29 research outputs found

    SCMR: Static Clustering based Multi-hop Routing in Wireless Sensor Network

    Get PDF
    The most challengeable issue in wireless sensor networks is the limited energy of their nodes that are distributed in a field for collecting information from the environment. Thus, energy efficiency and lifetime of these networks consider one of important and controversial issues in this field. In this paper, a new energy effective routing algorithm is presented which is based on static clustering and multi-hop transmission. The SCMR (Static Clustering Based Multi-hop Routing) Algorithm is verified with MATLAB simulator. Simulation results show that the new method compared to previous methods such as LEACH, could balances the energy consumption, thus increase the stable period of network

    Topology control in Heterogeneous Wireless Sensor Network

    Get PDF
    Topology of a Wireless Sensor Network determines the connectivity of the wireless network and topology Control is the important technique of extending network lifetime while preserving network connectivity. In this paper, we consider a heterogeneous multi-hop wireless sensor network consisting of sensor nodes and relay nodes. Relay nodes strategically deployed for fault tolerance and virtual backbone creation. We propose topology control algorithm based on hybrid approaches to maximize the topological network lifetime of the WSN. The experimental performance evaluation demonstrates the topology control with efficient use of relay nodes maximizes the network lifetime of WSNs

    Dynamically reconfigurable routing protocol design for underwater wireless sensor network

    Get PDF
    Underwater Wireless Sensor Networks (UWSN) share the common challenges of terrestrial Wireless Sensor Network (WSN), however they are significantly different from terrestrial WSN. Mainly, because acoustic wireless communication is the main physical layer technology in UWSN. Acoustic communication offers longer range, but has limitations due to low speed of sound, high error probability, limited bandwidth capacity, node mobility and 3-dimensional network architecture. Most of the ground based WSN are static, however the UWSN condition keeps on changing due to water current and channel impairment. Therefore the UWSN must be able to dynamically reconfigure itself. The sensor nodes must be able to re-route their communication if the network configuration changes. In this paper we address a fundamental Networking layer issue by developing a dynamically reconfigurable routing protocol. It is a multi-hop datagram routing scheme which will offer reliable underwater wireless communication by dynamically re-routing the data, when network configuration changes

    Cuckoo Based Clustering Algorithm for Wireless Sensor Network

    Get PDF
    A significant challenge in wireless sensor network is the restriction of energy resources that influences network lifetime directly. Clustering is a technique that can be used to increase network lifetime. Recently, nature-inspired clustering approaches have attracted research community interests. In this paper, we introduce three variant of Cuckoo algorithm in which the energy of path length is considered as one important factor in cluster head selection. To prevent quick energy dissipation of the cluster heads, the role of cluster head should be circulated among different nodes. Thus the proposed algorithms are aimed to avoid the selection of specific nodes as cluster head very frequently. In addition to this, the problem of lack of attention to the residual energy of sensor nodes during experimental clustering phase in well-known LEACH algorithm is resolved. Simulation results show that the proposed algorithms outperform LEACH algorithm in terms of energy consumption and network lifetime

    MANET Mining: Mining Association Rules

    Get PDF

    A Multi-Layer Approach For Detection Of Selective Forwarding Attacks In Wireless Sensor Networks

    Get PDF
    Wireless sensor networks (WSNs) are increasingly used due to their broad range of important applications in both military and civilian domains. Security is a major threat in WSNs. WSNs are prone to several types of security attacks. Sensor nodes have limited capacities and are deployed in dangerous locations; therefore, they are vulnerable to different types of attacks, including wormhole, sinkhole, and selective forwarding attacks. Security attacks are classified as data traffic and routing attacks. These security attacks could affect the most significant applications of WSNs, namely, military surveillance, traffic monitoring, and healthcare. Therefore, many approaches were suggested in literature to detect security attacks on the network layer in WSNs. The network layer is of paramount significance to the security of WSNs to prevent exploitation of their confidentiality, privacy, availability, integrity, and authenticity. Reliability, energy efficiency, and scalability are strong constraints on sensor nodes that affect the security of WSNs. Because sensor nodes have limited capabilities in most of these areas, selective forwarding attacks cannot be easily detected in networks. In this dissertation, an approach to selective forwarding detection (SFD) is suggested. The approach has three layers: MAC pool IDs, rule-based processing, and anomaly detection. It maintains the safety of data transmission between a source node and base station while detecting selective forwarding attacks. Furthermore, the approach is reliable, energy efficient, and scalable

    Towards fostering the role of 5G networks in the field of digital health

    Get PDF
    A typical healthcare system needs further participation with patient monitoring, vital signs sensors and other medical devices. Healthcare moved from a traditional central hospital to scattered patients. Healthcare systems receive help from emerging technology innovations such as fifth generation (5G) communication infrastructure: internet of things (IoT), machine learning (ML), and artificial intelligence (AI). Healthcare providers benefit from IoT capabilities to comfort patients by using smart appliances that improve the healthcare level they receive. These IoT smart healthcare gadgets produce massive data volume. It is crucial to use very high-speed communication networks such as 5G wireless technology with the increased communication bandwidth, data transmission efficiency and reduced communication delay and latency, thus leading to strengthen the precise requirements of healthcare big data utilities. The adaptation of 5G in smart healthcare networks allows increasing number of IoT devices that supplies an augmentation in network performance. This paper reviewed distinctive aspects of internet of medical things (IoMT) and 5G architectures with their future and present sides, which can lead to improve healthcare of patients in the near future

    Relay Node Placement and Trajectory Computation of Mobile Data Collectors in Wireless Sensor Networks

    Get PDF
    Recent research has shown that introducing mobile data collectors (MDC) can significantly improve the performance of wireless sensor networks. There are important design problems in this area, such as determining the number and positions of relay nodes, determining their buffer capacities to ensure there is no data loss, and calculating a suitable trajectory for MDC(s). In this thesis, we first propose an integrated integer linear program (ILP) formulation that calculates the optimal number and positions of the relay nodes with the requisite buffer capacities. We then present two algorithms for calculating the trajectory of the MDC, based on the locations and the load of each individual relay node, in a way that minimizes the energy dissipation of the relay nodes. Our simulation results demonstrate that our approach is feasible for networks with hundreds of sensor nodes and leads to significant improvements compared to conventional data communication strategies

    Performance Analysis of Reactive Routing Protocol on VANET with Wormhole Attack Schemeaper

    Get PDF
    Entering the information era, the current needs of global community is increasing very rapidly. Vehicular Ad-hoc Networks (VANET) has drawn significant attentions from both industry and academia as an important developmnt of vehicular communication technology. VANET is one of open network and communication media without security mechanism. There are many kinds of security threat that can interrupt data communication in VANET. Wormhole attacks as one of security threat can be a good challenge in VANET security research.  In this paper, we evaluate performance of reactive routing protocol on VANET with wormhole attack scheme. The project is simulated using NS-3 in Ubuntu platform with performance analysis of routing protocol by changing of initial power and node density. We conclude that throughput values are increasing along with the changing of initial power while the delay values are decreasing rapidly. By the changing of node density, the highest delay value is 0.122 ns on 10 nodes condition and 0.215 Mbps for throughput value on 8 nodes condition
    corecore