240 research outputs found

    Sleep Deprivation Attack Detection in Wireless Sensor Network

    Full text link
    Deployment of sensor network in hostile environment makes it mainly vulnerable to battery drainage attacks because it is impossible to recharge or replace the battery power of sensor nodes. Among different types of security threats, low power sensor nodes are immensely affected by the attacks which cause random drainage of the energy level of sensors, leading to death of the nodes. The most dangerous type of attack in this category is sleep deprivation, where target of the intruder is to maximize the power consumption of sensor nodes, so that their lifetime is minimized. Most of the existing works on sleep deprivation attack detection involve a lot of overhead, leading to poor throughput. The need of the day is to design a model for detecting intrusions accurately in an energy efficient manner. This paper proposes a hierarchical framework based on distributed collaborative mechanism for detecting sleep deprivation torture in wireless sensor network efficiently. Proposed model uses anomaly detection technique in two steps to reduce the probability of false intrusion.Comment: 7 pages,4 figures, IJCA Journal February 201

    An efficient scalable scheduling mac protocol for underwater sensor networks

    Get PDF
    Underwater Sensor Networks (UWSNs) utilise acoustic waves with comparatively lower loss and longer range than those of electromagnetic waves. However, energy remains a challenging issue in addition to long latency, high bit error rate, and limited bandwidth. Thus, collision and retransmission should be efficiently handled at Medium Access Control (MAC) layer in order to reduce the energy cost and also to improve the throughput and fairness across the network. In this paper, we propose a new reservation-based distributed MAC protocol called ED-MAC, which employs a duty cycle mechanism to address the spatial-temporal uncertainty and the hidden node problem to effectively avoid collisions and retransmissions. ED-MAC is a conflict-free protocol, where each sensor schedules itself independently using local information. Hence, ED-MAC can guarantee conflict-free transmissions and receptions of data packets. Compared with other conflict-free MAC protocols, ED-MAC is distributed and more reliable, i.e., it schedules according to the priority of sensor nodes which based on their depth in the network. We then evaluate design choices and protocol performance through extensive simulation to study the load effects and network scalability in each protocol. The results show that ED-MAC outperforms the contention-based MAC protocols and achieves a significant improvement in terms of successful delivery ratio, throughput, energy consumption, and fairness under varying offered traffic and number of nodes

    Automated Vehicle Monitoring System

    Full text link
    An automated vehicle monitoring system is proposed in this paper. The surveillance system is based on image processing techniques such as background subtraction, colour balancing, chain code based shape detection, and blob. The proposed system will detect any human\u27s head as appeared at the side mirrors. The detected head will be tracked and recorded for further action

    Connectivity, Coverage and Placement in Wireless Sensor Networks

    Get PDF
    Wireless communication between sensors allows the formation of flexible sensor networks, which can be deployed rapidly over wide or inaccessible areas. However, the need to gather data from all sensors in the network imposes constraints on the distances between sensors. This survey describes the state of the art in techniques for determining the minimum density and optimal locations of relay nodes and ordinary sensors to ensure connectivity, subject to various degrees of uncertainty in the locations of the nodes

    Automated Vehicle Monitoring System

    Get PDF
    An automated vehicle monitoring system is proposed in this paper. The surveillance system is based on image processing techniques such as background subtraction, colour balancing, chain code based shape detection, and blob. The proposed system will detect any human’s head as appeared at the side mirrors. The detected head will be tracked and recorded for further action

    Gossip-Based Indexing Ring Topology for 2-Dimension Spatial Data in Overlay Networks

    Get PDF
    AbstractOverlay networks are used widely in the Internet, such as retrieval and share of files, multimedia games and so on. However, in distributed system, the retrieval and share of 2-dimension spatial data still have some difficult problems and can not solve the complex retrieval of 2-dimension spatial data efficiently. This article presents a new indexing overlay networks, named 2D-Ring, which is the ring topology based on gossip for 2-dimension spatial data. The peers in our overlay networks exchange the information periodically and update each local view by constructing algorithm. 2-dimension spatial data is divided by quad-tree and mapped into control points, which are hashed into 2D-Ring by SHA-1 hash function. In such way, the problem of 2-dimension spatial data indexing is converted to the problem of searching peers in the 2D-Ring. A large of extensive experiments show that the time complexity of constructing algorithm of 2D-Ring can reach convergence logarithmically as a function of the network size and hold higher hit rate and lower query delay

    The state of peer-to-peer network simulators

    Get PDF
    Networking research often relies on simulation in order to test and evaluate new ideas. An important requirement of this process is that results must be reproducible so that other researchers can replicate, validate and extend existing work. We look at the landscape of simulators for research in peer-to-peer (P2P) networks by conducting a survey of a combined total of over 280 papers from before and after 2007 (the year of the last survey in this area), and comment on the large quantity of research using bespoke, closed-source simulators. We propose a set of criteria that P2P simulators should meet, and poll the P2P research community for their agreement. We aim to drive the community towards performing their experiments on simulators that allow for others to validate their results

    A Survey on Energy Efficient Network Coding for Multi-hop Routing in Wireless Sensor Networks

    Get PDF
    AbstractNetwork coding consists of intelligently aggregating data packets by means of binary or linear combinations. Recently, network coding has been proposed as a complementary solution for energy efficient multi-hop routing in Wireless Sensor Networks (WSNs). This is because network coding, through the aggregation of packets, considerably reduces the number of transmissions throughout the network. Although numerous network coding techniques for energy efficient routing have been developed in the literature, not much is known about a single survey article reporting on such energy efficient network coding within multi-hop WSNs. As a result, this paper addresses this gap by first classifying and discussing the recent developed energy efficient network coding techniques. The paper then identifies and explains open research opportunities based on analysis of merits of such techniques. This survey aims at providing the reader with a brief and concise idea on the current state-of-art research on network coding mainly focusing on its applications for energy efficient WSNs
    corecore