122,932 research outputs found

    Energy Consumption Rate based Stable Election Protocol (ECRSEP) for WSNs

    Get PDF
    In recent few yearsWireless Sensor Networks (WSNs) have seen an increased interest in various applications like border field security, disaster management and medical applications. So large number of sensor nodes are deployed for such applications, which can work autonomously. Due to small power batteries in WSNs, efficient utilization of battery power is an important factor. Clustering is an efficient technique to extend life time of sensor networks by reducing the energy consumption. In this paper, we propose a new protocol; Energy Consumption Rate based Stable Election Protocol (ECRSEP). Our CH selection scheme is based on the weighted election probabilities of each node according to the Energy Consumption Rate (ECR) of each node. We compare results of our proposed protocol with Low Energy Adaptive Clustering Hierarchy (LEACH), Distributed Energy Efficient Clustering (DEEC), Stable Election Protocol (SEP), and Enhanced SEP(ESEP). Our simulation results show that our proposed protocol, ECRSEP outperforms all these protocols in terms of network stability and network lifetime

    Prolonging Wireless Sensor Network Lifetime Using Routing Protocol

    Get PDF
    Prolonging network lifetime is one of the challenging issues of Wireless Sensor Networks (WSN). Many techniques have been proposed to achieve a longer battery life for the sensor nodes. In this paper, we focus on the routing technique to improve the battery life and extend the network lifetime. Our protocol is based upon the two existing protocols, namely, LEACH (Low-Energy Adaptive Clustering Hierarchy) and PEGASIS (Power Efficient GAthering in Sensor Information Systems). By combining these two basic routing techniques, we propose a new protocol which provides an increase in network lifetime compared to the existing basic protocols

    Wireless sensor networks lifetime assessment model development

    Get PDF
    In the recent years low power computing systems have gained popularity.  Networks, which use low power computer systems and transmitted data by using wireless connection are called wireless sensor networks, which  main task is to get the information from sensors and transmission network. Nowadays, the most topical researches pertaining to wireless sensor networks are grounded on the  new optimization of structure of network transmission protocol, the routing optimization in transmission network, optimization of network structure, as a result of which the life circle of wireless network sensors is possible to increase. In the present article the methodology for determining the life circle of network is discussed. The approaches in detection of life circle pertaining to the important network nodes are described

    Analysis and Improvement of Pegasis using Sink Mobility

    Get PDF
    WSN is a distributed network to sense diverse physical conditions of the environment using sensors. Sensor nodes could be static or moving. Wireless routing protocols try to ensure efficient transmission of data in WSN. Many routing protocols have been proposed such as LEACH (low energy adaptive clustering hierarchy), PEGASIS (power efficient gathering in sensor information system), TEEN (threshold sensitive energy efficient sensor network protocol). The new algorithm is proposed on the basis of mobility of sink. Using multi-chain, multi-head and sink mobility algorithm, the network can achieve better lifetime. The PEGASIS protocol presented here is a chain-based routing protocol where sensor uses greedy algorithm to form a chain data. In the proposed technique, mobile sink moves along its path and stays at a sojourn location for a sojourn time and guarantees complete collection of data. In this proposed algorithm a path has been developed of mobile sink and then wide range of experiments have been performed to access the performance of the proposed model

    A low power routing algorithm for localization in IEEE 802.15.4 networks

    Get PDF
    Many context-aware applications rely on the knowledge of the position of the user and the surrounding objects to provide advanced, personalized and real-time services. In wide-area deployments, a routing protocol is needed to collect the location information from distant nodes. In this paper, we propose a new source-initiated (on demand) routing protocol for location-aware applications in IEEE 802.15.4 wireless sensor networks. This protocol uses a low power MAC layer to maximize the lifetime of the network while maintaining the communication delay to a low value. Its performance is assessed through experimental tests that show a good trade-off between power consumption and time delay in the localization of a mobile device

    Taxonomy and Evaluations of Low-Power Listening Protocols for Machine-to-Machine Networks

    Get PDF
    Even though a lot of research has made significant contributions to advances in sensor networks, sensor network protocols, which have different characteristics according to the target application, might confuse machine-to-machine (M2M) network designers when they choose the protocol most suitable for their specific applications. Therefore, this paper provides a well-defined taxonomy of low-power listening protocols by examining in detail the existing low-power sensor network protocols and evaluation results. It will also be very useful for helping M2M designers understand specific features of low-power media access control protocols as they design new M2M networks

    Design and Implementation of Intrusion Detection Systems using RPL and AOVD Protocols-based Wireless Sensor Networks

    Get PDF
    Wireless Sensor Network (WSN) technology has grown in importance in recent years. All WSN implementations need secure data transmission between sensor nodes and base stations. Sensor node attacks introduce new threats to the WSN. As a result, an appropriate Intrusion Detection System (IDS) is required in WSN for defending against security attacks and detecting attacks on sensor nodes. In this study, we use the Routing Protocol for Low Power and Lossy Networks (RPL) for addressing security services in WSN by identifying IDS with a network size of more or less 20 nodes and introducing 10% malicious nodes. The method described above is used on Cooja in the VMware virtual machine Workstation with the InstantContiki2.7 operating system. To track the movement of nodes, find network attacks, and spot dropped packets during IDS in WSN, an algorithm is implemented in the Network Simulator (NS2) using the Ad-hoc On-Demand Distance Vector (AODV) protocol in the Linux operating system.Keywords—Intrusion Detection Systems, wireless sensor networks, Cooja simulator, sensor nodes, NS
    corecore