The development of the wireless sensor networks (WSNs) in various applications like Defense, Health,
Environment monitoring, Industry etc. always attract many researchers in this field. WSN is the network
which consists of collection of tiny devices called sensor nodes. Sensor node typically combines wireless
radio transmitter-receiver and limited energy, restricted computational processing capacity and
communication band width. These sensor node sense some physical phenomenon using different
transduces. The current improvement in sensor technology has made possible WSNs that have wide and
varied applications. While selecting the right sensor for application a number of characteristics are
important. This paper provides the basics of WSNs including the node characteristics. It also throws light
on the different routing protocols.
Grid-Based Multipath with Congestion Avoidance Routing Protocolijtsrd
This Paper gives information about Grid base multipath wireless sensor network. We give a brief introduction about wireless sensor network, how sensor works in this network. How the Routing is done and if there is congestion detected in sensors networks and then how it can be solved. Routing protocols are also classified in several types like Proactive, Reactive, and Hybrid in also given here the details of that. Also here we describe various routing techniques like Traditional and Current techniques. In flooding based techniques, sensor broadcast the information and the destination sensor receives that information. In gossiping techniques, sensor sends information to neighbor sensor and so on. In this paper we also see that if any sensor id dies due to lack of power or any other problems then another path will be routed. Routing protocols are having 3 types Flat routing, Hierarchical routing and Location based routing. In Flat routing SPIN,DD, Rumor routing, etc protocols are used. In hierarchical routing LEACH, PEGASIS, TEEN protocols are used. Now a day LEACH and PEGASIS are widely used in cluster base Wireless Sensor Network. In leach protocol reduced the path using cluster head formulation in this method randomly any sensor make the cluster head n send messages in the network. In pegasis protocol use chaining concept and find the best path from base station to the destination station. PEGASIS and LEACH provide best routing techniques in wireless sensor network but they also have some disadvantages. We also differentiate flat and hierarchical routing techniques in which case which one gives best performances. Here we introduce the readers to Location based routing protocols GEAR and how it route the path is also briefly described here. Dr. Atul M Gosai | Lakshdeep M Raval"Grid-Based Multipath with Congestion Avoidance Routing Protocol" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-1 | Issue-3 , April 2017, URL: http://www.ijtsrd.com/papers/ijtsrd72.pdf http://www.ijtsrd.com/computer-science/computer-network/72/grid-based-multipath-with-congestion-avoidance-routing-protocol/dr-atul-m-gosai
Wireless Sensor Networks (WSNs) are distributed and independent sensors that are connected and worked together to measure quantities such as temperature, humidity, pressure, noise levels or vibrations. WSNs can measure vehicular movement (velocity, location, etc.) and monitor conditions such as lightning condition, soil makeup and motion. Nowadays, WSNs are utilized in many common applications such as vehicle applications. Some of vehicle applications are: vehicle tracking and detection, tire pressure monitoring, vehicle speed detection, vehicle direction indicator, traffic control, reversing aid sensors etc. Such applications can be divided in major categories such as safety, security, environment and logistics. To implement WSN in an application and have an efficient system, we need to consider about WSN technology, and its components. This paper is aimed at providing reliable software architecture of WSN that could be implemented for better performance and working.
in this paper authors made the study of basic clustering algorithm Leach. A comparison is made between Leach and Leach.wireless sensor network advantages, and wireless sensor network dataset
A Review on - Comparative Study of Issues in Cellular, Sensor and Adhoc Networkscscpconf
A cellular network is an asymmetric radio network which is made up of fixed transceivers or
nodes, maintain the signal while the mobile transceiver which is using the network is in the
vicinity of the node. An ad-hoc network is a local area network (LAN) that is built
spontaneously as devices connect.
Instead of relying on a base station to coordinate the flow of messages to each node in the
network, the individual network nodes forward packets to and from each other.
This paper focuses on various issues in cellular, adhoc and sensor network. As issues proves helpful for forthcoming research, this paper work as a backbone to elaborate the various research areas.
Grid-Based Multipath with Congestion Avoidance Routing Protocolijtsrd
This Paper gives information about Grid base multipath wireless sensor network. We give a brief introduction about wireless sensor network, how sensor works in this network. How the Routing is done and if there is congestion detected in sensors networks and then how it can be solved. Routing protocols are also classified in several types like Proactive, Reactive, and Hybrid in also given here the details of that. Also here we describe various routing techniques like Traditional and Current techniques. In flooding based techniques, sensor broadcast the information and the destination sensor receives that information. In gossiping techniques, sensor sends information to neighbor sensor and so on. In this paper we also see that if any sensor id dies due to lack of power or any other problems then another path will be routed. Routing protocols are having 3 types Flat routing, Hierarchical routing and Location based routing. In Flat routing SPIN,DD, Rumor routing, etc protocols are used. In hierarchical routing LEACH, PEGASIS, TEEN protocols are used. Now a day LEACH and PEGASIS are widely used in cluster base Wireless Sensor Network. In leach protocol reduced the path using cluster head formulation in this method randomly any sensor make the cluster head n send messages in the network. In pegasis protocol use chaining concept and find the best path from base station to the destination station. PEGASIS and LEACH provide best routing techniques in wireless sensor network but they also have some disadvantages. We also differentiate flat and hierarchical routing techniques in which case which one gives best performances. Here we introduce the readers to Location based routing protocols GEAR and how it route the path is also briefly described here. Dr. Atul M Gosai | Lakshdeep M Raval"Grid-Based Multipath with Congestion Avoidance Routing Protocol" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-1 | Issue-3 , April 2017, URL: http://www.ijtsrd.com/papers/ijtsrd72.pdf http://www.ijtsrd.com/computer-science/computer-network/72/grid-based-multipath-with-congestion-avoidance-routing-protocol/dr-atul-m-gosai
Wireless Sensor Networks (WSNs) are distributed and independent sensors that are connected and worked together to measure quantities such as temperature, humidity, pressure, noise levels or vibrations. WSNs can measure vehicular movement (velocity, location, etc.) and monitor conditions such as lightning condition, soil makeup and motion. Nowadays, WSNs are utilized in many common applications such as vehicle applications. Some of vehicle applications are: vehicle tracking and detection, tire pressure monitoring, vehicle speed detection, vehicle direction indicator, traffic control, reversing aid sensors etc. Such applications can be divided in major categories such as safety, security, environment and logistics. To implement WSN in an application and have an efficient system, we need to consider about WSN technology, and its components. This paper is aimed at providing reliable software architecture of WSN that could be implemented for better performance and working.
in this paper authors made the study of basic clustering algorithm Leach. A comparison is made between Leach and Leach.wireless sensor network advantages, and wireless sensor network dataset
A Review on - Comparative Study of Issues in Cellular, Sensor and Adhoc Networkscscpconf
A cellular network is an asymmetric radio network which is made up of fixed transceivers or
nodes, maintain the signal while the mobile transceiver which is using the network is in the
vicinity of the node. An ad-hoc network is a local area network (LAN) that is built
spontaneously as devices connect.
Instead of relying on a base station to coordinate the flow of messages to each node in the
network, the individual network nodes forward packets to and from each other.
This paper focuses on various issues in cellular, adhoc and sensor network. As issues proves helpful for forthcoming research, this paper work as a backbone to elaborate the various research areas.
Data Flow in Wireless Sensor Network Protocol Stack by using Bellman-Ford Rou...journalBEEI
Wireless sensor network consists various sensor nodes that are used to monitor any target area like forest fire detection by our army person and monitoring any industrial activity by industry manager. Wireless sensor networks have been deployed in several cities to monitor the concentration of dangerous gases for citizens. In wireless sensor network when sensor nodes communicate from each other then routing protocol are used for communication between protocol layers. Wireless sensor network protocol stack consist five layers such as Application layer, Transport layer, Network layer, MAC Layer, Physical layer. In this paper we study and analysis Bellman-Ford routing algorithm and check the flow of data between these protocol layers. For simulation purpose we are using Qualnet 5.0.2 simulator tool.
To analyze the efficiency of heterogeneous wireless sensor network over homogenous wireless sensor network.
To analyze the stability, life time ,through put.
Node Deployment in Homogeneous and Heterogeneous Wireless Sensor NetworkIJMTST Journal
Optimal sensor deployment is necessary condition in homogeneous and heterogeneous wireless sensor
network. Effective deployment of sensor nodes is a major point of concern as performance and lifetime of any
WSN. Proposed sensor deployment in WSN explore every sensor node sends its data to the nearest sink node
of the WSN. In addition to that system proposes a hexagonal cell based sensor deployment which leads to
optimal sensor deployment for both homogeneous and heterogeneous sensor deployment. Wireless sensor
networks are receiving significant concentration due to their potential applications ranging from surveillance
to tracking domains. In limited communication range, a WSN is divided into several disconnected sub-graphs
under certain conditions. We deploy sensor nodes at random locations so that it improves performance of the
network.This paper aims to study, discuss and analyze various node deployment strategies and coverage
problems for Homogeneous and Heterogeneous WSN.
Building Fault Tolerance Within Wsn-A Topology ModelIJAAS Team
Wireless Sensor network plays a crucial role which helps in visualizing, processing, and analyzing the information wirelessly. WSN is a network which consists of huge amount of sensor devices which are of low cost and low powered also known as sensor nodes. These type of networks are generally used in real time applications such as monitoring of environmental conditions, militaries, industries etc., .but the problem that exists in WSN is may be due to different failures such as node failure, link failure, sink failure, interference, power dissipation and collision. If these faults are unable to handle then the desired network criteria’s may not be reached properly which results in inefficiency of the network. So, the main idea behind the investigation is to form a different networking topology which works in the event of failure.
The three-way need for higher data rates, good quality of service and ubiquity in a converged all IP
communication cloud drives research in wireless communication. Wireless access networks are envisaged
candidates of the next generation wireless networks. The various access networks will be integrated with
other technologies including the wired backbone. The major issues in an all IP and converged networks
are: quality of service, seamless handover and network capacity. Emerging research seeks to address these
open research issues; for example the implementation of multi-channel and multi radio MAC protocols in
WMN. In this paper we analyze and evaluate the effectiveness of multi-channel and multi radio techniques
in WMN. The shortcomings of these schemes are highlighted and possible solutions are suggested. The
signalling delay metric is used for evaluation purposes. The focus is on the performance of the control
channel identified as the critical performance metric of multi-channel MAC protocols.
Data Flow in Wireless Sensor Network Protocol Stack by using Bellman-Ford Rou...journalBEEI
Wireless sensor network consists various sensor nodes that are used to monitor any target area like forest fire detection by our army person and monitoring any industrial activity by industry manager. Wireless sensor networks have been deployed in several cities to monitor the concentration of dangerous gases for citizens. In wireless sensor network when sensor nodes communicate from each other then routing protocol are used for communication between protocol layers. Wireless sensor network protocol stack consist five layers such as Application layer, Transport layer, Network layer, MAC Layer, Physical layer. In this paper we study and analysis Bellman-Ford routing algorithm and check the flow of data between these protocol layers. For simulation purpose we are using Qualnet 5.0.2 simulator tool.
To analyze the efficiency of heterogeneous wireless sensor network over homogenous wireless sensor network.
To analyze the stability, life time ,through put.
Node Deployment in Homogeneous and Heterogeneous Wireless Sensor NetworkIJMTST Journal
Optimal sensor deployment is necessary condition in homogeneous and heterogeneous wireless sensor
network. Effective deployment of sensor nodes is a major point of concern as performance and lifetime of any
WSN. Proposed sensor deployment in WSN explore every sensor node sends its data to the nearest sink node
of the WSN. In addition to that system proposes a hexagonal cell based sensor deployment which leads to
optimal sensor deployment for both homogeneous and heterogeneous sensor deployment. Wireless sensor
networks are receiving significant concentration due to their potential applications ranging from surveillance
to tracking domains. In limited communication range, a WSN is divided into several disconnected sub-graphs
under certain conditions. We deploy sensor nodes at random locations so that it improves performance of the
network.This paper aims to study, discuss and analyze various node deployment strategies and coverage
problems for Homogeneous and Heterogeneous WSN.
Building Fault Tolerance Within Wsn-A Topology ModelIJAAS Team
Wireless Sensor network plays a crucial role which helps in visualizing, processing, and analyzing the information wirelessly. WSN is a network which consists of huge amount of sensor devices which are of low cost and low powered also known as sensor nodes. These type of networks are generally used in real time applications such as monitoring of environmental conditions, militaries, industries etc., .but the problem that exists in WSN is may be due to different failures such as node failure, link failure, sink failure, interference, power dissipation and collision. If these faults are unable to handle then the desired network criteria’s may not be reached properly which results in inefficiency of the network. So, the main idea behind the investigation is to form a different networking topology which works in the event of failure.
The three-way need for higher data rates, good quality of service and ubiquity in a converged all IP
communication cloud drives research in wireless communication. Wireless access networks are envisaged
candidates of the next generation wireless networks. The various access networks will be integrated with
other technologies including the wired backbone. The major issues in an all IP and converged networks
are: quality of service, seamless handover and network capacity. Emerging research seeks to address these
open research issues; for example the implementation of multi-channel and multi radio MAC protocols in
WMN. In this paper we analyze and evaluate the effectiveness of multi-channel and multi radio techniques
in WMN. The shortcomings of these schemes are highlighted and possible solutions are suggested. The
signalling delay metric is used for evaluation purposes. The focus is on the performance of the control
channel identified as the critical performance metric of multi-channel MAC protocols.
AN EFFICIENT ROUTING PROTOCOL FOR MOBILE AD HOC NETWORK FOR SECURED COMMUNICA...pijans
Security and reliable communication is challenging task in mobile Ad Hoc network. Through mobility of
network device compromised with attack and loss of data. For the prevention of attack and reliable
communication, various authors proposed a method of secured routing protocol such as SAODV and SBRP
(secured backup routing protocol). The process of these methods work along with route discovery and
route maintains, discovery and route maintained needed more power consumption for that process. The
power of devices is decrease during such process and network lifetimes expire. In this paper, we modified
the secured stateless protocol for secured routing and minimized the utilization of power during path
discovering and establishment. For the authentication of group node used group signature technique and
sleep mode threshold concept for power minimization. Our proposed technique is simulated in ns-2 and
compare to other routing protocol gives a better performance in comparison to energy consumption and
throughput of network.
A comparitive analysis of wireless security protocols (wep and wpa2)pijans
Wireless local area networks (WLANs) are become popular as they are fast, cost effective, flexible and easy
to use. There are some challenges of security and for IT administrators the choice of security protocol is a
critical issue. The main motive of this paper is to make the non-specialist reader knowledgeable about
threats in the wireless security and make them aware about the disadvantages of wireless security
protocols. WEP (Wired Equivalent privacy), WPA (Wi-Fi Protected Access) and RSN (Robust Security
Network) security protocols are defined and examined here. This security protocols are compared with the
common.
This paper is a comparative analysis of WEP, WPA and WPA2. We have tried to perform and check
authentication of all 3 protocols by implying the legendary attack vector scripts i.e. Air crack set of tools.
The test was conducted on Back Track operating system which is considered as dedicated pentesting
operating system. In the test result, we found out that WEP is the weakest, to which WPA was a temporary
solution and WPA2 is a very solid and long term solution.
This paper is a mixture of wireless security weaknesses and counter measures to the problems faced until
recently. After reading this paper the non specialist reader will have complete review and awareness about
the wireless security and vulnerabilities involved with it.
AN OPTIMIZED MECHANISM FOR ADAPTIVE AND DYNAMIC POLICY BASED HANDOVER IN CLUS...pijans
On-going revolution in ever-improving wireless communication enforces the necessity of a self configuring,
rapidly deployable and infrastructure less network. MANET is such an autonomous wireless network that
meets the requirements. At the same time MANET’s random behavior and absence of any central
intelligence to gather unambiguous knowledge about user contexts complexes QoS maintenance and
hampers proper utilization of network resources resulting into unnecessary handovers. In past, few policy
driven handover approaches have been proposed for MANET but none of them explores a comprehensive
policy design. Therefore in this paper we propose an adaptive and optimized policy based handover
mechanism which is based on explicitly designed policies like load balancing, service discovery and next
hop selection .Efficient procedures for these policies are also explored .This work predicts the high time of
handover need on the basis of application specific needs of individual freely roaming mobile nodes,
avoiding unnecessary handovers and provides efficient handover procedure with optimized resource
consumption, reduced latency and interruption time.
PERFORMANCE EVALUATION OF VEHICULAR AD HOC NETWORK (VANET) USING CLUSTERING A...pijans
Vehicular ad hoc networks (VANETS) have actually attracted a lot of attention over the last few years as
being used to improve road safety. In this paper, cluster based technique has been introduced in VANET.
As VANET is a new form of MANET, so with this cluster based technique in VANET, several handoff
problems have been removed, which were actually difficult to remove in MANET. For this traffic
infrastructure cluster based routing has been used, with two routing protocols i.e. AODV and AODV+. The
network simulator NS2 has been used for removing unpredictable movements that may arise in the network.
S IMULATION B ASED S TUDY OF C OOPERATIVE B LACK H OLE A TTACK R ESOLU...pijans
An Ad hoc Network is a pool of wireless mobile node
s energetically forming a network without the use o
f
any pre-accessible network infrastructure or centra
lized administrator. These nodes communicate with
each other by hop-to-hop communication. This dynami
c topology of mobile ad-hoc networks (MANETs)
allows nodes to get attached and leave the network
at any second of time. Thus MANET can be used in a
variety of fields. Current MANETs are designed prim
ary for military utility. This generic characterist
ic of
MANET has rendered its vulnerability to security at
tacks. Due to which unprotected attacks of the
malicious nodes can occur at any time. This paper f
ocuses on one such attack known as “Black hole
attack” and the routing protocol being used here is
AODV
An ids scheme against black hole attack to secure aomdv routing in manet pijans
In Mobile Ad hoc Network (MANET) all the nodes are freely moves in the absence of without ant
centralized coordination system. Due to that the attackers or malicious nodes are easily affected that kind
of network and responsible for the routing misbehavior. The routing is network is mandatory to deliver
data in between source and destination. In this research we work on security field in MANET and proposed
a novel security scheme against routing misbehavior through Black hole attack. The Ad hoc On demand
Multipath Routing (AOMDV) protocol is consider for routing and also to improves the routing quality as
compare to single path routing protocol. The attacker is affected all the possible paths that is selected by
sender for sending data in network. The malicious nodes are forward optimistic reply at the time of routing
by that their identification is also a complex procedure. The proposed Intrusion Detection System (IDS)
scheme is identified the attacker information through hop count mechanism. The routing information of
actual data is reached to which intermediate node and the next hop information is exist at that node is
confirm by IDS scheme. The black hole attacker node Identification (ID) is forward in network by that in
future attacker is not participating in routing procedure. The proposed security scheme detects and
provides the deterrence against routing misbehavior through malicious attack. Here we compare the
routing performance of AOMDV, Attack and IDS scheme. The performance of normal multipath routing
and proposed IDS scheme is almost equal. The attacker has degrades the whole routing performance but
observed that in presence of attacker, routing misbehavior is completely block by the proposed IDS scheme
and recovers 95 % of data as compare to normal routing.
Security attacks and solutions in vehicular ad hoc networks a surveypijans
Vehicular Ad hoc Networks (VANETs) have emerged recently as one of the most attractive topics for
researchers and automotive industries due to their tremendous potential to improve traffic safety, efficiency
and other added services. However, VANETs are themselves vulnerable against attacks that can directly
lead to the corruption of networks and then possibly provoke big losses of time, money, and even lives. This
paper presents a survey of VANETs attacks and solutions in carefully considering other similar works as
well as updating new attacks and categorizing them into different classes.
EVENT DRIVEN ROUTING PROTOCOLS FOR WIRELESS SENSOR NETWORK- A SURVEYijcsa
Advances in embedded systems have resulted in the development of wireless sensor networks, which not
only provide unique opportunities for monitoring but also controlling homes, cities and the environments.
Recent advancements in wireless sensor network have resulted into many new protocols some of them are
specifically designed for sensor network for detecting the event and routing the event related information to
the base station in efficient manner. This paper surveys recent event driven routing protocols for wireless
sensor network. We have compared various event driven routing protocols using different parameters like
Sink Centric, Node Centric, Reliability, Congestion control, Energy Efficiency, Loss reliability and loss
recovery. We have also described LEACH and MECN protocols but as they are not e
Secure and Efficient DiDrip Protocol for Improving Performance of WSNsINFOGAIN PUBLICATION
Wireless Sensor Networks consists of a set of resource constrained devices called nodes that communicate wirelessly with each other. Wireless Sensor Networks have become a key application in number of technologies. It also measures the unit of vulnerability to security threats. Several Protocols are projected to make them secure. Some of the protocols within the sensor network specialize in securing data. These protocols are named as data discovery and dissemination protocols. The data discovery and dissemination protocol for wireless sensor networks are utilized for distributing management commands and altering configuration parameters to the sensor nodes. All existing data discovery and dissemination protocols primarily suffer from two drawbacks. Basically, they are support centralized approach (only single station can distribute data item).This approach is not suitable for multiple owner-multiple users. Second, the protocols are not designed with security in mind. This Paper proposes the first distributed knowledge discovery and dissemination protocol called DiDrip which is safer than the existing one. The protocol permits multiple owners to authorize many network users with altogether totally different priorities to at an equivalent time and directly flow into data items to sensor nodes.
A review of Hierarchical energy Protocols in Wireless Sensor Networkiosrjce
IOSR Journal of Computer Engineering (IOSR-JCE) is a double blind peer reviewed International Journal that provides rapid publication (within a month) of articles in all areas of computer engineering and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications in computer technology. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
EFFICIENT HIERARCHICAL ROUTING PROTOCOL IN SENSOR NETWORKSijassn
Wireless sensor network (WSN) is the network of hundreds and thousands of micro-sensor nodes,
connecting each other by a wireless medium.WSN provide reliable sensing of the environment, detecting
and reporting events to the sink. One of the most important constraints of WSN is energy consumption.
Since the micro sensors are small in dimension, batteries are necessary to produce power to the network. In
this paper, we have proposed an algorithm for hierarchy based protocols of wireless sensor networks,
which consist of two groups of sensor nodes in a single cluster node. Each cluster consists of a three cluster
head. The event driven data sensing mechanism is used in this paper and this sensed data is transmitted to
the master section head. The gathered data is transmitted to the sink via mobile agent. Hence efficient way
of data transmission is possible with larger group of nodes. In this approach of using hierarchy based
protocols; the lifetime of the sensor network is increased. This paper proposes an innovative approach of
cluster head election. The results are compared with LEACH protocol and proved to be energy efficient.
International Journal of Computational Engineering Research(IJCER) ijceronline
International Journal of Computational Engineering Research(IJCER) is an intentional online Journal in English monthly publishing journal. This Journal publish original research work that contributes significantly to further the scientific knowledge in engineering and Technology.
Design Issues and Applications of Wireless Sensor Networkijtsrd
Efficient design and implementation of wireless sensor networks has become a hot area of research in recent years, due to the vast potential of sensor networks to enable applications that connect the physical world to the virtual world. By networking large numbers of tiny sensor nodes, it is possible to obtain data about physical phenomena that was difficult or impossible to obtain in more conventional ways. In future as advances in micro-fabrication technology allow the cost of manufacturing sensor nodes to continue to drop, increasing deployments of wireless sensor networks are expected, with the networks eventually growing to large numbers of nodes.Potential applications for such large-scale wireless sensor networks exist in a variety of fields, including medical monitoring, environmental monitoring, surveillance, home security, military operations, and industrial machine monitoring etc. G. Swarnalatha | R. Srilalitha"Design Issues and Applications of Wireless Sensor Network" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-1 | Issue-6 , October 2017, URL: http://www.ijtsrd.com/papers/ijtsrd4688.pdf http://www.ijtsrd.com/engineering/computer-engineering/4688/design-issues-and-applications-of-wireless-sensor-network/g-swarnalatha
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
EFFECTIVE AND SECURE DATA COMMUNICATION IN WSNs CONSIDERING TRANSFER MODULE O...IJEEE
A Bio-inspired clustering algorithm based on BFO has been proposed and investigation on energy efficient clustering algorithms related to WSNs has been done in this paper. The contribution of this paper related to use of Bacteria foraging algorithm firstly for WSNs for enhancing network lifetime of sensor nodes.
Concealed Data Aggregation with Dynamic Intrusion Detection System to Remove ...csandit
Data Aggregation is a vital aspect in WSNs (Wireless Sensor Networks) and this is because it
reduces the quantity of data to be transmitted over the complex network. In earlier studies
authors used homomorphic encryption properties for concealing statement during aggregation
such that encrypted data can be aggregated algebraically without decrypting them. These
schemes are not applicable for multi applications which lead to proposal of Concealed Data
Aggregation for Multi Applications (CDAMA). It is designed for multi applications, as it
provides secure counting ability. In wireless sensor networks SN are unarmed and are
susceptible to attacks. Considering the defence aspect of wireless environment we have used
DYDOG (Dynamic Intrusion Detection Protocol Model) and a customized key generation
procedure that uses Digital Signatures and also Two Fish Algorithms along with CDAMA for
augmentation of security and throughput. To prove our proposed scheme’s robustness and
effectiveness, we conducted the simulations, inclusive analysis and comparisons at the ending.
CONCEALED DATA AGGREGATION WITH DYNAMIC INTRUSION DETECTION SYSTEM TO REMOVE ...cscpconf
Data Aggregation is a vital aspect in WSNs (Wireless Sensor Networks) and this is because it
reduces the quantity of data to be transmitted over the complex network. In earlier studies
authors used homomorphic encryption properties for concealing statement during aggregation
such that encrypted data can be aggregated algebraically without decrypting them. These
schemes are not applicable for multi applications which lead to proposal of Concealed Data
Aggregation for Multi Applications (CDAMA). It is designed for multi applications, as it
provides secure counting ability. In wireless sensor networks SN are unarmed and are
susceptible to attacks. Considering the defence aspect of wireless environment we have used
DYDOG (Dynamic Intrusion Detection Protocol Model) and a customized key generation
procedure that uses Digital Signatures and also Two Fish Algorithms along with CDAMA for
augmentation of security and throughput. To prove our proposed scheme’s robustness and
effectiveness, we conducted the simulations, inclusive analysis and comparisons at the ending.
Survey of Wireless Sensor Network Applicationijsrd.com
Sensor networks offer a powerful combination of distributed sensing, computing and communication. They lend themselves to countless applications and, at the same time, offer numerous challenges due to their peculiarities, primarily the stringent energy constraints to which sensing nodes are typically subjected. The distinguishing traits of sensor networks have a direct impact on the hardware design of the nodes at least four levels: power source, processor, communication hardware, and sensors. Various hardware platforms have already been designed to test the many ideas spawned by the re-search community and to implement applications to virtually all fields of science and technology. We are convinced that CAS will be able to provide a substantial contribution to the development of this exciting field. A wireless sensor network (WSN) has important applications such as remote environmental monitoring and target tracking. This has been enabled by the availability, particularly in recent years, of sensors that are smaller, cheaper, and intelligent. These sensors are equipped with wireless interfaces with which they can communicate with one another to form a network. The design of a WSN depends significantly on the application, and it must consider factors such as the environment, the application's design objectives, cost, hardware, and system constraints. The goal of our survey is to present a comprehensive review of the recent literature since the publication of [I.F. Akyildiz, W. Su, Y. Sankarasubramaniam, E. Cayirci, A survey on sensor networks, IEEE Communications Magazine, 2002]. Following a top-down approach, we give an overview of several new applications and then review the literature on various aspects of WSNs. We classify the problems into three different categories: (1) Internal platform and underlying operating system, (2) Communication protocol stack, and (3) Network services, provisioning, and deployment. We review the major development in these three categories and outline new challenges.
An Optimized Mechanism for Adaptive and Dynamic Policy Based Handover in Clus...pijans
On-going revolution in ever-improving wireless communication enforces the necessity of a self configuring,
rapidly deployable and infrastructure less network. MANET is such an autonomous wireless network that
meets the requirements. At the same time MANET’s random behavior and absence of any central
intelligence to gather unambiguous knowledge about user contexts complexes QoS maintenance and
hampers proper utilization of network resources resulting into unnecessary handovers. In past, few policy
driven handover approaches have been proposed for MANET but none of them explores a comprehensive
policy design. Therefore in this paper we propose an adaptive and optimized policy based handover
mechanism which is based on explicitly designed policies like load balancing, service discovery and next
hop selection .Efficient procedures for these policies are also explored .This work predicts the high time of
handover need on the basis of application specific needs of individual freely roaming mobile nodes,
avoiding unnecessary handovers and provides efficient handover procedure with optimized resource
consumption, reduced latency and interruption time.
An Efficient Routing Protocol for Mobile Ad Hoc Network for Secured Communica...pijans
Security and reliable communication is challenging task in mobile Ad Hoc network. Through mobility of network device compromised with attack and loss of data. For the prevention of attack and reliable communication, various authors proposed a method of secured routing protocol such as SAODV and SBRP (secured backup routing protocol). The process of these methods work along with route discovery and route maintains, discovery and route maintained needed more power consumption for that process. The power of devices is decrease during such process and network lifetimes expire. In this paper, we modified the secured stateless protocol for secured routing and minimized the utilization of power during path discovering and establishment. For the authentication of group node used group signature technique and sleep mode threshold concept for power minimization. Our proposed technique is simulated in ns-2 and compare to other routing protocol gives a better performance in comparison to energy consumption and throughput of network.
As-Puma : Anycast Semantics In Parking Using Metaheuristic Approachpijans
The number of vehicle used in the world are increasing day by day resulting in the obvious problem of
parking of these vehicle’s in residential and vocational areas. We perceive the problem of vehicles parking
in vocational establishments / malls. Today majority of parking systems are manual parking systems where
in, on the spot, parking of the vehicle is done and a parking slip is generated and handed over to customer.
This is cumbersome technique wherein various parking attendants in the parking areas manually keeps on
informing the Parking inspector on how many free parking slots available so that only that many number of
parking slips/tickets are generated as the number of free parking slots. We address the problem of parking
in Delay Tolerant Network (DTN) by proposing metaheuristic driven approach of Ant Colony optimization
(ACO) technique with anycast semantics models . Here we propose the parking architecture to solve the
problem of parking especially in commercial areas with their design diagrams . In this architecture we
apply the delivery model to deliver the packet correctly to the intended receiver. Using this we can book
various parking’s through remote areas so that the customer can get the information about availability of
various parking’s inside an area and the parking fare for each category of the automobile. Using this
architecture the customer can get the prior knowledge about various vacant parking slots inside a parking
area and he can book the corresponding parking from his location.
A Survey of Enhanced Routing Protocols for Manetspijans
Mobile Ad Hoc Networks (MANETs) form a class of dynamic multi-hop networks consisting of a set of
mobile nodes that intercommunicate on shared wireless channels. MANETs are self-organizing and selfconfiguring multi-hop wireless networks, where the network structure changes dynamically due to the node
mobility. There exists no fixed topology due to the mobility of nodes, interference, multipath propagation
and path loss. Hence efficient dynamic routing protocols are required for these networks to function
properly. Many routing protocols have been developed to accomplish this task. In this paper we survey
various new routing protocols that have been developed as extensions or advanced versions of previously
existing routing protocols for MANETs such as DSR, AODV, OLSR etc.
Black Hole Attack Prevention Using Random Dispersive Routing for Mobile Adhoc...pijans
Mobile Adhoc Networks is a wireless network and it has become an important technology in current years
in which security has become an important problem. Black hole Attack is one of the promising and severe
security attacks in mobile ad hoc networks which block the communication of secret data during packet
delivery. Black hole attack directly attacks the node’s data traffic on the path and with intent drops, alters
or delays the data traffic passing through that node. In other type of black hole attack which misleadingly
replies for the route request which comes from the node which initiates the route discovery process that it
has as much as necessary routes to the destination even it does not have path to the destination. This paper
deals with prevention of black hole attacks using Shamir’s secret sharing and Random Multipath Routing
Algorithm
Performance Analysis of Mtpr Routing Protocol in Power Deficient Nodepijans
Power conservation in Mobile Ad hoc Network (MANET) is a major challenge even today for researchers.
To conserve it various power aware routing protocols have been proposed. These protocols do not take into
consideration the residual power left in nodes. To find the impact of the same a simulator was designed in
MATLAB-7.01. The routing protocol used in our simulation is Minimum Total Power Routing (MTPR) and
different performance metrics such as path optimality, throughput and hop count were recorded in
presence and absence of power scarce node. The result shows significant impact of power scarce node on
MANET performance.
Path Duration Analysis in Vehicular Ad Hoc Networkpijans
In Vehicular Ad hoc Networks (VANETs) the mobility of the nodes is the main concern. This mobility of
nodes makes the route unstable and unreliable for the information exchange and communication between
two nodes in the network. To enhance the performance and throughput of the VANETs, routes between
nodes must be reliable and stable. In this paper, we study the significance of path duration and link
duration in Vehicular Ad hoc Networks (VANETs). Because of this mobility, connectivity graphs changes
very frequently and it affects the performance of VANETs. Therefore, path duration can be used to predict
the behaviour of the mobile nodes in the network. Estimation of the path duration in VANETs can be a key
factor to improve the performance of the routing protocol. Estimation of path duration is a challenging task
to perform as it depends on many parameters including node density, transmission range, numbers of hops,
and velocity of nodes. This paper will provide a comprehensive study for estimating the path duration in
VANETs.
Study of Various Schemes for Link Recovery in Wireless Mesh Networkpijans
As there is a growing need for the cost effective and highly dynamic large-bandwidth networks over large
coverage area , the Wireless Mesh Network provide first step towards effective communication. A Wireless
Mesh Network is one of the most advanced wireless network used for communication. During their
operating period , the wireless mesh network may suffer from frequent link failure which results in poor
performance of network. Link failure detection plays crucial role in performance of WMN. The proposed
paper presents the review of various techniques used for detection of link failure and the techniques used
for recovery of wireless mesh network.
A Survey on Security Issues to Detect Wormhole Attack in Wireless Sensor Networkpijans
Sensor nodes, when deployed to form Wireless sensor network operating under control of central authority
i.e. Base station are capable of exhibiting interesting applications due to their ability to be deployed
ubiquitously in hostile & pervasive environments. But due to same reason security is becoming a major
concern for these networks. Wireless sensor networks are vulnerable against various types of external and
internal attacks being limited by computation resources, smaller memory capacity, limited battery life,
processing power & lack of tamper resistant packaging. This survey paper is an attempt to analyze threats
to Wireless sensor networks and to report various research efforts in studying variety of routing attacks
which target the network layer. Particularly devastating attack is Wormhole attack- a Denial of Service
attack, where attackers create a low-latency link between two points in the network. With focus on survey of
existing methods of detecting Wormhole attacks, researchers are in process to identify and demarcate the
key research challenges for detection of Wormhole attacks in network layer.
This document is Intended for the purpose of Enabling the power of social media to Empower Ridesharing.
this entails the creation of an ad-ridesharing Initiative with a view to tackling real-world problems such as
traffic congestion and the ever-increasing fuel prices. The main objectives include creating applications,
both web and mobile based, to seamlessly integrate the app’s functionality into and everyday user’s
routine.
Performance Analysis of Improved Autonomous Power Control Mac Protocol (IAPCM...pijans
Power Control in Mobile Ad Hoc networks is a critical issue, since nodes are powered by batteries.The
main idea of power control schemes is to use different power levels for RTS/CTS and DATA/ACK. These
schemes may degrade network throughput and reduce energy efficiency of the network. In this paper we
have evaluated the performance of Improved Autonomous Power Control MAC Protocol (IAPCMP),that
allows nodes to dynamically adjust power levels for transmission of DATA/ACK according to the distance
between the transmitter and its neighbors.In IAPCMP power level for transmission of RTS/CTS is also
adjustable. This also used maximum power level for transmitting DATA/ACK periodically to make
neighboring nodes aware about ongoing transmission. The performance of IAPCMP is evaluated through
the metrics namely, packet delivery ratio and rate of energy efficiency.The simulation results show
significant improvement in protocol.
A Survey of Using Directional Antennas in Ad Hoc Networkspijans
In this paper, we present a comprehensive overview on Ad hoc networking by directional antennas. Use of
Directional antennas can largely reduce the interference, increase the spatial reuse and due to their longer
range we can have routes with fewer hop for two distant nodes. However the main problem of using
directional antennas in Ad hoc networks is due to the dynamic nature of the network. Neighbour discovery,
maintenance the track of moving neighbours, exploitation of the benefit of long range and directional MAC
protocols are the most challenging issues. We present three Directional MAC protocols and two
combinational protocols and system which give solutions to MAC and Neighbour discovery and compare
the throughput of them with 802.11 with omnidirectional antennas.
Wireless Evolution: IEEE 802.11N, 802.11AC, and 802.11AX Performance Comparisonpijans
The widespread adoption of IEEE 802.11 WLANs is attributed to their inherent mobility, flexibility, and
cost-effectiveness. Within the IEEE 802 working group, a dedicated task group is diligently advancing
WLAN technologies, particularly tailored for dense network scenarios. Amidst these advancements, the
802.11ac protocols have emerged as a preferred choice, delivering superior data transfer rates compared
to the preceding 802.11n standard. Significantly, the sixth-generation wireless protocol, IEEE 802.11ax,
has been introduced, showcasing enhanced performance capabilities that outpace its fifth-generation
predecessor, 802.11ac.In this pioneering investigation, we engage in an in-depth simulation-based scrutiny
of prominentWLAN protocols—namely, IEEE 802.11n, IEEE 802.11ac, and the cutting-edge IEEE
802.11ax. Our exhaustive analyses traverse a spectrum of critical metrics, encompassing throughput,
coverage, spectral efficiency, Tx/Rx gain, and Tx/Rx power.In a single-user and SISO scenario, both
802.11ac and 802.11ax outperform 802.11n. Significantly, 802.11ax surpasses the previous 802.11n/ac
standards, highlighting substantial advancements in wireless performance.
Performance Improvement of Multiple Connections in AODV with the Concern of N...pijans
Mobile Ad-hoc Networks (MANETS) consists of a collection of mobile nodes without having a central
coordination. In MANET, node mobility and dynamic topology play an important role in the performance.
MANET provide a solution for network connection at anywhere and at any time. The major features of
MANET are quick set up, self organization and self maintenance. Routing is a major challenge in MANET
due to it’s dynamic topology and high mobility. Several routing algorithms have been developed for
routing. This paper studies the AODV protocol and how AODV is performed under multiple connections in
the network. Several issues have been identified. The bandwidth is recognized as the prominent factor
reducing the performance of the network. This paper gives an improvement of normal AODV for
simultaneous multiple connections under the consideration of bandwidth of node.
An Efficient Call Admission Control Scheme for Handling Handoffs in Wireless ...pijans
Personal Communication Network (PCN) is an emerging wireless network that promises many new
services for the telecommunication industry. The proliferation of demands for extending wireless services
to integrated services, which supports the transmission of data and multimedia information, has resulted in
the need for broadband wireless systems that are able to provide service capabilities similar to those of
wire line networks. The ATM cell - relay paradigm is one possible approach to provide broadband wireless
transmission with PCN’s using the ATM switching networks for interconnection of PCN cells. As traffic in
these mobile cellular networks increases, Handoffs will become an increasingly important issue. As cell
sizes shrink to accommodate an increasingly large demand of services, newer more efficient handoff
schemes need to be used. In this paper, the authors describe the use of novel and efficient data structure
which dynamically allocates guard channel for handoffs and introduces the concept of channel borrowing
strategy. The proposed scheme allocates the guard channels for handoff requests dynamically, based on the
traffic load for certain time period. A new originating call in the cell coverage area also uses these guard
channels if they are unused. Our basic idea is to allow Guard channels to be shared between new calls and
handoff calls. This approach maximizes the channel utilization. The simulation results prove that the
channel borrowing scheme improves the overall throughput.
Design and Implementation of Low-Cost Electric Vehicles (EVs) Supercharger: A...pijans
This article presents a probabilistic modeling method utilizing smart meter data and an innovative agentbased simulator for electric vehicles (EVs). The aim is to assess the effects of different cost-driven EV charging strategies on the power distribution network (PDN). We investigate the effects of a 40% EV adoption on three parts of Frederiksberg's low voltage distribution network (LVDN), a densely urbanized municipality in Denmark. Our findings indicate that cable and transformer overloading especially pose a challenge. However, the impact of EVs varies significantly between each LVDN area and charging scenario. Across scenarios and LVDNs, the share of cables facing congestion ranges between 5% and 60%. It is also revealed that time-of-use (ToU)-based and single-day cost-minimized charging could be beneficial for LVDNs with moderate EV adoption rates. In contrast, multiple-day optimization will likely lead to severe congestion, as such strategies concentrate demand on a single day that would otherwise be distributed over several days, thus raising concerns about how to prevent it. The broader implications of our research suggest that, despite initial worries primarily centered on congestion due to unregulated charging during peak hours, a transition to cost-based smart charging, propelled by an increasing awareness of time-dependent electricity prices, may lead to a significant rise in charging synchronization, bringing about undesirable consequences for the power distribution network (PDN).
Design and Implementation of Low-Cost Electric Vehicles (EVs) Supercharger: A...pijans
This article presents a probabilistic modeling method utilizing smart meter data and an innovative agentbased simulator for electric vehicles (EVs). The aim is to assess the effects of different cost-driven EV
charging strategies on the power distribution network (PDN). We investigate the effects of a 40% EV
adoption on three parts of Frederiksberg's low voltage distribution network (LVDN), a densely urbanized
municipality in Denmark. Our findings indicate that cable and transformer overloading especially pose a
challenge. However, the impact of EVs varies significantly between each LVDN area and charging
scenario. Across scenarios and LVDNs, the share of cables facing congestion ranges between 5% and
60%. It is also revealed that time-of-use (ToU)-based and single-day cost-minimized charging could be
beneficial for LVDNs with moderate EV adoption rates. In contrast, multiple-day optimization will likely
lead to severe congestion, as such strategies concentrate demand on a single day that would otherwise be
distributed over several days, thus raising concerns about how to prevent it. The broader implications of
our research suggest that, despite initial worries primarily centered on congestion due to unregulated
charging during peak hours, a transition to cost-based smart charging, propelled by an increasing
awareness of time-dependent electricity prices, may lead to a significant rise in charging synchronization,
bringing about undesirable consequences for the power distribution network (PDN).
Multilayer Perceptron Guided Key Generation through Mutation with Recursive R...pijans
In this paper, a multilayer perceptron guided key generation for encryption/decryption (MLPKG) has been
proposed through recursive replacement using mutated character code generation for wireless
communication of data/information. Multilayer perceptron transmitting systems at both ends accept an
identical input vector, generate an output bit and the network are trained based on the output bit which is
used to form a protected variable length secret-key. For each session, different hidden layer of multilayer
neural network is selected randomly and weights or hidden units of this selected hidden layer help to form
a secret session key. The plain text is encrypted using mutated character code table. Intermediate cipher
text is yet again encrypted through recursive replacement technique to from next intermediate encrypted
text which is again encrypted to form the final cipher text through chaining , cascaded xoring of multilayer
perceptron generated session key. If size of the final block of intermediate cipher text is less than the size of
the key then this block is kept unaltered. Receiver will use identical multilayer perceptron generated
session key for performing deciphering process for getting the recursive replacement encrypted cipher text
and then mutated character code table is used for decoding. Parametric tests have been done and results
are compared in terms of Chi-Square test, response time in transmission with some existing classical
techniques, which shows comparable results for the proposed technique.
Performance Analysis of Mobile Adhoc Network Routing Protocols Over Tcppijans
In order to reduce the communication cost and time we are looking forward for successful implementation
of an infrastructure less network like Mobile Ad Hoc Network in all arena of wireless mobile
communication. But still it is a challenge to decide a most appropriate routing protocol for MANET. In
MANET there is no fixed topology due to the mobility of nodes, interference, multipath propagation and
path loss. Since MANET does not use fixed infrastructure rather it always have to find suitable router and
routing path for each communication, existing established routing protocol is not suitable for MANET to
function properly. Different Routing protocols have been proposed to meet the challenges with MANETs.
This paper evaluates the performances of four MANET routing protocols which are DSDV, AODV, DSR
and TORA over TCP, a Transport Layer Protocol. The performance metrics which are considered in this
paper are packet delivery fractions, normalized routing overload, end to end delay and throughput. DSDV
is a proactive protocol and the others are reactive protocols.
Securing Mobile Ad hoc Networks: Key Management and Routingpijans
Secure communication between two nodes in a network depends on reliable key management systems that generate and distribute keys between communicating nodes and a secure routing protocol that establishes a route between them. But due to lack of central server and infrastructure in Mobile Ad hoc Networks (MANETs), this is major problem to manage the keys in the network. Dynamically changes in network’s topology causes weak trust relationship among the nodes in the network. . In MANETs a mobile node operates as not only end terminal but also as an intermediate router. Therefore, a multi-hop scenario occurs for communication in MANETs; where there may be one or more malicious nodes in between source and destination. A routing protocol is said to be secure that detects the detrimental effects of malicious node(s in the path from source to destination). In this paper, we proposed a key management scheme and a secure routing protocol that secures on demand routing protocol such as DSR and AODV. We assume that MANETs is divided into groups having a group leader in each group. Group leader has responsibility of key management in its group. Proposed key management scheme is a decentralized scheme that does not require any Trusted Third Party (TTP) for key management. In proposed key management system, both a new node and group leader authenticates each other mutually before joining the network. While proposed secure routing protocol allows both communicating parties as well as intermediate nodes to authenticate other nodes and maintains message integrity.
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...UiPathCommunity
💥 Speed, accuracy, and scaling – discover the superpowers of GenAI in action with UiPath Document Understanding and Communications Mining™:
See how to accelerate model training and optimize model performance with active learning
Learn about the latest enhancements to out-of-the-box document processing – with little to no training required
Get an exclusive demo of the new family of UiPath LLMs – GenAI models specialized for processing different types of documents and messages
This is a hands-on session specifically designed for automation developers and AI enthusiasts seeking to enhance their knowledge in leveraging the latest intelligent document processing capabilities offered by UiPath.
Speakers:
👨🏫 Andras Palfi, Senior Product Manager, UiPath
👩🏫 Lenka Dulovicova, Product Program Manager, UiPath
Connector Corner: Automate dynamic content and events by pushing a buttonDianaGray10
Here is something new! In our next Connector Corner webinar, we will demonstrate how you can use a single workflow to:
Create a campaign using Mailchimp with merge tags/fields
Send an interactive Slack channel message (using buttons)
Have the message received by managers and peers along with a test email for review
But there’s more:
In a second workflow supporting the same use case, you’ll see:
Your campaign sent to target colleagues for approval
If the “Approve” button is clicked, a Jira/Zendesk ticket is created for the marketing design team
But—if the “Reject” button is pushed, colleagues will be alerted via Slack message
Join us to learn more about this new, human-in-the-loop capability, brought to you by Integration Service connectors.
And...
Speakers:
Akshay Agnihotri, Product Manager
Charlie Greenberg, Host
UiPath Test Automation using UiPath Test Suite series, part 3DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 3. In this session, we will cover desktop automation along with UI automation.
Topics covered:
UI automation Introduction,
UI automation Sample
Desktop automation flow
Pradeep Chinnala, Senior Consultant Automation Developer @WonderBotz and UiPath MVP
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Tobias Schneck
As AI technology is pushing into IT I was wondering myself, as an “infrastructure container kubernetes guy”, how get this fancy AI technology get managed from an infrastructure operational view? Is it possible to apply our lovely cloud native principals as well? What benefit’s both technologies could bring to each other?
Let me take this questions and provide you a short journey through existing deployment models and use cases for AI software. On practical examples, we discuss what cloud/on-premise strategy we may need for applying it to our own infrastructure to get it to work from an enterprise perspective. I want to give an overview about infrastructure requirements and technologies, what could be beneficial or limiting your AI use cases in an enterprise environment. An interactive Demo will give you some insides, what approaches I got already working for real.
GraphRAG is All You need? LLM & Knowledge GraphGuy Korland
Guy Korland, CEO and Co-founder of FalkorDB, will review two articles on the integration of language models with knowledge graphs.
1. Unifying Large Language Models and Knowledge Graphs: A Roadmap.
https://arxiv.org/abs/2306.08302
2. Microsoft Research's GraphRAG paper and a review paper on various uses of knowledge graphs:
https://www.microsoft.com/en-us/research/blog/graphrag-unlocking-llm-discovery-on-narrative-private-data/
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Albert Hoitingh
In this session I delve into the encryption technology used in Microsoft 365 and Microsoft Purview. Including the concepts of Customer Key and Double Key Encryption.
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Ramesh Iyer
In today's fast-changing business world, Companies that adapt and embrace new ideas often need help to keep up with the competition. However, fostering a culture of innovation takes much work. It takes vision, leadership and willingness to take risks in the right proportion. Sachin Dev Duggal, co-founder of Builder.ai, has perfected the art of this balance, creating a company culture where creativity and growth are nurtured at each stage.
Elevating Tactical DDD Patterns Through Object CalisthenicsDorra BARTAGUIZ
After immersing yourself in the blue book and its red counterpart, attending DDD-focused conferences, and applying tactical patterns, you're left with a crucial question: How do I ensure my design is effective? Tactical patterns within Domain-Driven Design (DDD) serve as guiding principles for creating clear and manageable domain models. However, achieving success with these patterns requires additional guidance. Interestingly, we've observed that a set of constraints initially designed for training purposes remarkably aligns with effective pattern implementation, offering a more ‘mechanical’ approach. Let's explore together how Object Calisthenics can elevate the design of your tactical DDD patterns, offering concrete help for those venturing into DDD for the first time!
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualityInflectra
In this insightful webinar, Inflectra explores how artificial intelligence (AI) is transforming software development and testing. Discover how AI-powered tools are revolutionizing every stage of the software development lifecycle (SDLC), from design and prototyping to testing, deployment, and monitoring.
Learn about:
• The Future of Testing: How AI is shifting testing towards verification, analysis, and higher-level skills, while reducing repetitive tasks.
• Test Automation: How AI-powered test case generation, optimization, and self-healing tests are making testing more efficient and effective.
• Visual Testing: Explore the emerging capabilities of AI in visual testing and how it's set to revolutionize UI verification.
• Inflectra's AI Solutions: See demonstrations of Inflectra's cutting-edge AI tools like the ChatGPT plugin and Azure Open AI platform, designed to streamline your testing process.
Whether you're a developer, tester, or QA professional, this webinar will give you valuable insights into how AI is shaping the future of software delivery.
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
Some aspects of wireless sensor networks
1. International Journal on AdHoc Networking Systems (IJANS) Vol. 5, No. 1, January 2015
DOI : 10.5121/ijans.2015.5102 15
SOME ASPECTS OF WIRELESS SENSOR NETWORKS
Yogesh Kumar Fulara
Department of Electronics and Communication Engineering,
PEC University of Technology, Chandigarh, India
ABSTRACT
The development of the wireless sensor networks (WSNs) in various applications like Defense, Health,
Environment monitoring, Industry etc. always attract many researchers in this field. WSN is the network
which consists of collection of tiny devices called sensor nodes. Sensor node typically combines wireless
radio transmitter-receiver and limited energy, restricted computational processing capacity and
communication band width. These sensor node sense some physical phenomenon using different
transduces. The current improvement in sensor technology has made possible WSNs that have wide and
varied applications. While selecting the right sensor for application a number of characteristics are
important. This paper provides the basics of WSNs including the node characteristics. It also throws light
on the different routing protocols.
KEYWORDS
Communication capability, Routing Protocols,Sensor node, WSNs.
1. INTRODUCTION
WSNs were primarily introduced for the defense application and the objective here is to monitor
activity of enemy without any human interference. A low-flying airplane, ground vehicle or a
powerful laptop acted as a base station to collect information from all sensor nodes.
WSNs can be presume as a special case of Ad Hoc networks. WSN are generally assumed to be
energy restrained because of tiny size sensor node. Even though sensor networks are a subset of
Ad Hoc Network, the protocol designed for the Ad Hoc networks cannot be used as it due to the
following reason:
a. The number of sensor nodes in a sensor network is very large compared to the Ad Hoc
network. Thus sensor networks require distinct and more adaptable solutions.
b. As compared to Ad Hoc network, Wireless sensor nodes have restricted power supply. And
in impractical environment condition they cannot be recharged because the large number of
sensor nodes are deployed in different locations.
2. International Journal on AdHoc Networking Systems (IJANS) Vol. 5, No. 1, January 2015
16
Figure: 1 Wireless Sensor Networks (WSNs)
Thus wireless sensor networks can be defined as “A WSNs consists of spatially distributed
autonomous sensor to monitor physical or environmental conditions (i.e. temperature,
humidity, pollution, sound, pressure, etc.) and to cooperatively pass their data through the
network to user location”. The WSNs is built of few to several thousands of sensors of nodes,
where each and every node is connected to one or many sensor nodes. Source node is connected
to a central gateway, also called as base station. Central gateway provides a connection to world
through different communication channels (internet, Wi-Fi, WI-Max, wired LAN etc.). Figure: 1
shows data collection from different nodes which further processed and analyzed.
2. COMPONENTS OF WSNS
2.1. Sensor Node
Sensor nodes are generally consist of few sensors and processing unit/mote as shown in figure: 2.
a sensor is device which senses the information and pass it on to mote. Sensor are typically used
to measure the change in physical environmental parameters like temperature, pressure, humidity,
sound and change in the health parameter of person e.g. heartbeat and blood pressure.
Figure: 2 Block diagram sensor networks
3. International Journal on AdHoc Networking Systems (IJANS) Vol. 5, No. 1, January 2015
17
2.2. Base Station
Different wireless sensor network are connected with base station. It consists of a micro-
processor, antenna, radio board and USB interface board. For communication with wireless
sensor nodes, Base station is preprogramed with low-power mesh networking software. As all the
sensor nodes handover their data to base station so it is very important to deploy base station in
wireless sensor network. Further this data is analysed at base station for processing and decision
making. During deployment of base station in sensor network coverage of sensor nodes, Energy
conservation and reliability issues are taken care of. Generally base stations are assumed static in
nature but in some scenarios, they are assumed to be mobile to collect data from sensor nodes.
3.WSNS REQUIREMENTS AND CHARACTERISTICS
Tiny size, limited power supply, specific application and other various constraints make Wireless
sensor networks different from general wireless networks. The system performance
characteristics varies in WSNs even though the same basic principles of wireless communication
network like size, power, cost and their fundamental constraints in WSNs. Considering the basic
difference with the wireless system, major points which affect the performances and design of
WSNs are the following:
3.1 Deployment
The deployment strategy depends mainly on the type of sensor and the application.
3.2 Localization Scheme
Localization is the method to find the accurate physical position of sensor nodes.
3.3 Scalability
It is the ability of the network to grow without excessive overhead.
3.4 Reliability
The ability of network for authentic data transmission while continuous change of network
structure.
3.5 Responsiveness
It is the ability of the network to quickly accommodate itself to change in topology.
3.6 Mobility
It is the ability of the network to maintain mobile nodes and unstable data paths.
3.7 Quality of service implementation
In some applications (e.g. military application) data should be delivered within the certain period
of time from the moment it is sensed, otherwise the data will be useless.
4. International Journal on AdHoc Networking Systems (IJANS) Vol. 5, No. 1, January 2015
18
3.8 Security
Security is an important issue which implies that both authentication & encryption should be
feasible.
3.9 Characteristics of WSNs
Wireless sensor networks are strongly restricted by energy, capacity and computing power. So it
is essential to design effective network in order to increase the network characteristics. The
important characteristics of WSNs are as follows:
• Minimum Power consumption
• Ability to cope with node failures (resilience)
• Heterogeneity of nodes
• Mobility of nodes
• Communication failure
• Scalability to large scale of deployment
• Ability to withstand in unfavorable environmental conditions
• Cross-layer design
• Ease of use
4 ROUTING PROTOCOLS IN WIRELESS SENSOR NETWORKS
WSNs is the networks in which the sensor node are limited to various resources itself, so the main
objective is to design an efficient and energy sensible protocol in order to prolong the network
lifetime for specific application. Every sensor node are not defined with the unique ID, there are
lot of redundant data collected at destination nodes. So while designing the routing protocols for
wireless sensor networks we must keep in mind the following parameter like energy efficiency,
scalability, accuracy, fault-tolerance,latency and QOS. Generally most of the routing protocol are
classified as:
4.1 Data-centric Routing protocols
In this routing protocol, the node send queries to surrounding regions and waits for data from the
sensor located in the selected regions. Since data is being requested through queries, attribute
based naming is necessary to specify the properties of data. In this routing protocol data is
frequently transmitted from every senor node within the deployment region.
The following protocols are discussed in this category:
Flooding and Gossiping:
These are the most traditional network routing. They do not require to know the network topology
or any routing algorithms. In flooding mechanism, each and every sensor node receives a data and
then transmits it to all neighboring nodes. Gossiping is somewhat enhanced version of flooding in
which receiving node sends the packet to randomly selected neighbors, which select another
random neighbor to process or forward the packet to and so on [1].
5. International Journal on AdHoc Networking Systems (IJANS) Vol. 5, No. 1, January 2015
19
Directed Diffusion:
All the nodes in directed diffusion based network are application-aware. This enables diffusion to
achieve energy saving. In directed diffusion, base station and sensor create gradient of
information in their respected neighborhoods. The base station request data by broadcasting query
and interest is diffused through the network hop-by-hop, and is broadcast by each neighbors. As
the interest is propagated everywhere in the network, gradients are setup to draw path satisfying
shortest path from each node towards base station. This process continues until gradients are
setup from each node back to the base station [2].
SPIN:
Joanna Kulik et al. in [1] , [3] proposed a family of adaptive protocol, called SPIN (Sensor
Protocol for Information via Negotiation) that efficiently expand data among sensor nodes in an
energy-constrained WSNs and overcome the problem of implosion and overlap occurred in
classic flooding. Nodes running a SPIN communication protocol name their data using high-level
data descriptors, called metadata. SPIN nodes negotiate with each other before transmitting data.
Negotiation helps to ensure that the transmission of redundant data throughout the network is
eliminated and only useful information will be transferred.
Gradient-base routing:
This routing algorithm makes an improvement on direct Diffusion, in order to get the total
minimum hop other than the total shortest time and also aims to establish the cost field and
minimum cost [4].
4.2 Hierarchical-Based Routing
Hierarchical routing provides an approach for point to point routing with very small routing state.
Scalability is one of the essential design features of sensor network. Cluster or Hierarchical based
Routing methods are well known techniques with special advantage of efficient communication
and scalability. Hierarchical routing maintain the energy consumption of senor nodes and
performs data aggregation which help in decreasing the number of transmitted message to base
station. Some protocol are discussed here
LEACH:
LEACH stand for Low-Energy Adaptive Clustering Hierarchy and is one of the first hierarchical
protocols. It is self-organizing, adaptive clustering protocol in which sensor nodes will organize
themselves into local cluster and cluster members elect cluster head to avoid excessive energy
consumption and incorporate data aggregation which reduced the amount of message sent to the
base station, to increase the life time of the network [5].
TEEN and APTEEN:
TEEN stands for threshold sensitive Energy Efficient sensor network protocol. In TEEN, sensor
networks sense their environment continuously, thereby making it appropriate for real time
applications. TEEN was the first protocol developed for reactive networks and used in
temperature sensing application which reduces the energy consumption in network [6]. The
Adaptive Periodic TEEN (APTEEN) is an enhancement over TEEN protocol which is able to
combine the best features of proactive and reactive network while minimizing their limitations to
6. International Journal on AdHoc Networking Systems (IJANS) Vol. 5, No. 1, January 2015
20
create a hybrid network. In this scheme, only periodic data send by the sensor network, they also
acknowledge to sudden changes in attribute values [7].
4.3 Location Based Routing
Most of the routing protocol require location information for sensor nodes in wireless sensor
network to calculate the distance between two particular nodes on the basis of signal strength so
that the energy consumption can be estimate. If we don’t know the addressing scheme for sensor
network then we can also apply the location based routing for sensor data in energy efficient way.
Some of them are discussed here as:
MECN and SMECN:
Minimum energy communication network sets up and maintains a minimum energy network for
wireless networks by utilizing low power GPS. Although, the protocol assumes a mobile network,
it is best applicable to sensor network, which are not mobile [8]. The small minimum energy
Communication network (SMECN) is an improved version of MECN. It assumed that every node
can transmit to every other node, which is not possible every time [9].
GEAR (Geographic and Energy Aware Routing):
The objective of GEAR is to minimize the number of interest in direct diffusion routing and add
geographic data into interest packet by only assuming a certain region rather than sending interest
the whole network. GEAR help in balancing energy consumption in this way and increase the life
time [10].
Fermat Point Based Energy Efficient Geocast Routing:
Within a specified geographical area (called Geocast region) all nodes are delivered by Geocast
routing protocol. Fermat point based protocol are adapted for reducing the energy consumption of
a WSN by reducing the total transmission distance in a multi hop multi sink scenario [11].
5 APPLICATION OF WSNS
5.1 Security and surveillance
Security and detection are the important application of wireless sensor networks. Sensor node
with motion capabilities may be deployed at the borders to detect the intruder crossing the line of
control. Hence surveillance of regions, assets, perimeter, borders and cleared areas can be
efficiently done by deploying wireless sensor networks.
5.2 Environmental monitoring
The term Environmental Sensor Networks have evolved to cover many applications of WSNs to
earth science research including sensing volcanoes, oceans, glaciers, forests etc. Some examples
of major areas listed below.
Air quality/Air pollution monitoring
Wireless sensor network have been deployed in several cities to monitor the concentration of
dangerous or harmful gases for human. For such applications there are distinct architectures and
different kinds of data analysis and data mining.
7. International Journal on AdHoc Networking Systems (IJANS) Vol. 5, No. 1, January 2015
21
Water quality monitoring
The distribution of wireless sensors enables the creation of a more accurate map of the water
status, and allows the permanent deployment of monitoring stations in locations of difficult
access, without the need of manual data retrieval.
Natural disaster monitoring
It is used to prevent the consequences of natural disasters, like floods.
Forest fire detection
To detect the when fire has started in forest, a network of Sensor Nodes can be installed. With the
help of such type of wireless sensor networks we can take early action to protect forest.
Landslide detection
With the help of wireless sensor network we can forecast earthquake or landslide by detect the
slight movements and various parameter changes of soil that may occur before or during it
happen.
Habitat monitoring
Habitat monitoring is one of the essential parts in environmental monitoring. Habitat means a
place in which an animal or plant naturally grows or lives. Therefore, habitat monitoring is an
important to make sure their species autonomies and prevent any ecological disturbance for
animals and plants. Through WSNs, habitat monitoring can be enhance and protect the life of
animals and plants.
Climate monitoring
The climate change of the world nowadays have brought many effects such as the breaking of sea
ice, increasing in sea water level, heat wave, glacier melting, temperature warming and many
more. Thus using WSNs we can monitor and can try to minimize these harms.
5.3 Building, Bridge and Structural monitoring
Several recent projects have explored the use of sensor network in monitoring the health of
building, bridge and highway. Fiber optic based, Bluetooth, etc. wireless sensor network are used
to monitor stress, vibration, temperature and crack opening due to strain and corrosion of the
reinforcement in concrete bridge decks and structures. The use of sensor network for controlling
civil and mechanical system, has been explored in by having acquisition, monitoring and
recording of data, detecting failure, monitoring state and making control decisions.
5.4 Industrial monitoring system
WSNs have been used for machinery condition-based maintenance as they offer significant cost
saving and enable new functionality. The new aspects are considered as an enabler for future
application in industrial and related wireless sense and control application and partially replacing
or enhancing conventional wire-based network by WSN techniques.
8. International Journal on AdHoc Networking Systems (IJANS) Vol. 5, No. 1, January 2015
22
5.5 Agriculture
Wireless network frees the farmer from the maintenance of wiring in an unfavorable
environment. Under water system can be monitored using pressure transmitters to detect tank
level and pump can be controlled using wireless devices and water use can be measured and
wirelessly transmitted back to a center for billing.
5.6 Health Care Monitoring
WSNs can enhance the human health monitoring system. In this category include tele monitoring
of human of human health is possible. We can monitored physiological data and we can
monitoring of doctor and patients inside a hospital, drug administrator in hospitals and so on.
5.7 Greenhouse monitoring
Nowadays, we witness more and more electronic application in an average household. Therefore,
great commercial opportunities exist for home automation and smart home/office environment
cooling, heating and humidity control. These parameters can be monitored and controlled by
WSNs.
6 LITERATURE SURVEY
R. Yan [senior Member IEEE], H. sun and Y. Qian, “Energy-Aware Sensor Node Design with
its application in wireless sensor network”. In this paper, they present the design and
implementation of energy-aware sensor node, which can help in constructing energy-efficient
WSNs by calculating distance between nodes, periodic sleep/wake-up scheme for data
transmission. Furthermore they discussed energy saving can be achieved by different network
configuration and choosing the most energy efficient one [12].
HE Bin, ZHANG Hongtao, “An energy optimization method for wireless sensor Network”. In
this paper research was done, how the energy optimized in the WSNs. They used the Dijkstra
shortage path algorithm to calculate the optimal sequence of transmission distance from source
node and sink node. There q-switch algorithm was used to keep balance of network by choosing
one with maximum energy within each q type of nodes. [13].
Sukun Kim, Rodrigo Fonseca and David Culler, “Reliable transfer on wireless sensor
network.” In this paper, different types of routing are proposed. Link level transmission, erasable
code and route fix were used and calculated. Erasable code introduces static overhead. Route fix
reduces consecutive losses, increasing usefulness of erasable [14]
Stephan H. Chagas, Joao B. Martins. “An Approach to localization Scheme of wireless sensor
network based on artificial Neural Network and Genetic Algorithms.” This paper presented an
approach to localization scheme for WSNs using artificial neural network as the machine learning
algorithm and genetic algorithms to select the best ANN structure [15].
N. Javaid, T.N. Khan, A. Iqbal, A. Akhtar, M. Ishfaq, “Enhanced Developed Distributed
Energy-Efficient Clustering for Heterogeneous Wireless Sensor Networks.” In this paper, they
proposed a novel clustering based routing technique for heterogeneous WSNs. The technique was
based on changing dynamically and with more efficiency cluster Head election probability [16].
Hongyang Chen, Kaoru Swzaki, Ping Deng and Hing Cheung so, “An improved DV-Hop
localization Algorithm for Wireless Sensor Networks” In this paper they develop new method,
9. International Journal on AdHoc Networking Systems (IJANS) Vol. 5, No. 1, January 2015
23
Improved DV-Hop algorithm significantly. The simulation result showed that the suggested
algorithm can improve accurate location and coverage than DV-Hop algorithm. This approach is
effective and surely has good application foreground [17]
Quazi Mamum, Mohammed Kaosar, “What is the first step in designing an Application
Protocol for wireless sensor Networks.” This paper present a novel paradigm in designing
application protocol for WSNs. In this paper they determined how a well-designed logical
topology effect the performances of protocols developed in WSNs. By this, the logical structure
and the communication abstraction of the logical topology are used to design a number of
application protocols and their performance can evaluated [18].
V. M. Priyadarshini, N. Muthukumar and M. Natarajan, “Cellular Architecture Sensors for
Wireless Sensor Networks.” In this paper, they have worked on WSNs nodes and arrange nodes
to improve coverage area, reliability in getting information from the nodes.They also worked on
minimizing loss of information. This architecture arrangement provides recent solution to security
and military applications [19].
Md. Abdul Alim, Yucheng Wu, Wei Wang,” A Fuzzy Base Clustering Protocol for Energy-
Efficient Wireless Sensor Networks.” In this paper, a fuzzy logic based energy-aware dynamic
clustering technique is proposed, which increases the network life time in terms of last node dies.
Through this protocol they optimized the number of cluster formed in every round, which is not
possible in LEACH. They demonstrates that this approach is better than LEACH in terms of
energy saving as well as network life time [20].
7 CONCLUSION AND FUTURE DIRECTIONS
WSN is one of the fastest growing areas in the broad wireless Ad Hoc networking field. The
research in WSNs is thriving at a rapid pace and is being studied as the revolutionary concept of
current era. But, still there are many challenges that need to be explain such as, how to reduce the
power source and self-power generating technology to provide indefinite power
sources.Researcher’s need to work on to provide secured communication with limited resource
requirements. We have fractional answers and or roadmap to some above question, there is still
much to be done in wireless sensor networks.
REFERENCES
[1] Joanna Kulik, HariBalakrishnan and W. R. Heinzelman, (1999) “Adaptive protocols for Information
Dissemination in Wireless sensor networks”, proceeding on 5th annual ACM/IEEE International
conference on mobile Computing and networking, pp. 174-185.
[2] ChalermekIntanagonwiwat, Ramesh Govindan, Deborah Estrin, John Heidemann and Fabio Silva,
“Directed Diffusion for Wireless Sensor Networking”, IEEE/ACM Transactions on networking
(TON), vol. 11, pp. 2-16, February 2003.
[3] Joanna Kulik, HariBalakrishnan and W. R. Heinzelman, “Negotiation-Based Protocols for
Disseminating Information in Wireless Sensor Network,” Wireless Network, vol. 8, pp. 169-185,
2002.
[4] Li Xi Chen and Xiaohong Guan, (2004) “A New Gradient-Based Routing Protocol in Wireless Sensor
Networks”, proceedings of the First International Conference on Embedded Software and Systems,
pp. 318-325.
[5] Ankita joshi and Lakshmi Priya.m, “A survey of Hierarchical Routing Protocols in Wireless Sensor
Network”, MES Journal of technology and Management, pp.67-71
[6] Arati Manjeshwar and Dharma P. Agrawal, “TEEN: A Routing Protocol for Enhanced efficiency in
Wireless Sensor Networks”, Parallel and Distributed Processing Symposium, Proceedings, 15th
International, pp 2009-2015, April. 2009.
10. International Journal on AdHoc Networking Systems (IJANS) Vol. 5, No. 1, January 2015
24
[7] Arati Manjeshwar and Dharma P. Agrawal, “APTEEN: A Hybrid Protocol for Efficient Routing and
Comprehensive Information Retrieval in wireless Sensor Networks” Parallel and Distributed
Processing Symposium, proceeding International, IPDPS 2002, Abstracts and CD-ROM, pp. 195-202.
[8] V. Rodoplu, T.H. Ming, “Minimum Energy Mobile Wireless Networks”, IEEE journal of selected
areas in communications Aug 17, 1999, pp. 1333-1344.
[9] L. Li, J. Y Halpern, “Minimum Energy Mobile wireless Network Revisited”, Proceedings of IEEE
International Conference on Communications (ICC_01), Helsinki, Finland, June 2001.
[10] Yan Yu and Ramesh Govinda, “Geographical and Energy Aware Routing Recursive Data
Dissemination Protocol for Wireless Sensor Networks”, 2001
[11] Kaushik Ghosh, Partha Pratim Bhattacharya and P.K.Das, Effect of Multipath Fading and
PropogationEnvironment on the Performances of a Fermat Point Based Energy Efficient Geocast
Routing Protocol”, International Journal of Wireless & mobile Networks, Vol. 4, No. 1, Feb 2012
[12] Ruqiang Yan(Senior Member IEEE), Hanghang Sun and Yuning, “Energy-Aware Sensor Node
Design With Its Application in Wireless Sensor Networks” proceeding IEEE transactions on
Instrumentation and Measurement, Vol. 62, No. 5, pp. 1183-1191, 5 May 2013.
[13] HE Bin, ZHANG Hongtao, “An energy optimization method for wireless sensor Network” IEEE,
Published in Automatic Control and Artificial Intelligence (ACAI 2012), 3-5 March 2012, pp. 402-
406.
[14] Sukun Kim, Rodrigo Fonseca, and David Culler, “ Reliable Transfer in Wireless Sensor Networks”
The First IEEE International Conference on Sensor and Ad hoc Communications and Networks, Oct
2004.
[15] Stephan H. Chagas, Joao B. Martins. “An Approach to localization Scheme of wireless sensor
network based on artificial Neural Network and Genetic Algorithms” published in: New Circuits and
Systems Conference (NEWCAS), 2012 IEEE 10th Conference, 17-20 June 2012, pp. 137-140
[16] N. Javaid, T.N. Khan, A. Iqbal, A. Akhtar, M. Ishfaq, “Enhanced Developed Distributed Energy-
Efficient Clustering for Heterogeneous Wireless Sensor Networks.” Published by Elsevir B.V., on
International Workshop on Body Area Networks (BASNet-2013), Procedia Computer Science 19
(2013), pp.914-919.
[17] Hongyang Chen, Kaoru Sezaki, Ping Deng, Hing Cheung So, “An Improved DV-Hop Localization
Algorithm for Wireless Sensor Networks” IEEE, Vol.8, 2008.
[18] Quazi Mamum, Mohammed Kaosar, “What is the first step in designing an Application Protocol for
wireless sensor Networks.”, Published in: Sensors Application Symposium (SAS, 2014 IEEE, Date of
Conference: 18-20 Feb. 2014, pp. 333-338
[19] V.M.Priyadharshini, N.Muthukumar, M.Natarajan, “Cellular Architecture Sensors for Wireless
Sensor Networks” IJRRSE, Vol.01 No.02, pp 47-51 June 2011.
[20] Md. Abdul Alim, Yucheng Wu, Wei Wang,” A Fuzzy Base Clustering Protocol for Energy-Efficient
Wireless Sensor Networks.” Proceeding of the 2nd International Conference on Computer Science
and Electronics Engineering (ICCSEE 2013), pp. 2874-2878.
Authors
Yogesh Kumar Fulara
PEC University of Technology, Chandigarh.
.