This document summarizes a study on providing quality of service (QoS) in wireless sensor networks through the use of error correcting codes and selective encryption. It first provides background on wireless sensor networks and challenges in providing QoS. It then discusses forward error correction techniques like Reed-Solomon coding that can improve reliability while reducing energy consumption compared to retransmissions. It also discusses selective encryption algorithms that can encrypt parts of data to provide security with lower computation costs than fully encrypting all data. The document reviews open research issues in QoS for wireless sensor networks and improving the tradeoff between reliability, security and energy efficiency.
A Comparative Analysis for Hybrid Routing Protocol for Wireless Sensor NetworksIJERA Editor
Wireless Sensor Networks (WSNs) consist of smallnodes with sensing, computation and wireless
communicationscapabilities. These sensor networks interconnect a several othernodes when established in large
and this opens up severaltechnical challenges and immense application possibilities.These wireless sensor
networks communicate using multi-hopwireless communications, regular ad hoc routing techniquescannot be
directly applied to sensor networks domain due tothe limited processing power and the finite power available
toeach sensor nodes hence recent advances in wireless sensornetworks have developed many protocols
depending on theapplication and network architecture and are specificallydesigned for sensor networks where
energy awareness is anessential consideration. This paper presents routingprotocols for sensor networks and
compares the routingprotocols that are presently of increasing importance.
In this paper, we propose Hybrid Routing Protocol whichcombines the merits of proactive and reactive approach
andovercome their demerits.
Mobile Ad HOC networks (MANET’S) are networks in which all nodes are mobile and
communicate with each other via wireless connections. Nodes can join or leave the network at any
time. There is no fixed infrastructure. Research and industries are recently more interesting and
attracting to the VANET and MANET development domain. A vehicular ad hoc network (VANET)
is a subclass of MANET. In this paper, we propose Bee Routing Protocol for Ad Hoc Network, in
which a new quality of service multipath routing protocol adapted for the VANET. This algorithm is
a reactive source routing algorithm and consumes less energy as compared to DSDV, AODV, DSR
routing algorithms because a fewer control packets for routing are sent as compared to other
networks.
ALL ABOUT DATA AGGREGATION IN WIRELESS SENSOR NETWORKSEditor IJCTER
A wireless sensor network is a computer network that consists of small devices called
sensor nodes. These sensor nodes have the ability to sense different environmental conditions like
temperature, pressure, etc. All these sensor nodes send their data to a central node or base station.
This creates a large communication overhead the energy source for these nodes is usually a battery.
This gives rise to huge consumption of energy and resources. So a solution is required that
overcomes the above problems. Data aggregation is one of its solutions. This method consists of
aggregators that combine the data coming from the sensor nodes and then passes it to the base
station. With the help of data aggregation we reduce the energy consumption by eliminating
redundancy and we can enhance the life time of wireless network. The purpose of the proposed paper
is to explain data aggregation in wireless sensor network, how it works, different techniques of data
aggregation and the comparison among them.
A Comparative Analysis for Hybrid Routing Protocol for Wireless Sensor NetworksIJERA Editor
Wireless Sensor Networks (WSNs) consist of smallnodes with sensing, computation and wireless
communicationscapabilities. These sensor networks interconnect a several othernodes when established in large
and this opens up severaltechnical challenges and immense application possibilities.These wireless sensor
networks communicate using multi-hopwireless communications, regular ad hoc routing techniquescannot be
directly applied to sensor networks domain due tothe limited processing power and the finite power available
toeach sensor nodes hence recent advances in wireless sensornetworks have developed many protocols
depending on theapplication and network architecture and are specificallydesigned for sensor networks where
energy awareness is anessential consideration. This paper presents routingprotocols for sensor networks and
compares the routingprotocols that are presently of increasing importance.
In this paper, we propose Hybrid Routing Protocol whichcombines the merits of proactive and reactive approach
andovercome their demerits.
Mobile Ad HOC networks (MANET’S) are networks in which all nodes are mobile and
communicate with each other via wireless connections. Nodes can join or leave the network at any
time. There is no fixed infrastructure. Research and industries are recently more interesting and
attracting to the VANET and MANET development domain. A vehicular ad hoc network (VANET)
is a subclass of MANET. In this paper, we propose Bee Routing Protocol for Ad Hoc Network, in
which a new quality of service multipath routing protocol adapted for the VANET. This algorithm is
a reactive source routing algorithm and consumes less energy as compared to DSDV, AODV, DSR
routing algorithms because a fewer control packets for routing are sent as compared to other
networks.
ALL ABOUT DATA AGGREGATION IN WIRELESS SENSOR NETWORKSEditor IJCTER
A wireless sensor network is a computer network that consists of small devices called
sensor nodes. These sensor nodes have the ability to sense different environmental conditions like
temperature, pressure, etc. All these sensor nodes send their data to a central node or base station.
This creates a large communication overhead the energy source for these nodes is usually a battery.
This gives rise to huge consumption of energy and resources. So a solution is required that
overcomes the above problems. Data aggregation is one of its solutions. This method consists of
aggregators that combine the data coming from the sensor nodes and then passes it to the base
station. With the help of data aggregation we reduce the energy consumption by eliminating
redundancy and we can enhance the life time of wireless network. The purpose of the proposed paper
is to explain data aggregation in wireless sensor network, how it works, different techniques of data
aggregation and the comparison among them.
Survey of Wireless Sensor Network Applicationijsrd.com
Sensor networks offer a powerful combination of distributed sensing, computing and communication. They lend themselves to countless applications and, at the same time, offer numerous challenges due to their peculiarities, primarily the stringent energy constraints to which sensing nodes are typically subjected. The distinguishing traits of sensor networks have a direct impact on the hardware design of the nodes at least four levels: power source, processor, communication hardware, and sensors. Various hardware platforms have already been designed to test the many ideas spawned by the re-search community and to implement applications to virtually all fields of science and technology. We are convinced that CAS will be able to provide a substantial contribution to the development of this exciting field. A wireless sensor network (WSN) has important applications such as remote environmental monitoring and target tracking. This has been enabled by the availability, particularly in recent years, of sensors that are smaller, cheaper, and intelligent. These sensors are equipped with wireless interfaces with which they can communicate with one another to form a network. The design of a WSN depends significantly on the application, and it must consider factors such as the environment, the application's design objectives, cost, hardware, and system constraints. The goal of our survey is to present a comprehensive review of the recent literature since the publication of [I.F. Akyildiz, W. Su, Y. Sankarasubramaniam, E. Cayirci, A survey on sensor networks, IEEE Communications Magazine, 2002]. Following a top-down approach, we give an overview of several new applications and then review the literature on various aspects of WSNs. We classify the problems into three different categories: (1) Internal platform and underlying operating system, (2) Communication protocol stack, and (3) Network services, provisioning, and deployment. We review the major development in these three categories and outline new challenges.
Mtadf multi hop traffic aware data for warding for congestion control in wir...ijwmn
In the past few years there is a remarkable change in the field of wireless sensor networks. Congestion occurs when there is a heavy traffic in the network. The heavy traffic in the network leads to wastage of energy and packet loss. Traffic Aware Dynamic Routing algorithm mitigates congestion by using one hop neighbor routing, hence throughput of the network is low. This paper proposed a Multi hop based Data Forwarding Technique to mitigate congestion. Queue length field and depth potential field play a major role to divert the traffic in the network to the alternate paths. The high traffic load leads to data queue overflow in the sensor nodes, these results in loss of important information about important events. Multi hop Traffic-Aware Dynamic Routing algorithm addresses congestion using depth potential field and queue length potential field. The algorithm forwards data packets around the congestion areas and scatters the excessive along multiple paths. The nodes with less load are efficiently utilized in response to congestion. The main aspect of the algorithm is to construct two independent potential fields using depth and queue length. Queue length field solves the traffic-aware problem. Depth field creates a backbone to forward packets to the sink. Both fields are combined to yield a hybrid potential field to make dynamic decision for data forwarding. Simulations are conducted to evaluate the performance of our proposed algorithm and our proposed scheme performs better compared to previous work.
Enhanced Zigbee Tree Routing In Wireless Sensor Networkpaperpublications3
Abstract: Multipath routing is an efficient technique to route data in wireless sensor networks (WSNs) because it can provide reliability, security and load balance, which are particularly critical in the resource constrained system such as WSNs. The existing protocols are not fully satisfied. In this paper propose a new routing protocol that is enhanced zigbee tree routing (EZTR), to satisfy the QoS parameters. The new protocol provides less delay as compared with other protocol.
A cellular network is an asymmetric radio network which is made up of fixed transceivers or nodes, maintain the signal while the mobile transceiver which is using the network is in the vicinity of the node. An ad-hoc network is a local area network (LAN) that is built spontaneously as devices connect.
Instead of relying on a base station to coordinate the flow of messages to each node in the network, the individual network nodes forward packets to and from each other.
This paper focuses on various issues, architecture and routing protocols in cellular, adhoc and sensor networks. As issues proves helpful for forthcoming research, this paper work as a backbone to elaborate the various research areas.
PERFORMANCE COMPARISON OF QOS METRICS FOR A DISTRIBUTED PRICING SCHEMEijasuc
De-centralized nature of nodes, in ad-hoc networks, results in the users adapting their operations
independently. Such operations are mostly biased upon the figures and data available for the parameters
which are imperative for superior performance or, in other words, improved Quality of Performance (QoS)
of the nodes. In centrally controlled networks following cooperative game theory principles, collective
operations are performed by the nodes for better QoS of the network. Although nodes in decentralized
networks undertake individual operations, the final outcome of the whole network and thus the performance
of the nodes in the network are influenced by the operations of other nodes. Hence, a distributed resource
allocation approach in such a scenario can be modeled as a non-cooperative game. Asynchronous
Distributed Pricing (ADP) is one such virtual pricing algorithm in which a user’s payoff is determined by
the difference between how much a given performance metric is valued and how much is paid for it. User
service demands and priorities are modeled using numerically emulated QoS metrics termed as utility
functions. The network objective is to maximize the sum of all users’ payoff. However, for convergence of
the sum of all users’ payoff to a global maximum, the determination of the QoS metric’s utility function
with sufficient concavity is essential. Although supermodularity conditions have been previously defined
and determined to obtain suitable utility functions, we have numerically and analytically illustrated that the
convergence performance characteristics fluctuates with the choice of QoS metrics in the algorithm for
similar utility functions as well. We have assessed the optimality of utility functions under Signal-toInterference-plus-Noise ratio and Signal-to-Interference ratio based calculations. This paper also explores
into the difference in performance characteristics obtained by the addition of a significant value noise
variance in the ADP algorithm.
Routing Optimization with Load Balancing: an Energy Efficient ApproachEswar Publications
The area of Wireless Sensor Network (WSN) is covered with considerable range of problems, where majority of research attempts were carried out to enhance the network lifetime of WSN. But very few of the studies have proved successful. This manuscript discusses about a structure for optimizing routing and load balancing that uses standard radio and energy model to perform energy optimization by introducing a novel routing agent. The routing agent is built within aggregator node and base station to perform self motivated reconfiguration in case of energy depletion. Compared with standard LEACH algorithm, the proposed technique has better energy efficiency within optimal data aggregation duration.
Wireless Sensor Network Based Clustering Architecture for Cooperative Communi...ijtsrd
We propose clusters based cooperatives based verbal architecture coop on the cellular ad hoc wireless sensor network Mawsn with the environment fading Rayleigh. The main ability and contributions of this paper are as follows. First, the proposed cage uses a cluster as a underlying system to help stable transmission services. 2D, the proposed enclosure uses a cluster based verbal cooperative exchange to effectively guide the package delivery ratio with multi hop power saving transmission. 0.33, we do not forget reasonable methods mainly based on cellular ad hoc nodes with sensing features and constant sensor nodes in the sensor field along with conventional research for the introduction of constant network sensors. Fourth, we have theoretical analysis with blackouts opportunities for proposed cooperative transmissions. Overall performance evaluation is run through simulation and evaluation. Sweeti Kumari | Dr. Ranjan Kumar Singh "Wireless Sensor Network Based Clustering Architecture for Cooperative Communication" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-5 | Issue-4 , June 2021, URL: https://www.ijtsrd.compapers/ijtsrd43670.pdf Paper URL: https://www.ijtsrd.comengineering/electronics-and-communication-engineering/43670/wireless-sensor-network-based-clustering-architecture-for-cooperative-communication/sweeti-kumari
Wireless Sensor Network (WSN) is partially distributed autonomous sensors to monitor physical or environmental conditions such as temperature, pressure etc. and to cooperatively pass their data through the network to the central location. The technique referred to as multi-hop wireless communications is used by the WSN’s to communicate. Due to the limited processing power and the finite power accessible to each sensor nodes, the application of regular routing techniques is not recommended. Hence recent advances in wireless sensor networks have made the routing protocols more efficient. This paper surveys and compares the advanced routing protocols. The three main categories discussed here are flat based, hierarchical based and location based. The paper concludes with open research issues.
E FFICIENT E NERGY U TILIZATION P ATH A LGORITHM I N W IRELESS S ENSOR...IJCI JOURNAL
With limited amount of energy, nodes are powered by
batteries in wireless networks. Increasing the lif
e
span of the network and reducing the usage of energ
y are two severe problems in Wireless Sensor
Networks. A small number of energy utilization path
algorithms like minimum spanning tree reduces tota
l
energy consumption of a Wireless Sensor Network, ho
wever very heavy load of sending data packets on
many key nodes is used with the intention that the
nodes quickly consumes battery energy, by raising t
he
life span of the network reduced. Our proposal work
aimed on presenting an Energy Conserved Fast and
Secure Data Aggregation Scheme for WSN in time and
security logic occurrence data collection
application. To begin with, initially the goal is m
ade on energy preservation of sensed data gathering
from
event identified sensor nodes to destination. Inven
tion is finished on Energy Efficient Utilization Pa
th
Algorithm (EEUPA), to extend the lifespan by proces
sing the collecting series with path mediators
depending on gene characteristics sequencing of nod
e energy drain rate, energy consumption rate, and
message overhead together with extended network lif
e span. Additionally, a mathematical programming
technique is designed to improve the lifespan of th
e network. Simulation experiments carried out among
different relating conditions of wireless sensor ne
twork by different path algorithms to analyze the
efficiency and effectiveness of planned Efficient E
nergy Utilization Path Algorithm in wireless sensor
network (EEUPA)
EVALUATING PERFORMANCE OF WIRELESS SENSOR NETWORK IN REALISTIC SMART GRID ENV...ijwmn
Wireless Sensor Networks (WSNs) is a strong candidate for smart grid applications, such as advanced metering infrastructure, demand response management, dynamic pricing, load control, electricity fraud detection, fault diagnostics, substation monitoring and control as well as automation of various elements of the power grid. The realization of these applications directly depends on efficiency of communication facilities among power grid elements. However, the harsh power grid environmental conditions with obstacles, noise,interference, and fading pose great challenges to reliability of these facilities to monitor and control the power grid. The purpose of this paper is to evaluate performance of WSNs in different power grid environments such as 500 kv substations, main power control room, and underground network transformer vaults. The power grid environments are modeled using a log-normal shadowing path loss model channel with realistic parameters. The network is simulated and performance is evaluated using packet delivery ratio, communication delay, and energy consumption. The simulation results have revealed that different environments have considerable impacts on performance of WSNs which make it suitable for most applications that need low data rate with low reliability requirements.
An Efficient Approach for Data Gathering and Sharing with Inter Node Communi...cscpconf
In today’s era Wireless sensor networks (WSNs) have emerged as a solution for a wide range of
applications. Most of the traditional WSN architectures consist of static nodes which are densely deployed
over a sensing area. Recently, several WSN architectures based on mobile elements (MEs) have been
proposed. Most of them exploit mobility to address the problem of data collection in WSNs. The common
drawback among them is to data sharing between interconnected nodes. In this paper we propose an
Efficient Approach for Data Gathering and Sharing with Inter Node Communication in Mobile-Sink. Our
algorithm is divided into seven parts: Registration Phase, Authentication Phase, Request and Reply Phase,
Setup Phase, Setup Phase (NN), Data Gathering, and Forwarding to Sink. Our approach provides an
efficient way to handle data in between the intercommunication nodes. By the above approach we can
access the data from the node which is not in the list, by sharing the data from the node which is
approachable to the desired node. For accessing and sharing we need some security so that the data can
be shared between authenticated nodes. For this we use two way security approach one for the accessing
node and other for the sharing.
International Journal of Computational Engineering Research(IJCER) ijceronline
International Journal of Computational Engineering Research(IJCER) is an intentional online Journal in English monthly publishing journal. This Journal publish original research work that contributes significantly to further the scientific knowledge in engineering and Technology.
EFFICIENT HIERARCHICAL ROUTING PROTOCOL IN SENSOR NETWORKSijassn
Wireless sensor network (WSN) is the network of hundreds and thousands of micro-sensor nodes,
connecting each other by a wireless medium.WSN provide reliable sensing of the environment, detecting
and reporting events to the sink. One of the most important constraints of WSN is energy consumption.
Since the micro sensors are small in dimension, batteries are necessary to produce power to the network. In
this paper, we have proposed an algorithm for hierarchy based protocols of wireless sensor networks,
which consist of two groups of sensor nodes in a single cluster node. Each cluster consists of a three cluster
head. The event driven data sensing mechanism is used in this paper and this sensed data is transmitted to
the master section head. The gathered data is transmitted to the sink via mobile agent. Hence efficient way
of data transmission is possible with larger group of nodes. In this approach of using hierarchy based
protocols; the lifetime of the sensor network is increased. This paper proposes an innovative approach of
cluster head election. The results are compared with LEACH protocol and proved to be energy efficient.
A Review of Routing Protocols for Wireless Sensor NetworkIJMER
A wireless sensor network is a collection of nodes organized into a cooperative network. Each node consists of processing capability, may contain multiple types of memory, have a RF transceiver, have a power source, and accommodate various sensors and actuators. The nodes
communicate wirelessly and often self-organize after being deployed in an ad hoc fashion. Routing protocols for wireless sensor networks are responsible for maintaining the routes in the network and have to ensure reliable multi-hop communication .The performance of the network is
greatly influenced by the routing techniques. Routing is to find out the path to route the sensed data to the base station. In this paper the features of WSNs are introduced and routing protocols are reviewed for Wireless Sensor Network
Survey of Wireless Sensor Network Applicationijsrd.com
Sensor networks offer a powerful combination of distributed sensing, computing and communication. They lend themselves to countless applications and, at the same time, offer numerous challenges due to their peculiarities, primarily the stringent energy constraints to which sensing nodes are typically subjected. The distinguishing traits of sensor networks have a direct impact on the hardware design of the nodes at least four levels: power source, processor, communication hardware, and sensors. Various hardware platforms have already been designed to test the many ideas spawned by the re-search community and to implement applications to virtually all fields of science and technology. We are convinced that CAS will be able to provide a substantial contribution to the development of this exciting field. A wireless sensor network (WSN) has important applications such as remote environmental monitoring and target tracking. This has been enabled by the availability, particularly in recent years, of sensors that are smaller, cheaper, and intelligent. These sensors are equipped with wireless interfaces with which they can communicate with one another to form a network. The design of a WSN depends significantly on the application, and it must consider factors such as the environment, the application's design objectives, cost, hardware, and system constraints. The goal of our survey is to present a comprehensive review of the recent literature since the publication of [I.F. Akyildiz, W. Su, Y. Sankarasubramaniam, E. Cayirci, A survey on sensor networks, IEEE Communications Magazine, 2002]. Following a top-down approach, we give an overview of several new applications and then review the literature on various aspects of WSNs. We classify the problems into three different categories: (1) Internal platform and underlying operating system, (2) Communication protocol stack, and (3) Network services, provisioning, and deployment. We review the major development in these three categories and outline new challenges.
Mtadf multi hop traffic aware data for warding for congestion control in wir...ijwmn
In the past few years there is a remarkable change in the field of wireless sensor networks. Congestion occurs when there is a heavy traffic in the network. The heavy traffic in the network leads to wastage of energy and packet loss. Traffic Aware Dynamic Routing algorithm mitigates congestion by using one hop neighbor routing, hence throughput of the network is low. This paper proposed a Multi hop based Data Forwarding Technique to mitigate congestion. Queue length field and depth potential field play a major role to divert the traffic in the network to the alternate paths. The high traffic load leads to data queue overflow in the sensor nodes, these results in loss of important information about important events. Multi hop Traffic-Aware Dynamic Routing algorithm addresses congestion using depth potential field and queue length potential field. The algorithm forwards data packets around the congestion areas and scatters the excessive along multiple paths. The nodes with less load are efficiently utilized in response to congestion. The main aspect of the algorithm is to construct two independent potential fields using depth and queue length. Queue length field solves the traffic-aware problem. Depth field creates a backbone to forward packets to the sink. Both fields are combined to yield a hybrid potential field to make dynamic decision for data forwarding. Simulations are conducted to evaluate the performance of our proposed algorithm and our proposed scheme performs better compared to previous work.
Enhanced Zigbee Tree Routing In Wireless Sensor Networkpaperpublications3
Abstract: Multipath routing is an efficient technique to route data in wireless sensor networks (WSNs) because it can provide reliability, security and load balance, which are particularly critical in the resource constrained system such as WSNs. The existing protocols are not fully satisfied. In this paper propose a new routing protocol that is enhanced zigbee tree routing (EZTR), to satisfy the QoS parameters. The new protocol provides less delay as compared with other protocol.
A cellular network is an asymmetric radio network which is made up of fixed transceivers or nodes, maintain the signal while the mobile transceiver which is using the network is in the vicinity of the node. An ad-hoc network is a local area network (LAN) that is built spontaneously as devices connect.
Instead of relying on a base station to coordinate the flow of messages to each node in the network, the individual network nodes forward packets to and from each other.
This paper focuses on various issues, architecture and routing protocols in cellular, adhoc and sensor networks. As issues proves helpful for forthcoming research, this paper work as a backbone to elaborate the various research areas.
PERFORMANCE COMPARISON OF QOS METRICS FOR A DISTRIBUTED PRICING SCHEMEijasuc
De-centralized nature of nodes, in ad-hoc networks, results in the users adapting their operations
independently. Such operations are mostly biased upon the figures and data available for the parameters
which are imperative for superior performance or, in other words, improved Quality of Performance (QoS)
of the nodes. In centrally controlled networks following cooperative game theory principles, collective
operations are performed by the nodes for better QoS of the network. Although nodes in decentralized
networks undertake individual operations, the final outcome of the whole network and thus the performance
of the nodes in the network are influenced by the operations of other nodes. Hence, a distributed resource
allocation approach in such a scenario can be modeled as a non-cooperative game. Asynchronous
Distributed Pricing (ADP) is one such virtual pricing algorithm in which a user’s payoff is determined by
the difference between how much a given performance metric is valued and how much is paid for it. User
service demands and priorities are modeled using numerically emulated QoS metrics termed as utility
functions. The network objective is to maximize the sum of all users’ payoff. However, for convergence of
the sum of all users’ payoff to a global maximum, the determination of the QoS metric’s utility function
with sufficient concavity is essential. Although supermodularity conditions have been previously defined
and determined to obtain suitable utility functions, we have numerically and analytically illustrated that the
convergence performance characteristics fluctuates with the choice of QoS metrics in the algorithm for
similar utility functions as well. We have assessed the optimality of utility functions under Signal-toInterference-plus-Noise ratio and Signal-to-Interference ratio based calculations. This paper also explores
into the difference in performance characteristics obtained by the addition of a significant value noise
variance in the ADP algorithm.
Routing Optimization with Load Balancing: an Energy Efficient ApproachEswar Publications
The area of Wireless Sensor Network (WSN) is covered with considerable range of problems, where majority of research attempts were carried out to enhance the network lifetime of WSN. But very few of the studies have proved successful. This manuscript discusses about a structure for optimizing routing and load balancing that uses standard radio and energy model to perform energy optimization by introducing a novel routing agent. The routing agent is built within aggregator node and base station to perform self motivated reconfiguration in case of energy depletion. Compared with standard LEACH algorithm, the proposed technique has better energy efficiency within optimal data aggregation duration.
Wireless Sensor Network Based Clustering Architecture for Cooperative Communi...ijtsrd
We propose clusters based cooperatives based verbal architecture coop on the cellular ad hoc wireless sensor network Mawsn with the environment fading Rayleigh. The main ability and contributions of this paper are as follows. First, the proposed cage uses a cluster as a underlying system to help stable transmission services. 2D, the proposed enclosure uses a cluster based verbal cooperative exchange to effectively guide the package delivery ratio with multi hop power saving transmission. 0.33, we do not forget reasonable methods mainly based on cellular ad hoc nodes with sensing features and constant sensor nodes in the sensor field along with conventional research for the introduction of constant network sensors. Fourth, we have theoretical analysis with blackouts opportunities for proposed cooperative transmissions. Overall performance evaluation is run through simulation and evaluation. Sweeti Kumari | Dr. Ranjan Kumar Singh "Wireless Sensor Network Based Clustering Architecture for Cooperative Communication" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-5 | Issue-4 , June 2021, URL: https://www.ijtsrd.compapers/ijtsrd43670.pdf Paper URL: https://www.ijtsrd.comengineering/electronics-and-communication-engineering/43670/wireless-sensor-network-based-clustering-architecture-for-cooperative-communication/sweeti-kumari
Wireless Sensor Network (WSN) is partially distributed autonomous sensors to monitor physical or environmental conditions such as temperature, pressure etc. and to cooperatively pass their data through the network to the central location. The technique referred to as multi-hop wireless communications is used by the WSN’s to communicate. Due to the limited processing power and the finite power accessible to each sensor nodes, the application of regular routing techniques is not recommended. Hence recent advances in wireless sensor networks have made the routing protocols more efficient. This paper surveys and compares the advanced routing protocols. The three main categories discussed here are flat based, hierarchical based and location based. The paper concludes with open research issues.
E FFICIENT E NERGY U TILIZATION P ATH A LGORITHM I N W IRELESS S ENSOR...IJCI JOURNAL
With limited amount of energy, nodes are powered by
batteries in wireless networks. Increasing the lif
e
span of the network and reducing the usage of energ
y are two severe problems in Wireless Sensor
Networks. A small number of energy utilization path
algorithms like minimum spanning tree reduces tota
l
energy consumption of a Wireless Sensor Network, ho
wever very heavy load of sending data packets on
many key nodes is used with the intention that the
nodes quickly consumes battery energy, by raising t
he
life span of the network reduced. Our proposal work
aimed on presenting an Energy Conserved Fast and
Secure Data Aggregation Scheme for WSN in time and
security logic occurrence data collection
application. To begin with, initially the goal is m
ade on energy preservation of sensed data gathering
from
event identified sensor nodes to destination. Inven
tion is finished on Energy Efficient Utilization Pa
th
Algorithm (EEUPA), to extend the lifespan by proces
sing the collecting series with path mediators
depending on gene characteristics sequencing of nod
e energy drain rate, energy consumption rate, and
message overhead together with extended network lif
e span. Additionally, a mathematical programming
technique is designed to improve the lifespan of th
e network. Simulation experiments carried out among
different relating conditions of wireless sensor ne
twork by different path algorithms to analyze the
efficiency and effectiveness of planned Efficient E
nergy Utilization Path Algorithm in wireless sensor
network (EEUPA)
EVALUATING PERFORMANCE OF WIRELESS SENSOR NETWORK IN REALISTIC SMART GRID ENV...ijwmn
Wireless Sensor Networks (WSNs) is a strong candidate for smart grid applications, such as advanced metering infrastructure, demand response management, dynamic pricing, load control, electricity fraud detection, fault diagnostics, substation monitoring and control as well as automation of various elements of the power grid. The realization of these applications directly depends on efficiency of communication facilities among power grid elements. However, the harsh power grid environmental conditions with obstacles, noise,interference, and fading pose great challenges to reliability of these facilities to monitor and control the power grid. The purpose of this paper is to evaluate performance of WSNs in different power grid environments such as 500 kv substations, main power control room, and underground network transformer vaults. The power grid environments are modeled using a log-normal shadowing path loss model channel with realistic parameters. The network is simulated and performance is evaluated using packet delivery ratio, communication delay, and energy consumption. The simulation results have revealed that different environments have considerable impacts on performance of WSNs which make it suitable for most applications that need low data rate with low reliability requirements.
An Efficient Approach for Data Gathering and Sharing with Inter Node Communi...cscpconf
In today’s era Wireless sensor networks (WSNs) have emerged as a solution for a wide range of
applications. Most of the traditional WSN architectures consist of static nodes which are densely deployed
over a sensing area. Recently, several WSN architectures based on mobile elements (MEs) have been
proposed. Most of them exploit mobility to address the problem of data collection in WSNs. The common
drawback among them is to data sharing between interconnected nodes. In this paper we propose an
Efficient Approach for Data Gathering and Sharing with Inter Node Communication in Mobile-Sink. Our
algorithm is divided into seven parts: Registration Phase, Authentication Phase, Request and Reply Phase,
Setup Phase, Setup Phase (NN), Data Gathering, and Forwarding to Sink. Our approach provides an
efficient way to handle data in between the intercommunication nodes. By the above approach we can
access the data from the node which is not in the list, by sharing the data from the node which is
approachable to the desired node. For accessing and sharing we need some security so that the data can
be shared between authenticated nodes. For this we use two way security approach one for the accessing
node and other for the sharing.
International Journal of Computational Engineering Research(IJCER) ijceronline
International Journal of Computational Engineering Research(IJCER) is an intentional online Journal in English monthly publishing journal. This Journal publish original research work that contributes significantly to further the scientific knowledge in engineering and Technology.
EFFICIENT HIERARCHICAL ROUTING PROTOCOL IN SENSOR NETWORKSijassn
Wireless sensor network (WSN) is the network of hundreds and thousands of micro-sensor nodes,
connecting each other by a wireless medium.WSN provide reliable sensing of the environment, detecting
and reporting events to the sink. One of the most important constraints of WSN is energy consumption.
Since the micro sensors are small in dimension, batteries are necessary to produce power to the network. In
this paper, we have proposed an algorithm for hierarchy based protocols of wireless sensor networks,
which consist of two groups of sensor nodes in a single cluster node. Each cluster consists of a three cluster
head. The event driven data sensing mechanism is used in this paper and this sensed data is transmitted to
the master section head. The gathered data is transmitted to the sink via mobile agent. Hence efficient way
of data transmission is possible with larger group of nodes. In this approach of using hierarchy based
protocols; the lifetime of the sensor network is increased. This paper proposes an innovative approach of
cluster head election. The results are compared with LEACH protocol and proved to be energy efficient.
A Review of Routing Protocols for Wireless Sensor NetworkIJMER
A wireless sensor network is a collection of nodes organized into a cooperative network. Each node consists of processing capability, may contain multiple types of memory, have a RF transceiver, have a power source, and accommodate various sensors and actuators. The nodes
communicate wirelessly and often self-organize after being deployed in an ad hoc fashion. Routing protocols for wireless sensor networks are responsible for maintaining the routes in the network and have to ensure reliable multi-hop communication .The performance of the network is
greatly influenced by the routing techniques. Routing is to find out the path to route the sensed data to the base station. In this paper the features of WSNs are introduced and routing protocols are reviewed for Wireless Sensor Network
International Journal of Computational Engineering Research (IJCER) is dedicated to protecting personal information and will make every reasonable effort to handle collected information appropriately. All information collected, as well as related requests, will be handled as carefully and efficiently as possible in accordance with IJCER standards for integrity and objectivity.
Data Security and Data Dissemination of Distributed Data in Wireless Sensor N...IJERA Editor
A data dissemination protocol for wireless sensor networks has been engaged for modifying configuration fields and circulating management controls to the mote. Earlier, a data dissemination protocol faces the henceforth two consequences. First, they are works on sink based model; only the sink can circulate data item to other motes. Such model is not suitable for large user wireless sensor networks. Second, those protocols are not provide with any security and hence intruders will make problems to misuse the network. We provided the seDrip protocol. It allows the network mentors to authorize multiple network uses with various permissions to simultaneously and directly distributed data items to the mote. seDrip is implemented in an laboratory of network restricted resources mote to depict its large capability in practice.
Wireless Sensor Network Using Six Sigma Multi Hop RoutingIOSR Journals
Abstract: The most significant problem in the design of wireless sensor networks is to coordinate the sensors with dynamism into a wireless communication network and route sensed data to the base station. The energy efficiency is the most important key point of the network routing designing. This paper presents the efficient multi hop routing algorithm to extend the lifetime of sensor networks and focuses by employing six sigma principles to obtain the Quality of Service. To attain QoS support, we have to find either a route to assure the application requirements or offering network response to the application when the requirements cannot be met. Keywords: Wireless Sensor Networks, Multi hop routing, six sigma, QoS
Wireless Sensor Network Using Six Sigma Multi Hop RoutingIOSR Journals
The most significant problem in the design of wireless sensor networks is to coordinate the sensors
with dynamism into a wireless communication network and route sensed data to the base station. The energy
efficiency is the most important key point of the network routing designing. This paper presents the efficient
multi hop routing algorithm to extend the lifetime of sensor networks and focuses by employing six sigma
principles to obtain the Quality of Service. To attain QoS support, we have to find either a route to assure the
application requirements or offering network response to the application when the requirements cannot be met.
Intrusion Detection and Countermeasure in Virtual Network Systems Using NICE ...IJERA Editor
The cloud computing has increased in many organizations. It provides many benefits in terms of low cost and accessibility of data. Ensuring the security of cloud computing is a major factor in the cloud computing environment, as users often store sensitive information with cloud storage providers but these providers may be untrusted. In this project we propose anIntrusion Detection and Countermeasure in Virtual Network Systems mechanism called NICE to prevent vulnerable virtual machines from being compromised in the cloud. NICE detects and mitigates collaborative attacks in the cloud virtual networking environment. The system performance evaluation demonstrates the feasibility of NICE and shows that the proposed solution can significantly reduce the risk of the cloud system from being exploited and abused by internal and external attackers.
DESIGN OF ENERGY EFFICIENT ROUTING ALGORITHM FOR WIRELESS SENSOR NETWORK (WSN...cscpconf
Development of energy efficient Wireless Sensor Network (WSN) routing protocol is nowadays main area of interest amongst researchers. This research is an effort in designing energy efficient Wireless Sensor Network (WSN) routing protocol under certain parameters consideration. Research report discusses various existing WSN routing protocols and propose a new WSN energy efficient routing protocol. Results show a significant improvement in life cycle of the nodes and enhancement in energy efficiency of WSN. In this paper, an attempt has been made to design a wireless sensor network involving the extraction of Pascal Graph features. The standard task involves designing a suitable topology using Pascal Graph. As per the definition of interconnection network it is equivalent that a suitable graph can represent the different computer network topologies very efficiently. Different characteristics of Pascal Graph Topology has been discovered and used in network topology design. Since Pascal Graph gives
better result in terms of finding the dependable and reliable nodes in topology, it has been considered for network analysis. Moreover, we propose a methodology that involves the Pascal
Graph Topology for wireless sensor network which can analyse and represent the network and help in routing.
Quality of Service in Wireless Sensor Networks using Machine Learning.pdfPhD Assistance
Wireless Sensor Networks (WSNs) are self-organizing systems that allow for multi-hop communication throughout the network.
For #Enquiry:
Website URL: https://www.phdassistance.com/blog/quality-of-service-in-wireless-sensor-networks-using-machine-learning-recent-and-future-trends/
India: +91 91769 66446
Email: info@phdassistance.com
Similar to Study Of Coded Based Mechanism In WSN System (20)
Final project report on grocery store management system..pdfKamal Acharya
In today’s fast-changing business environment, it’s extremely important to be able to respond to client needs in the most effective and timely manner. If your customers wish to see your business online and have instant access to your products or services.
Online Grocery Store is an e-commerce website, which retails various grocery products. This project allows viewing various products available enables registered users to purchase desired products instantly using Paytm, UPI payment processor (Instant Pay) and also can place order by using Cash on Delivery (Pay Later) option. This project provides an easy access to Administrators and Managers to view orders placed using Pay Later and Instant Pay options.
In order to develop an e-commerce website, a number of Technologies must be studied and understood. These include multi-tiered architecture, server and client-side scripting techniques, implementation technologies, programming language (such as PHP, HTML, CSS, JavaScript) and MySQL relational databases. This is a project with the objective to develop a basic website where a consumer is provided with a shopping cart website and also to know about the technologies used to develop such a website.
This document will discuss each of the underlying technologies to create and implement an e- commerce website.
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdffxintegritypublishin
Advancements in technology unveil a myriad of electrical and electronic breakthroughs geared towards efficiently harnessing limited resources to meet human energy demands. The optimization of hybrid solar PV panels and pumped hydro energy supply systems plays a pivotal role in utilizing natural resources effectively. This initiative not only benefits humanity but also fosters environmental sustainability. The study investigated the design optimization of these hybrid systems, focusing on understanding solar radiation patterns, identifying geographical influences on solar radiation, formulating a mathematical model for system optimization, and determining the optimal configuration of PV panels and pumped hydro storage. Through a comparative analysis approach and eight weeks of data collection, the study addressed key research questions related to solar radiation patterns and optimal system design. The findings highlighted regions with heightened solar radiation levels, showcasing substantial potential for power generation and emphasizing the system's efficiency. Optimizing system design significantly boosted power generation, promoted renewable energy utilization, and enhanced energy storage capacity. The study underscored the benefits of optimizing hybrid solar PV panels and pumped hydro energy supply systems for sustainable energy usage. Optimizing the design of solar PV panels and pumped hydro energy supply systems as examined across diverse climatic conditions in a developing country, not only enhances power generation but also improves the integration of renewable energy sources and boosts energy storage capacities, particularly beneficial for less economically prosperous regions. Additionally, the study provides valuable insights for advancing energy research in economically viable areas. Recommendations included conducting site-specific assessments, utilizing advanced modeling tools, implementing regular maintenance protocols, and enhancing communication among system components.
Student information management system project report ii.pdfKamal Acharya
Our project explains about the student management. This project mainly explains the various actions related to student details. This project shows some ease in adding, editing and deleting the student details. It also provides a less time consuming process for viewing, adding, editing and deleting the marks of the students.
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptxR&R Consult
CFD analysis is incredibly effective at solving mysteries and improving the performance of complex systems!
Here's a great example: At a large natural gas-fired power plant, where they use waste heat to generate steam and energy, they were puzzled that their boiler wasn't producing as much steam as expected.
R&R and Tetra Engineering Group Inc. were asked to solve the issue with reduced steam production.
An inspection had shown that a significant amount of hot flue gas was bypassing the boiler tubes, where the heat was supposed to be transferred.
R&R Consult conducted a CFD analysis, which revealed that 6.3% of the flue gas was bypassing the boiler tubes without transferring heat. The analysis also showed that the flue gas was instead being directed along the sides of the boiler and between the modules that were supposed to capture the heat. This was the cause of the reduced performance.
Based on our results, Tetra Engineering installed covering plates to reduce the bypass flow. This improved the boiler's performance and increased electricity production.
It is always satisfying when we can help solve complex challenges like this. Do your systems also need a check-up or optimization? Give us a call!
Work done in cooperation with James Malloy and David Moelling from Tetra Engineering.
More examples of our work https://www.r-r-consult.dk/en/cases-en/
About
Indigenized remote control interface card suitable for MAFI system CCR equipment. Compatible for IDM8000 CCR. Backplane mounted serial and TCP/Ethernet communication module for CCR remote access. IDM 8000 CCR remote control on serial and TCP protocol.
• Remote control: Parallel or serial interface.
• Compatible with MAFI CCR system.
• Compatible with IDM8000 CCR.
• Compatible with Backplane mount serial communication.
• Compatible with commercial and Defence aviation CCR system.
• Remote control system for accessing CCR and allied system over serial or TCP.
• Indigenized local Support/presence in India.
• Easy in configuration using DIP switches.
Technical Specifications
Indigenized remote control interface card suitable for MAFI system CCR equipment. Compatible for IDM8000 CCR. Backplane mounted serial and TCP/Ethernet communication module for CCR remote access. IDM 8000 CCR remote control on serial and TCP protocol.
Key Features
Indigenized remote control interface card suitable for MAFI system CCR equipment. Compatible for IDM8000 CCR. Backplane mounted serial and TCP/Ethernet communication module for CCR remote access. IDM 8000 CCR remote control on serial and TCP protocol.
• Remote control: Parallel or serial interface
• Compatible with MAFI CCR system
• Copatiable with IDM8000 CCR
• Compatible with Backplane mount serial communication.
• Compatible with commercial and Defence aviation CCR system.
• Remote control system for accessing CCR and allied system over serial or TCP.
• Indigenized local Support/presence in India.
Application
• Remote control: Parallel or serial interface.
• Compatible with MAFI CCR system.
• Compatible with IDM8000 CCR.
• Compatible with Backplane mount serial communication.
• Compatible with commercial and Defence aviation CCR system.
• Remote control system for accessing CCR and allied system over serial or TCP.
• Indigenized local Support/presence in India.
• Easy in configuration using DIP switches.
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...Amil Baba Dawood bangali
Contact with Dawood Bhai Just call on +92322-6382012 and we'll help you. We'll solve all your problems within 12 to 24 hours and with 101% guarantee and with astrology systematic. If you want to take any personal or professional advice then also you can call us on +92322-6382012 , ONLINE LOVE PROBLEM & Other all types of Daily Life Problem's.Then CALL or WHATSAPP us on +92322-6382012 and Get all these problems solutions here by Amil Baba DAWOOD BANGALI
#vashikaranspecialist #astrologer #palmistry #amliyaat #taweez #manpasandshadi #horoscope #spiritual #lovelife #lovespell #marriagespell#aamilbabainpakistan #amilbabainkarachi #powerfullblackmagicspell #kalajadumantarspecialist #realamilbaba #AmilbabainPakistan #astrologerincanada #astrologerindubai #lovespellsmaster #kalajaduspecialist #lovespellsthatwork #aamilbabainlahore#blackmagicformarriage #aamilbaba #kalajadu #kalailam #taweez #wazifaexpert #jadumantar #vashikaranspecialist #astrologer #palmistry #amliyaat #taweez #manpasandshadi #horoscope #spiritual #lovelife #lovespell #marriagespell#aamilbabainpakistan #amilbabainkarachi #powerfullblackmagicspell #kalajadumantarspecialist #realamilbaba #AmilbabainPakistan #astrologerincanada #astrologerindubai #lovespellsmaster #kalajaduspecialist #lovespellsthatwork #aamilbabainlahore #blackmagicforlove #blackmagicformarriage #aamilbaba #kalajadu #kalailam #taweez #wazifaexpert #jadumantar #vashikaranspecialist #astrologer #palmistry #amliyaat #taweez #manpasandshadi #horoscope #spiritual #lovelife #lovespell #marriagespell#aamilbabainpakistan #amilbabainkarachi #powerfullblackmagicspell #kalajadumantarspecialist #realamilbaba #AmilbabainPakistan #astrologerincanada #astrologerindubai #lovespellsmaster #kalajaduspecialist #lovespellsthatwork #aamilbabainlahore #Amilbabainuk #amilbabainspain #amilbabaindubai #Amilbabainnorway #amilbabainkrachi #amilbabainlahore #amilbabaingujranwalan #amilbabainislamabad
Hierarchical Digital Twin of a Naval Power SystemKerry Sado
A hierarchical digital twin of a Naval DC power system has been developed and experimentally verified. Similar to other state-of-the-art digital twins, this technology creates a digital replica of the physical system executed in real-time or faster, which can modify hardware controls. However, its advantage stems from distributing computational efforts by utilizing a hierarchical structure composed of lower-level digital twin blocks and a higher-level system digital twin. Each digital twin block is associated with a physical subsystem of the hardware and communicates with a singular system digital twin, which creates a system-level response. By extracting information from each level of the hierarchy, power system controls of the hardware were reconfigured autonomously. This hierarchical digital twin development offers several advantages over other digital twins, particularly in the field of naval power systems. The hierarchical structure allows for greater computational efficiency and scalability while the ability to autonomously reconfigure hardware controls offers increased flexibility and responsiveness. The hierarchical decomposition and models utilized were well aligned with the physical twin, as indicated by the maximum deviations between the developed digital twin hierarchy and the hardware.
Water scarcity is the lack of fresh water resources to meet the standard water demand. There are two type of water scarcity. One is physical. The other is economic water scarcity.
1. Kaksha S.Thakare .Int. Journal of Engineering Research and Applications www.ijera.com
ISSN: 2248-9622, Vol. 6, Issue 4, (Part - 3) April 2016, pp.38-43
www.ijera.com 38|P a g e
Study Of Coded Based Mechanism In WSN System
Kaksha S.Thakare*, R.D.Patane**
*(Department Of Electronics and Telecoumication, Mumbai University, India)
** (Department Of Electronics And Telecoumication, Mumbai University,India)
ABSTRACT
Wireless Sensor networks (WSN) is an emerging technology and have great potential to be employed in critical
situations like battlefields and commercial applications such as building, traffic surveillance, habitat monitoring
and smart homes and many more scenarios.One of the major challenges wireless sensor networks face today is
QoS. In order to ensure data security and quality of service required by an application in an energy efficient
way, we propose a mechanism for QoS routing with coding and selective encryption scheme for WSNs.Our
approach provides reliable and secure data transmission and can adapt to the resource constraints of WSNs.
Keywords - Error Correcting code,Quality of Service,Selective encryption algorithm,Wireless Sensor Network
,etc
I. INTRODUCTION
A common approach to satisfy some QoS
requirements in Wireless Sensor Networks (WSNs)
is to use forward error correction (FEC) technique as
a replication mechanism in multipath routing to
increase data transmission reliability, decrease
energy consumption and increase network lifetime
while avoiding the costly or impossible data
retransmission due to the severe resource constraints
of sensor nodes.
Routing is an essential problem in any type
of networks.Compared with existing routing
protocols, secure routing for WSNs is a very
challenging task due to the severe resource
constraints of sensor nodes; the broadcast nature of
the wireless links makes the WSNs vulnerable to
link attacks that include passive eavesdropping,
active impersonation, message replay and message
distortion, dynamically changing in the size and
density of the network, as well as the high risk of
physical attacks to sensors.
Wireless Sensor Networks(WSNs) use tiny,
inexpensive sensor nodes with several distinguishing
characteristics: they have very low processing power
and radio ranges, permit very low energy
consumption and perform limited and specific
monitoring and sensing functions. Several such
wireless sensors in a region self-organize and form a
WSN. Information based on sensed data can be used
in agriculture and livestock, driving or even in
providing security at home or in public places. A key
requirement from both the technological and
commercial point of view is to provide adequate
security capabilities. Fulfilling privacy and security
requirements in an appropriate architecture for
WSNs offering pervasive services is essential for
user acceptance. Five key features need to be
considered when developing WSN solutions:
Scalability, security, reliability, self-healing and
robustness. The security in wireless sensor networks
(WSNs) is a critical issue due to the inherent
limitations of computational capacity and power
usage.
Fig 1 :- Wireless Sensor Network Model and
Architecture
The following illustrate the key
components of sensor networks:
Sensor Field: A sensor field is vicinity where
thenodes can be positioned.
Sensor Nodes: Sensors nodes are the heart of the
network. It is the responsibility of the sensor nodes
to gather information and transmit to the sink or base
station; it is engineered for the network.
Sink: Sink receives data from various nodes, and
then process and stored all the data collected from
the nodes. Message correspondences between nodes
are diminished because of the sink
therebydecreasing energy conditions of the entire
network.
Base station: The base station also called the
centralized control room for data extraction, spread
information back and forth to the networks, data
processing and storage center with user access
controls.
RESEARCH ARTICLE OPEN ACCESS
2. Kaksha S.Thakare .Int. Journal of Engineering Research and Applications www.ijera.com
ISSN: 2248-9622, Vol. 6, Issue 4, (Part - 3) April 2016, pp.38-43
www.ijera.com 39|P a g e
Data is streamed to these workstations
either via the internet, wireless channels, satellite
etc.Sensor networks deployed in a specific
geographical area does construct a wireless multi-
hop network, and the sensor nodes apply wireless
medium for transmission namely infrared, radio,
Bluetooth during communication.
We will look into the challenges of QoS
provisioning in WSNs and some of the existing
developments in QoS mechanisms for WSNs.
1. Difficulties of QoS provisioning in WSNs
The successful deployment of QoS in
WSNs is a challenging task because it depends on
both the inherent properties of the network, as well
as the physical hardware constraints of the sensor
nodes.
2. QoS Performance Metrics in WSNs
Unlike the Internet and MANETs which
can be used for a multitude of applications ranging
from file transfer to multimedia applications, each
WSN is usually deployed for a specific application
such as environmental monitoring or target tracking.
In addition, each of these networks has their own
unique characteristics and constraints; consequently,
the QoS performance metrics in WSNs may differ
significantly from those that are used in the Internet
and MANETs.
3. Mechanisms to Achieve QoS in WSNs
In this section, we describe some existing
mechanisms that have been proposed in the
literature, which allow WSNs to achieve QoS.
3.1 Topology Management:- To reduce the amount
of energy that is consumed by a sensor node in the
network, the nodes can be put to sleep mode when
they are not required to sense or transmit data to
their neighbouring nodes.Topology management
helps to increase energy efficiency (and thus
network lifetime) at the expense of higher latency,
because nodes that are required for the data
forwarding process may be in sleep mode during the
transmission.
3.2 Localization:-Localization provides an
alternative mechanism of finding the physical
locations of the sensor nodes in the network instead
of making use of GPS, which is costly and infeasible
indoors. localization increases spatial accuracy, at
the cost of higher overheads (and transmissions)
which will reduce energy efficiency.
3.3 Controlled Mobility:-To incorporate QoS in the
sensor network, controlled mobility using mobile
nodes or Unmanned Autonomous Vehicles (UAVs)
can be used to deploy sensor nodes more efficiently
to enhance connectivity and/or coverage.
3.4 Data Aggregation and/or Fusion:- This helps
to reduce redundancy caused by spatial correlation
of the sensed data and minimize the number of
transmissions required to forward the data back to
the sink.
3.5 Network Topology:- This helps to improve the
load distribution of the network and increases the
network lifetime, at the expense of the physical
deployment of more sinks.
3.6 Cross-Layer Designs:- Cross layered designs
such as that proposed by Chen et al can help to
improve network performance by sharing
information across the different layers, at the cost of
eliminating the interdependency between adjacent
layers.
4. Open research issues in QoS support in WSNs.
4.1 Services: What kind of non-end-to-end services
can WSNs provide?Are traditional best effort,
guaranteed, and differentiated services still feasible
in this new paradigm?
4.2 QoS support based on collective QoS
parameters: It is very interesting to explore the
support mechanisms for three classes of data
delivery models using collective QoS parameters.
Further, how do the mechanisms differ from those in
traditional networks?
4.3 Traditional end-to-end energy-aware QoS
support: Al- though these are not of main concern
in WSNs, they may be applied in some scenarios.
Also, it is very interesting to explore the limit on
QoS assurance in an extremely resource- constrained
network.
4.4 Trade-offs: Data redundancy in WSNs can be
intrinsically exploited to improve information
reliability. However, it spends too much energy to
transmit these redundant data. If we introduce data
fusion, it can reduce data redundancy in order to
save energy, but it also introduces much delay into
the network. What is an optimum trade-off among
them? This optimum trade-off may be achieved
analytically or by network simulations.
4.5 Adaptive QoS assurance algorithms: It is
desirable to maintain QoS throughout the network
life instead of having a gradual decay of quality as
time progresses. This prevents gaps in data sets
received by the sink. These gaps, that directly affect
QoS, are caused by network dynamics. As a result,
3. Kaksha S.Thakare .Int. Journal of Engineering Research and Applications www.ijera.com
ISSN: 2248-9622, Vol. 6, Issue 4, (Part - 3) April 2016, pp.38-43
www.ijera.com 40|P a g e
some adaptive QoS algorithms may be required to
defend against network dynamics.
4.6 Service differentiation: What is the criteria of
differentia- tion? Should it be based on traffic types,
data delivery models, sensor types, application
types, or the content of packets? Considering the
memory and processing capability limitations, we
cannot afford to maintain too many flow states in a
node. Thus, it is desirable to control network
resource allocation to a few differentiated traffic
classes such that a desired maximum resource
utilization is obtained.
4.7 QoS support via a middleware layer: If QoS
requirements from an application are not feasible in
the network, the middleware may negotiate a new
quality of service with both the application and the
network. Such a middleware layer, which may be
used to translate and control QoS between the
applications and the networks, is of great interest.
4.8 QoS control mechanisms: Sensors may send
excessive data sometimes and thereby waste
precious energy while they may also send
inadequate data at other times so that the quality of
the application cannot be met. Some novel
centralized or distributed QoS control algorithms are
desired.
4.9 The integration of QoS support: The
mechanisms of QoS support in WSNs may be very
different from that in traditional networks. However,
since the requests to WSNs can be from a
User/application through a traditional network such
as the Internet, further research is necessary for
handling the differences between them and maintain
the QoS services seamless to the application running
over both networks.
Quality of Service (QoS) support in WSNs
is still remained as an open field of research from
various perspectives. QoS is interpreted by different
technical communities by different ways. In general,
QoS refers to quality as perceived by the user or
application. In networking community, QoS is
interpreted as a measure of service quality that the
network offers to the end user or application.
Traditional encryption techniques are too complex
and also it introduces some severe delay in sensor
nodes. The two basic methods to recover erroneous
packets in any network are Automatic Repeat
Request (ARQ), and Forward Error Correction
(FEC). The life time of any wireless sensor network
depends directly on the efficient use of its power
resources. Power is primarily consumed during
wireless transmission and reception. As energy
conservation is a major issue of concern in WSN,
repeat transmission is not an option and FEC would
be preferred over ARQ.
II. FORWARD ERROR
CORRECTION
The main design concern for any
applications of wireless sensor networks is the
limited energy supply,limited computation capability
and communication range of sensor nodes as
compared with other computing and communicating
devices The nodes play a dual role as data sender
and data router in a multi-hopWSN. Aggressive
energy management techniques are used to fulfill the
main design goals of WSNs which is to carry out
data communication while trying to prolong the
lifetime of the network and prevent connectivity
degradation. One way to conserve the energy in
WSNs is to avoid retransmission due to error as far
as possible and instead use efficient error control
scheme for error correction.
Forward error correction (FEC) also called
channel coding is a system of error control for data
transmission, whereby the sender adds
systematically generated redundant data to its
messages, also known as an error-correcting
code.FEC gives the receiver an ability to correct
errors without needing a reverse channel to request
retransmission of data, but this advantage is at the
cost of a fixed higher forward channel
bandwidth.FEC is therefore applied in situations
where retransmissions are relatively costly, or
impossible such as when broadcasting to multiple
receivers.
In particular, FEC information is usually
added to mass storage devices to enable recovery of
corrupted data. The maximum fractions of errors or
of missing bits that can be corrected are determined
by the design of the FEC code, so different forward
error correcting codes are suitable for different
conditions.
In FEC source node encodes data using
some error correcting code which lets the receiver
node to correct errors in data packet if present, thus
making retransmission outdated.Error control coding
also provides coding gain which lowers required
transmitting power for specific bit error rate (BER)
or frame error rate (FER).
However this happens at cost of extra
energy consumption in encoding, transmitting
redundant bits and decoding. In most cases encoding
energy is considered to be negligible while decoding
process consumes significant amount of
energy.Complex decoders provide better
performance in term of BER but on the other hand
consume more energy[6].
4. Kaksha S.Thakare .Int. Journal of Engineering Research and Applications www.ijera.com
ISSN: 2248-9622, Vol. 6, Issue 4, (Part - 3) April 2016, pp.38-43
www.ijera.com 41|P a g e
Fig 2:-BER analysis for different error correcting
codes
WSNs are energy constraint and also
require reliable data communication, so the data
reliability must be provided at low energy
cost.Hence it is very challenging to choose an
optimum error correcting code for wireless sensor
network where both, the performance and energy
consumption are taken into account.
Someresearchers have studied hybrid
automatic repeat request (HARQ) schemes which
exploit advantages of both error correcting schemes
by combining ARQ and FEC. HARQ is good for
some scenarios in wireless sensor networks but it is
limited to only specific applications and consumes a
significant amount of energy.
Error correcting codes insert parity bits into
message sequence in a proper way depending on
type of code being used. The parity bits allow the
receiver to correct errors in message sequence if
introduced due to noise or interference during
transmission. The system with error control coding
provides better BER performance as compared to
un-coded system for same SNR[5].
Fig 3:-BER analysis for different Reed Solomon
codes
The one of the most simplest and widely
used FEC codes is Reed-Solomon (RS)coding.Reed-
Solomon coding- Reed-Solomon codes are block-
based error correcting codes. The Reed-Solomon
encoder takes a block of digital data and adds extra
"redundant" bits. Errors occur during transmission or
storage for a number of reasons (for example noise
or interference, scratches on a CD, etc).The Reed-
Solomon decoder processes each block and attempts
to correct errors and recover the original data. The
number and type of errors that can be corrected
depends on the characteristics of the Reed-Solomon
code.
III. SELECTIVE ENCRYPTION
ALGORITHM
Encryption is the process of encoding
plaintext into cipher text and decryption is the
reverse process. Through the data encryption and
decryption, the protection of data confidentiality and
integrity are achieved. However, based on the
features of wireless devices, a wireless ad hoc
network has special security and efficiency
requirements for conventional cryptographic
algorithms.
Selective encryption algorithms are
primarily applied in the realms of energy-aware
environments or large scale data transmission such
as, multimedia communications, mobile ad hoc
networks (MANETs), wireless sensor networks
(WSNs), etc. For multimedia communications, it
often requires real-time data transmission, so
tremendous audio and video data need to be
transferred securely. Selective Encryption algorithm
reduce computation time and power without
compromising the security of the transmission.
There are three methods for Selective
Encryption Algorithms[5]:
1. Secure Key Distribution(Full Encryption)
The figure.1 illustrates the procedure of
secret key distribution between a pair of nodes. The
message’s sender composes a communicating
request message req which contains not only its
identifier IDs, but also its public key PKs, for the
purpose of their later mutual authentication. Once
the receiver gets such a communication request, a
secret key (symmetric key) SKs will be generated by
the receiver and encrypted using the public key PKs
of the requester, which is included in the
communicating request message. Later, the receiver
composes a communicating reply rep message and
replies it to the communicating sender, in order to
indicate that their communication has been
successfully established. After the sender obtains the
response from the receiver, it will use its
corresponding private key PRs to decrypt the secret
key SKs issued from the receiver.
5. Kaksha S.Thakare .Int. Journal of Engineering Research and Applications www.ijera.com
ISSN: 2248-9622, Vol. 6, Issue 4, (Part - 3) April 2016, pp.38-43
www.ijera.com 42|P a g e
2. A Probabilistic Selective Encryption Algorithm
Here, a probabilistically selective
encryption algorithm, which uses the advantages of
the probabilistic methodology, aiming to obtain
sufficient uncertainty.
During the process of sending messages,
the sender will randomly generate a value to indicate
the encryption percentage, which represents how
many messages will be encrypted among the
transmitted messages.Then, the sender uses a
probabilistic function to choose the already
deterministic amount of messages to encrypt them.
The probabilistic selective encryption algorithm
integrates both the probabilistic method and
stochastic strategy, in order to increase the
uncertainty in the process of message selection.
3. A Toss-A-Coin Selective Encryption Algorithm
In order to provide sufficient security to
data encryption, we choose a relatively high
proportion as encryption ratio. Since the toss-a coin
algorithm is a basic approach, little uncertainty is
involved. For all transmitted messages, we divide
them to two groups: the odd number messages and
the even number messages.
When the sender needs to decide which
group should be encrypted, it makes use of a toss-a-
coin method to determine whether the even number
messages or odd number messages are encrypted.
IV. MATH
The math include steps[8]:-
1. Divide the data message into packets such as each
packet is of size
K= bM (1)
2. Encode the data packet by using FEC technique
which includes the Reed-Solomon coding in
such a way that each codeword having the set of
total M+K fragments. Where M is the number
of fragments and K is the number of encoded
fragments.
3. Depending on the security level required, the
number of fragments to be encrypted ,
Nenc= K+E (2)
Where Nenc is the total number of
fragments encrypted and E is determined according
to the required security level and
1 ≤ E ≤ M. (3)
4. Route all the fragments on the np disjoint paths to
the node and in order to enhance the security the
encrypted fragments from the same codeword
are transmitted on different paths.
5. At the receiving node, the encrypted fragments are
first decrypted and then all the fragments are
encoded to reconstruct the original data packet.
V. SIMULATION
Simulation by using MATLAB software
will give exact brief idea about this routing
mechanism. Here consider the MATLAB simulation
results. Consider there are total number of 50 nodes
which establishes during communication within
100msecs.Suppose the data is transmitted from node
9 to node 25. To prevent the data loss or to recover
the lost data during communication due to some
errors, REED- SOLOMON coding is being used.
Simulation results shows that as compared
to the previous routing technique, this routing
technique gives the minimum end to end delay also
it maximizes the throughput such as packet delivery
ratio also increases[8].
Fig 5:- End To End delay comparison
Fig 6:- Throughput comparison
VI. CONCLUSION
Wireless Sensor Network technology has
an incredible potential to enhance quality of life in
all aspects and is likely to be widely used in the
medium-term future.To realize the full potential of
this technology, there is a lot of additional work to
be done in further times. Research has to focus on
security aspects and higher reliability for these
systems and guidelines for aspects of privacy
protection have to be discussed.With these
challenges in mind, the fast speed, with which
further developments of the technology flood on the
field, can lead to optimism and excitement on
upcoming applications.
In this paper, we presented a new routing
mechanism, which integrates FEC codes and
selective encryption scheme for providing both QoS
and secure data transmission in WSN. We will be
developing the proposed technique.We will be
developing the proposed technique.
6. Kaksha S.Thakare .Int. Journal of Engineering Research and Applications www.ijera.com
ISSN: 2248-9622, Vol. 6, Issue 4, (Part - 3) April 2016, pp.38-43
www.ijera.com 43|P a g e
ACKNOWLEDGEMENTS
I gratefully acknowledge the contribution of Prof.
R.D.Patane of Terna Engg. College for the support
for the original version of this document.
REFERENCES
[1]. I.F. Akyildiz, W. Su*, Y.
Sankarasubramaniam, E. Cayirci, Wireless
sensor networks: a survey, Computer
Networks 38 (2002) 393–422
[2]. Feng Xia 1,2 ,QoS Challenges and
Opportunities in Wireless Sensor/Actuator
Networks, Sensors 2008, 8(2), 1099-1110,
www.mdpi.org/sensors.
[3]. Hind Alwan, and Anjali Agarwal,a secure
mechanism for qos routing in wireless
sensor networks,2012, 25th IEEE Canadian
Conference on Electrical and Computer
Engineering (CCECE).
[4]. M.P.Singh,Prabhat Kumar, An efficient
forward Error Correction Scheme for
Wireless Sensor Network,Procedia
Technology ,4(2012),737-742 .
[5]. Mohammad Rakibul Islam, Error
Correction Codes in Wireless Sensor
Network : An Energy Aware approach,
International Journal of Electrical,
Computer Energetic, Electronic and
Communication Engineering Vol:4, No:1,
2010
[6]. Patil Ganesh, Madhumita Chatterjee,
Selective
[7]. Encryption Algorithm Networks,Ad-hoc
Networks
[8]. International Journal on Advanced
Computer Theory and Engineering
(IJACTE) ISSN (Print) : 2319 – 2526,
Volume-1, Issue-1, 2012
[9]. Yonglin Ren, Azzedine Boukerche, Lynda
Mokdad, Performance Analysis of a
Selective Encryption Algorithm for
Wireless Ad hoc Networks, IEEE WCNC
2011-Network.
[10]. Shivangi M. Salunkhe, Shashi Prabha, An
Efficient Coded Based QoS Routing
Mechanism in Wireless Sensor Networks,
22nd IRF, International
Conference,29thMarch 2015, Chennai,
India, ISBN: 978-93-82702-83-2.