report and classify a
target to a base station by a deadline? What is sensing
range and what is nodes need to be awake in order to
assurance a certain degree of sensing coverage for a
4. Int. J. Advanced Networking and Applications
Volume: 09 Issue: 01 Pages: 3321-3328 (2017) ISSN: 0975-0290
3324
system? Given n streams of periodic sensing traffic
characterized by a message size, start time, period,
deadline, source location and destination location for a
known WSN will all the traffic meet their deadlines? To
answer this final question, the interference patterns of
wireless communication must be taken in an account. An
analysis techniques and solutions are developed for these
types of questions; they must also be validated with actual
systems.
2.7 Scope and Functionality:
The key purpose of middleware for sensor networks is
to support the development, execution, deployment, and
maintenance of sensing-based applications. This includes
mechanisms for formulating complex sophisticated
sensing tasks, communicating this task to WSN,
management of sensor nodes to divide the task and
distribute to the individual sensor nodes, data fusion for
integration the sensor readings of the individual sensor
nodes into a high-level result, and reporting the result back
to the job issuer. Moreover, appropriate mechanisms and
abstractions for dealing with the heterogeneity of sensor
nodes must be provided. All mechanisms provided by a
middleware system should respect the design values
sketched above and the special characteristics of the WSN,
which mostly boils down to energy efficiency, scalability
and robustness. The scope of middleware for WSN is not
limited to the sensor network only, but also covers devices
and networks connected to the WSN. Classical
infrastructures and mechanisms are typically not well
suited for interaction with WSN. Single reason for this are
the limited resources of a WSN, which may make it
required to execute resource intensive functions or store
huge amounts of data in external components. This may
result in a secure interaction of processes executing in a
traditional network and the WSN. One example of such
“outer” functionality is called virtual counterparts,
mechanism residing in the Internet which supplement real
world objects with information-processing capabilities [9].
Thus, middleware for sensor networks should supply a
holistic view on both traditional networks and WSN,
which is a challenge for architectural design and
implementation. Another single property of middleware
for WSN is imposed by the design principle application
information in nodes. Traditional middleware is designed
to accommodate a extensive variety of applications
without necessarily needing application information.
Middleware for WSN, however, has to provide
mechanisms for injecting application information into the
infrastructure and the WSN. Data-centric communication
mandates a communication paradigm which extra closely
resembles content-based messaging systems than
traditional RPC-style communication. Moreover, event
based communication matches the characteristics of the
WSN much improved than traditional request-reply
schemes. In general, application and communication
specific data processing is more integrated in WSN
middleware than in traditional systems. The design
principle adaptive fidelity algorithms requires the
infrastructure to provide suitable mechanisms for selecting
parameters or complete algorithms which solve a certain
problem with the most excellent quality under given
resource constraints.
2.8 Physical Layer Secure Access:
Physical layer secure access in wireless sensor
networks may very well be offered by using frequency
hopping. A dynamic mixture of the parameters like
hopping set (available frequencies for hopping), dwell
time (interval per hop) and hopping pattern (the sequence
in which the frequencies in the available hopping set is
used) could be combined with a little expense of memory,
processing and resources. Important points in physical
layer secure access will be the efficient design in order
that the hopping sequence is modified in less time than is
required to discover it and for employing this both sender
and receiver should maintain a synchronized clock. A
scheme as proposed in may be utilized which introduces
secure physical layer access employing the singular
vectors while using channel synthesized modulation.
Attacks against wireless sensor networks may very well be
broadly considered from two different levels of views.
One is the attack from the security mechanisms and this
band are brilliant from the basic mechanisms (like routing
mechanisms). Ideas signalize the most important attacks in
wireless sensor networks [27].
2.9 Localization:
It is amongst the key techniques in wireless sensor
network. The place estimation method is usually classified
into Target / source localization and node self-localization.
In target localization, we mainly introduce the energy-
based method. Then we investigate the node self-
localization methods. Considering that the widespread
adoption on the wireless sensor network, the localization
methods are wide and varied in several applications. There
are some challenges using some special scenarios. With
this paper, we present a wide survey these challenges:
localization in non-line-of-sight, node selection criteria for
localization in energy-constrained network, scheduling the
sensor node to optimize the tradeoff between localization
performance and energy consumption, cooperative node
localization, and localization algorithm in heterogeneous
network. Finally, we introduce the evaluation criteria for
localization in wireless sensor network. The entire process
of estimating the unknown node position inside the
network is known as node self-localization. And WSN
comprises a large number of inexpensive nodes which are
densely deployed in a very region of interests to measure
certain phenomenon. The leading objective would be to
determine the location of the target [28]. Localization is
significant travelers have an uncertainty with the exact
location of some fixed or mobile devices. One example
has been in the supervision of humidity and temperature in
forests and/or fields, where thousands of sensors are
deployed by way of plane, giving the operator minimal
possible ways to influence may location of node. An
efficient localization algorithm might utilize all the free
information from the wireless sensor nodes to infer the
positioning of the individual devices. Another application
5. Int. J. Advanced Networking and Applications
Volume: 09 Issue: 01 Pages: 3321-3328 (2017) ISSN: 0975-0290
3325
will be the positioning of an mobile robot determined by
received signal strength from your number of radio
beacons placed at known locations around the factory
floor. The primary function of an location estimation
method to calculate the geographic coordinates of network
nodes with unknown position in the deployment area.
Localization in wireless sensor networks is the process of
determining the geographical positions of sensors. Only a
number of the sensors (anchors) inside the networks have
prior knowledge about their geographical positions.
Localization algorithms utilize location information of
anchors and estimates of distances between neighboring
nodes to discover the positions in the rest of the sensors
[29].
3 CHARACTERISTIC FEATURES OF SENSOR
NETWORKS
In ad-hoc networks, wireless nodes self-organize into
infrastructure less network with a dynamic topology.
Sensor networks distribute these traits, but also have
numerous distinguishing features. The number of nodes in
a characteristic sensor network is much higher than in a
typical ad-hoc network, and dense deployments are
frequently desired to ensure connectivity and coverage: for
these reasons, sensor network hardware must be cheap.
Nodes classically have stringent energy limitations, which
create them more failure-prone. They are normally
assumed to be stationary, but their relatively common
breakdowns and the volatile nature of the wireless channel
nonetheless result in a variable network topology. The
sensor network hardware should be small, reliable,
inexpensive and power-efficient in order to maximize
network lifetime, facilitate data collection, add flexibility
and minimize the need for maintenance.
3.1 Lifetime:
Network lifetime is extremely critical for most
applications, and its main limiting factor is the energy
consumption of the nodes, it requires being self-powering.
Although it is frequently assumed that the transmit power
related with packet transmission accounts for the lion’s
share of sensing, power consumption, signal processing
and even hardware operation in standby manner consume
a consistent amount of power as well [10], [11]. In some
applications, additional power is needed for macro-scale
actuation. Many researchers recommend that energy
consumption could be reduced by considering the
presented interdependencies between individual layers in
the network protocol stack. Channel access protocols and
Routing, for instance, could greatly advantage from an
information exchange with the physical layer. At the
physical layer, benefits can be obtained with dynamic
modulation scaling and lower radio duty cycles (varying
the constellation size to minimize energy expenditure
[12]). Using low-power mode for the processor or
disabling the radio is generally beneficial, even though
periodically turning a subsystem on and off may be more
expensive than always keeping it on. Techniques aimed at
reducing the idle mode leakage current in CMOS-based
processors are also noteworthy [13]. MAC (Medium
Access Control) solutions have a direct impact on energy
consumption, as some of the main causes of energy waste
are found at the MAC layer: control packet overhead,
collisions, and idle listening. The power saving forward
error control techniques is not easy to implement due to
the high amount of computing power that they need, the
fact that extensive packets are normally not practical.
Energy-efficient routing should avoid the loss of a node
due to battery depletion. Numerous proposed protocols
tend to minimize energy consumption on forwarding
paths, but if some nodes happen to be situated on the most
forwarding paths (close to the base station), their lifetime
will be reduced.
3.2 Flexibility:
The Sensor networks should be scalable and they
should be able to dynamically adapt to changes in
topology and node density, like in the case of the self-
healing minefields. In surveillance applications, the
majority of nodes may remain quiescent as long as not
anything interesting happens. However, they must be able
to respond to special actions that the network intends to
study with a few degree of granularity. In a self-healing
minefield, a number of sensing mines may sleep as long as
nothing of their peers explodes, but need to rapidly
become operational in the case of an enemy attack.
Response time is also very critical in control applications
(sensor/actuator networks) in which the network is to
present a delay-guaranteed service. Unmetered systems
need to self-configure and adapt to different conditions.
Sensor networks should also be robust to changes in
topology, for instance due to the failure of particular
nodes. In particular, coverage and connectivity should for
all time be guaranteed. Connectivity is achieved if the base
station can be reached from any node. Coverage can be
seen as a measure of quality of service in a sensor network
[14], as it defines how well a particular area can be
observed by its characterize and network the probability of
detection of geographically constrained phenomena or
events. Whole coverage is particularly important for
surveillance applications.
3.3 Maintenance:
The maintenance in a sensor network is the partial or
complete update of the program code in the sensor nodes
over the wireless channel. All sensor nodes should be
reorganized, and the restrictions on the size of the new
code should be the similar as in the case of wired
programming. The portion of code for all the time running
in the node to guarantee reprogramming support should
have a little footprint, and updating actions should only
cause a brief interruption of the normal operation of the
node [15]. The performance of the network as a whole
should not be endangered by unavoidable failures of single
nodes, which may happen for a number of reasons, from
battery depletion to unpredictable exterior events, and may
either be independent or spatially correlated [16]. Fault
tolerance is mainly crucial as ongoing maintenance is
6. Int. J. Advanced Networking and Applications
Volume: 09 Issue: 01 Pages: 3321-3328 (2017) ISSN: 0975-0290
3326
rarely an choice in sensor network applications. Self-
configuring nodes are necessary to allow the deployment
process to run easily without human interaction, which in
principle be limited to placing nodes into a specified
geographical area. It is not desirable to have humans
organize nodes for destructively interfere and habitat
monitoring with wildlife in the process, or configure nodes
for urban warfare monitoring in a hostile environment.
The nodes should be able to review the quality of the
network deployment and indicate any problems that may
happen, as well as adjust to changing environmental
situation by automatic reconfiguration. Position awareness
is important for self configuration and has specific
advantages in terms of routing [17] and security. Time
synchronization [18] is advantageous in promoting
cooperation among nodes, such as channel access, data
fusion, coordination of sleep mode, or security-related
interaction.
3.4 Data Collection:
Data collection is associated to network coverage and
connectivity. An interesting solution is the use of
ubiquitous mobile agents that arbitrarily move around to
gather data bridging access points and sensor nodes,
whimsically named data MULEs (Mobile Ubiquitous
LAN Extensions) in [19]. The predictable mobility of the
data sink can be used to save power [20], as nodes can
learn its schedule. A similar idea has been implemented in
Intel’s Wireless Vineyard. It is frequently the case that all
data are relayed to a base station, but this form of
centralized data collection may shorten network lifetime.
Relaying data to a data sink causes non-uniform power
utilization patterns that may overburden forwarding nodes
[21]. This is particularly harsh on nodes providing end
links to base stations, which may finish up relaying traffic
coming from all other nodes, thus forming a critical
bottleneck for network throughput [22], [23]. An
interesting technique is clustering [24], nodes team up to
form transmits and cluster their information to their cluster
heads, which fuse the data and forward it to a sink. Fewer
packets are transmitted, and a consistent energy
consumption pattern may be achieved by periodic re-
clustering. Data redundancy is a minimized, as the
aggregation method fuses strongly correlated
measurements. Several applications require that queries be
sent to sensing nodes. This is true, for example, when a
goal is gathering data regarding a particular area where
various sensors have been deployed. This is the
justification behind looking at a sensor network as a
database [25]. A sensor network should be able to protect
itself and its data from external attacks, but the severe
limitations of lower-end sensor node hardware make
security a correct challenge. Typical encryption schemes,
for example, need large amounts of memory that are
unavailable in sensor nodes. Data confidentiality should be
preserved by encrypting data with a secret key shared with
the intended receiver. Data integrity should be ensured to
avoid unauthorized data alteration. An authenticated
broadcast must permit the verification of the legitimacy of
data and their sender. In a number of commercial
applications, a serious disservice to the user of a sensor
network is compromising data accessibility (denial of
service), which can be achieved by sleep-deprivation
torture [26]: batteries may be drained by nonstop service
requests or demands for legitimate but intensive tasks,
preventing the node from incoming sleep mode.
4 CONCLUSION
This paper provides different research challenges areas in
academia, industry and government. Research into exact
location techniques, free of infrastructure, will translate
into greater ease of installation and usefulness of sensor
data. Paramount to the success of the wireless sensor
network concept is achieving unprecedented end-to-end
energy efficiency across all layers of the system
architecture. While many challenges lie ahead, there are
great opportunities for those who share the vision to bring
this concept to fruition and characteristic features of
sensor networks
REFERENCES
[1] I. F. Akyildiz, W. Su, Y. Sankarasubramaniam, and E.
Cayirci, “A survey on sensor networks”, IEEE
Communications Magazine, Vol. 40, No. 8, pp. 102-
114, August 2002.
[2] M. Haenggi, “Opportunities and Challenges in
Wireless Sensor Networks,” in Handbook of Sensor
Networks: Compact Wireless and Wired Sensing
Systems, M. Ilyas and I. Mahgoub, eds., Boca Raton,
FL, pp. 1.1–1.14, CRC Press, 2004.
[3] C. Lu, B. Blum, T. Abdelzaher, J. Stankovic, and T.
He, RAP: A Real-Time Communication Architecture
for Large-Scale Wireless Sensor Networks, RTAS,
June 2002.
[4] T. He, J. Stankovic, C. Lu, and T. Abdelzaher, SPEED:
A Stateless Protocol for Real-Time Communication in
Ad Hoc Sensor Networks, IEEE ICDCS, May 2003.
[5] R. Bronson and G. Naadimuthu, Operations Research,
2 ed., Schaum’s Outlines, McGraw Hill, New York,
1997.
[6] Wood, A., Stankovic, J., and Son, S. JAM: A mapping
service for jammed regions in sensor networks. In
Proceedings of the IEEE Real-Time Systems
Symposium (Cancun, Mexico, Dec. 3–5, 2003).
[7] A. Wood and J. Stankovic, Denial of Service in Sensor
Networks, IEEE Computer, Vol. 35, No. 10, October
2002, pp. 54-62.
[8] A. Perrig, J. Stankovic, and D. Wagner, Security in
Wireless Sensor Networks, invited paper, CACM,
Vol. 47, No.6, June 2004, pp. 53-57.
7. Int. J. Advanced Networking and Applications
Volume: 09 Issue: 01 Pages: 3321-3328 (2017) ISSN: 0975-0290
3327
[9] T.-S. Chen, C.-Y. Chang, and J.-P. Sheu, “Efficient
pathbased multicast in wormhole-routed mesh
networks,” J. Sys. Architecture, vol. 46, pp. 919-930,
2000.
[10] A. Goldsmith and S. Wicker, “Design challenges for
energy-constrained ad hoc wireless networks,” IEEE
Wireless Communications Magazine, vol. 9, pp. 8–27,
Aug. 2002.
[11] L. Yuan and G. Qu, “Energy-efficient Design of
Distributed Sensor Networks,” in Handbook of Sensor
Networks: Compact Wireless and Wired Sensing
Systems, M. Ilyas and I. Mahgoub, eds., Boca Raton,
FL,pp. 38.1–38.19, CRC Press, 2004.
[12] C. Schurgers, O. Aberthorne, and M. Srivastava,
“Modulation scaling for energy aware communication
systems,” in Proceedings of the 2001 International
Symposium on Low Power Electronics and Design,
Huntington Beach, CA, pp. 96–99, Aug. 2001.
[13] A.P. Chandrakasan, R. Min, M. Bhardwaj, S. Cho,
and A. Wang, “Power aware wireless microsensor
systems,” in 28th European Solid-State Circuits
Conference (ESSCIRC’02), Florence, Italy, 2002.
[14] S. Meguerdichian, F. Koushanfar, M. Potkonjak, and
M. Srivastava, “Coverage problems in wireless ad-hoc
sensor networks,” in Proceedings of the 20th Annual
Joint Conference of the IEEE Computer and
Communications Societies (INFOCOM’01), vol. 3,
Anchorage, AK, pp. 1380–1387, Apr. 2001.
[15] N. Reijers and K. Loangendoen, “Efficient code
distribution in wireless sensor networks,” in Second
ACM International Workshop on Wireless Sensor
Networks and Applications, San Diego, CA, Sept.
2003.
[16] D. Ganesan, R. Govindan, S. Shenker, and D. Estrin,
“Highly resilient, energy efficient multipath routing in
wireless sensor networks,” in Proceedings of the 2nd
ACM International Symposium on Mobile Ad Hoc
Networking and Computing (MobiHoc’01), Long
Beach, CA, pp. 251–254, 2001.
[17] M. Mauve, H. Hartenstein, H. Fuessler, J.Widmer,
and W. Effelsberg, “Positionsbasiertes Routing fuer
die Kommunikation zwischen Fahrzeugen,” it—
Information Technology (formerly it + ti)—Methoden
und innovative Anwendungen der Informatik und
Informationstechnik, vol. 44, pp. 278–286, Oct. 2002.
[18] F. Sivrikaya and B. Yener, “Time synchronization in
sensor networks: A survey,” IEEE Network, vol. 18,
pp. 45–50, July–Aug. 2004.
[19] R.C. Shah, S. Roy, S. Jain, and W. Brunette, “Data
MULEs: Modeling and analysis of a three-tier
architecture for sparse sensor networks,” in Ad Hoc
Networks Journal, vol. 1, pp. 215–233, Elsevier, Sept.
2003.
[20] A. Chakrabarti, A. Sabharwal, and B. Aazhang,
“Using predictable observer mobility for power
efficient design of sensor networks,” in Information
Processing in Sensor Networks (IPSN’03), Palo Alto,
CA, Apr. 2003.
[21] M. Haenggi, “Twelve Reasons not to Route over
Many Short Hops,” in IEEE Vehicular Technology
Conference (VTC’04 Fall), Los Angeles, CA, Sept.
2004.
[22] M. Haenggi, “Opportunities and Challenges in
Wireless Sensor Networks,” in Handbook of Sensor
Networks: Compact Wireless and Wired Sensing
Systems, M. Ilyas and I. Mahgoub, eds., Boca Raton,
FL,pp. 1.1–1.14, CRC Press, 2004.
[23] M. Haenggi, “Energy-Balancing Strategies for
Wireless Sensor Networks,” in IEEE International
Symposium on Circuits and Systems (ISCAS’03),
Bangkok, Thailand, May 2003.
[24] O. Younis and S. Fahmy, “HEED: A Hybrid, Energy-
Efficient, Distributed Clustering Approach for Ad-hoc
Sensor Networks,” in IEEE Transactions on Mobile
Computing, vol. 3, pp. 366–379, 2004
[25] R. Govindan, J. Hellerstein, W. Hong, S. Madden, M.
Franklin, and S. Shenker, “The Sensor Network as a
Database,” Tech. Rep. 02–771, University of
Southern California, 2002.
ftp://ftp.usc.edu/pub/csinfo/ tech-reports/papers/02-
771.pdf.
[26] F. Stajano and R. Anderson, “The resurrecting
duckling: Security issues for ad-hoc wireless
networks,” in 7th International Workshop on Security
Protocols, Cambridge, UK, Apr. 1999.
[27] Security in Wireless Sensor Networks: Issues and
Challenges, Al-Sakib Khan Pathan, Hyung-Woo Lee,
Choong Seon Hong, ISBN 89-5519-129-4 Feb. 20-22,
2006 ICACT2006.
[28] A Survey of Localization inWireless Sensor Network,
Long Cheng,ChengdongWu, Yunzhou Zhang,HaoWu,
Mengxin Li, and CarstenMaple, Hindawi Publishing
8. Int. J. Advanced Networking and Applications
Volume: 09 Issue: 01 Pages: 3321-3328 (2017) ISSN: 0975-0290
3328
Corporation International Journal of Distributed Sensor
Networks Volume 2012, Article ID 962523, 12 pages
doi:10.1155/2012/962523.
[29] New Technique of Wireless Sensor Networks
Localization based on Energy Consumption, Anouar
Abdelhakim Boudhir Bouhorma Mohamed Ben
Ahmed Mohamed, International Journal of Computer
Applications (0975 – 8887) Volume 9– No.12,
November 2010.
Author Biography
Rajkumar is native of Bidar,
Karnataka, India. He received his
B.E Degree in Computer Science
and Engineering from VEC,
Bellary, Gulbarga University
Gulbarga and M.Tech in Computer Engineering from
SJCE Mysore, Visvesvaraya Technological University
Belgaum. Presently he was serving as Associate Professor
in the department of Information Science and Engineering
at Sambhram Institute Of Technology, Bangalore. His
areas of interest are wireless sensor network, adhoc
network and security. (pyage2005@gmail.com)
Dr. H. G. Chandrakanth is
native of Bangalore, Karnataka,
India. He received B.E Degree
from UVCE, Bangalore
University, Bangalore, India in
1991, MSEE from Southern
Illinois University Carbondale, USA in 1994 and PhD
from Southern Illinois University Carbondale, USA in
1998. Presently he was working as Principal in Sambhram
Institute of Technology, Bangalore.
(ckgowda@hotmail.com)
Dr. D. G. Anand is native of
Madikeri, Karnataka, India. He
received his B.E Degree from
AIT, Chikamagalore, Mysore
University and ME from UVCE
Bangalore University, Bangalore
and PhD from Jawaharlal Nehru
Technological University Anantapur, Andra Pradesh.
Presently he was working as Principal in Rajiv Gandhi
Institute of Technology, Bangalore. His areas of interest
are wireless communication, sensor networks.
(dg_anand2003@sifymail.com)
Dr.T.Johnpeter is native of
Chennai, Tamilnadu, India. He
received his B.E Degree from
Manonmaniyam sundaranar
University, Tirunelveli and ME
Madras University,and PhD from
Manonmaniyam Sundaranar University,Tirunelveli.
Presently he is working as HOD/CSE in Sambhram
Institute of Technology, Bangalore. His areas of interest
are Data mining, Neural Networks, wireless
communication, sensor networks.(tjpeter.cse@gmail.com)