Results 1 - 10
of
40
Energy Efficient Transmission Error Recovery for Wireless Sensor Network
- International Journal of Grid and Distributed Computing (IJGDC), December 2010
"... Transmission errors are inherent in wireless communications because of the instability of wireless channels resulting due to channel fading, time-frequency coherence, inter-band interference, etc, and thus receiving unreliable message packet. This necessitates the retransmission of packet which furt ..."
Abstract
-
Cited by 5 (2 self)
- Add to MetaCart
Transmission errors are inherent in wireless communications because of the instability of wireless channels resulting due to channel fading, time-frequency coherence, inter-band interference, etc, and thus receiving unreliable message packet. This necessitates the retransmission of packet which further results into extra processing and increased energy consumption of the sensor nodes. In this paper, we propose a new approach of an energy-efficient transmission error recovery algorithm for wireless sensor networks. In the proposed methodology, the data packet is divided into small sub-packets and retransmission is done for only corrupted portion of the sub-packets. The algorithm also helps in determining optimum size of the sub-packet. These results into minimum battery power requirement for the sensor nodes and increased lifespan of the sensor network. The results show that more than 30 % of the power savings can be achieved by implementing proposed system as compared to conventional retransmission of complete packet.
Intrusion Detection Based Security Solution for Cluster-Based Wireless Sensor Networks
"... Wireless sensor network (WSN) is an emerging technology that shows great promise for various applications both for mass public and military. The sensing technology combined with processing power and wireless communication makes it lucrative for being exploited in abundance in future. In many importa ..."
Abstract
-
Cited by 1 (0 self)
- Add to MetaCart
Wireless sensor network (WSN) is an emerging technology that shows great promise for various applications both for mass public and military. The sensing technology combined with processing power and wireless communication makes it lucrative for being exploited in abundance in future. In many important military and commercial applications, it is critical to protect a sensor network from malicious attacks, which presents a demand for providing security mechanisms in the network. In this paper, we propose a new approach of an Intrusion Detection Based Security Solution for Cluster-Based Wireless Sensor Networks. In the proposed methodology, an efficient MAC address based intruder tracking system has been developed for early intruder detection and its prevention.
Binary Consensus in Sensor Motes
"... Abstract-In this work, we adapt the binary consensus algo rithm for use in wireless sensor networks. Binary consensus is used to allow a collection of distributed entities to reach consensus regarding the answer to a binary question and the final decision is based on the majority opinion. Binary con ..."
Abstract
-
Cited by 1 (1 self)
- Add to MetaCart
(Show Context)
Abstract-In this work, we adapt the binary consensus algo rithm for use in wireless sensor networks. Binary consensus is used to allow a collection of distributed entities to reach consensus regarding the answer to a binary question and the final decision is based on the majority opinion. Binary consensus can playa basic role in increasing the accuracy of detecting event occurrence. Existing work on the algorithm focuses on simulation of the algorithm in a purely theoretic sense. In this work, we modify the algorithm to function in wireless sensor networks by adding a method for nodes to determine who to communicate with as well as adding a heuristic for nodes to know when the algorithm has completed. We implement and test our algorithm in real wireless sensor motes and further support our results with a wireless mote simulator.
A Comparative Study of Physical Attacks on Wireless
- Sensor Networks”, IJRET
, 2013
"... Wireless Sensor Networks (WSN) have many potential applications and challenges They consists of hundreds or thousands of low power, low cost sensor nodes which have limited computing resources. WSNs are susceptible to many types of physical attacks due to wireless and shared nature of communication ..."
Abstract
-
Cited by 1 (0 self)
- Add to MetaCart
(Show Context)
Wireless Sensor Networks (WSN) have many potential applications and challenges They consists of hundreds or thousands of low power, low cost sensor nodes which have limited computing resources. WSNs are susceptible to many types of physical attacks due to wireless and shared nature of communication channel, un-trusted transmissions, deployment in open environments, unattended nature and limited resources. So security is a vital requirement for these networks. However wireless micro-sensor networks pose numerous design challenges. This challenge is especially difficult due to the energy constrained nature of the devices. In this paper we focus a wide variety of physical attacks and a comparison on them which enable s us to identify the purpose and capabilities of the attackers. Also this paper discusses known approaches of security detection and defensive mechanisms against the physical attacks effectively.
A Comparative Review on Routing Protocols in Wireless Sensor Networks
"... Wireless Networking is a technology in which number of mobile nodes can communicate with each other directly or indirectly through wireless links. A sensor network is composed of a large number of sensor nodes and a sink. In the wireless sensor networks the main problem is limited battery life used ..."
Abstract
- Add to MetaCart
(Show Context)
Wireless Networking is a technology in which number of mobile nodes can communicate with each other directly or indirectly through wireless links. A sensor network is composed of a large number of sensor nodes and a sink. In the wireless sensor networks the main problem is limited battery life used by sensor nodes because the size of sensor nodes is small so constraints are there like battery size, processor, storage for data, these all are small as sensor nodes Routing protocols of sensor networks are dependable for handles the routes in the networks. This paper surveys current routing protocols for sensor networks and present a categorization for the various approaches pursued and contrast their strength and constraint.
Article An Energy Conservative Wireless Sensor Networks Approach for Precision Agriculture
, 2013
"... www.mdpi.com/journal/electronics ..."
(Show Context)
unknown title
"... Abstract-Wireless Sensor Networks (WSN) consist of small nodes with sensing, computation, and wireless communications capabilities. Sensor networks are "data-centric" networks and are application specific. Adjacent nodes may have similar data and there is a need for communication between ..."
Abstract
- Add to MetaCart
(Show Context)
Abstract-Wireless Sensor Networks (WSN) consist of small nodes with sensing, computation, and wireless communications capabilities. Sensor networks are "data-centric" networks and are application specific. Adjacent nodes may have similar data and there is a need for communication between nodes about the data to be sent. Thus, energy-efficient routing algorithms suitable to the inherent characteristics of these types of networks are needed. Also, to prolong the lifetime of the sensor nodes and to communicate each other designing efficient routing protocol is critical. This paper makes an energy and lifetime comparison of flat and hierarchical routing protocols. Simulation is performed using Matlab. This analysis reveals the important features that need to be taken into consideration while designing and evaluating new routing protocols. In flat routing Protocols all nodes participate equally in the network. But in Hierarchical routing techniques, cluster heads are formed to transmit data to the Base station. So, energy consumption is less in hierarchical routing protocols compared to flat routing protocols.
Comparison of LEACH protocol with Wormhole Attack and without Wormhole Attack in Wireless Sensor Networks
"... ABSTRACT: In Wireless Sensor Networks, routing is the major concern. It comprises of small sensor nodes with limited resources. It is necessary to introduce a routing protocol to extend network life time and to reduce the power consumption in sensor nodes. LEACH is one of the most interested techni ..."
Abstract
- Add to MetaCart
ABSTRACT: In Wireless Sensor Networks, routing is the major concern. It comprises of small sensor nodes with limited resources. It is necessary to introduce a routing protocol to extend network life time and to reduce the power consumption in sensor nodes. LEACH is one of the most interested techniques that offer an efficient way to minimize the power consumption in sensor networks. It uses self organizing and dynamic cluster formation which makes it attractive to various routing attacks, such as Denial of Service (DoS), Black hole, Wormhole and Sybil attacks. Wormhole attack is a Denial of Service attack launched by malicious nodes. It records packets at one location and tunnels them into another location. To check the reliable operation of LEACH, implement wormhole attack and evaluated the LEACH protocol in terms of metrics like throughput, average end-to-end delay, Packet Delivery Ratio (PDR). The evaluation of LEACH with wormhole attack has been done with the help of NS2 simulator. Watchdog is a monitoring technique which detects the misbehaving nodes in the network. It can be implemented in LEACH. In Watchdog-LEACH, some nodes are considered as watchdogs and some changes are applied on LEACH protocol for intrusion detection. Watchdog-LEACH is able to protect against a wide range of attacks and it provides security, energy efficiency and memory efficiency. Comparison made on LEACH with wormhole attack and LEACH with watchdog shows that LEACH with watchdog achieves high throughput, Packet Delivery Ratio and low End to End Delay.