8 research outputs found

    Genetic Algorithm based Cluster Head Selection for Optimimized Communication in Wireless Sensor Network

    Get PDF
    Wireless Sensor Network (WSNs) utilizes conveyed gadgets sensors for observing physical or natural conditions. It has been given to the steering conventions which may contrast contingent upon the application and system design. Vitality administration in WSN is of incomparable significance for the remotely sent vitality sensor hubs. The hubs can be obliged in the little gatherings called the Clusters. Clustering is done to accomplish the vitality effectiveness and the versatility of the system. Development of the group likewise includes the doling out the part to the hub based on their borders. In this paper, a novel strategy for cluster head selection based on Genetic Algorithm (GA) has been proposed. Every person in the GA populace speaks to a conceivable answer for the issue. Discovering people who are the best proposals to the enhancement issue and join these people into new people is a critical phase of the transformative procedure. The Cluster Head (CH) is picked using the proposed technique Genetic Algorithm based Cluster Head (GACH). The performance of the proposed system GACH has been compared with Particle Swarm Optimization Cluster Head (PSOCH). Simulations have been conducted with 14 wireless sensor nodes scattered around 8 kilometers. Results proves that GACH outperforms than PSOCH in terms of throughput, packet delivery ratio and energy efficiency

    Genetic Algorithm based Cluster Head Selection for Optimimized Communication in Wireless Sensor Network

    Get PDF
    Wireless Sensor Network (WSNs) utilizes conveyed gadgets sensors for observing physical or natural conditions. It has been given to the steering conventions which may contrast contingent upon the application and system design. Vitality administration in WSN is of incomparable significance for the remotely sent vitality sensor hubs. The hubs can be obliged in the little gatherings called the Clusters. Clustering is done to accomplish the vitality effectiveness and the versatility of the system. Development of the group likewise includes the doling out the part to the hub based on their borders. In this paper, a novel strategy for cluster head selection based on Genetic Algorithm (GA) has been proposed. Every person in the GA populace speaks to a conceivable answer for the issue. Discovering people who are the best proposals to the enhancement issue and join these people into new people is a critical phase of the transformative procedure. The Cluster Head (CH) is picked using the proposed technique Genetic Algorithm based Cluster Head (GACH). The performance of the proposed system GACH has been compared with Particle Swarm Optimization Cluster Head (PSOCH). Simulations have been conducted with 14 wireless sensor nodes scattered around 8 kilometers. Results proves that GACH outperforms than PSOCH in terms of throughput, packet delivery ratio and energy efficiency

    A Decentralized Fuzzy C-Means-Based Energy-Efficient Routing Protocol for Wireless Sensor Networks

    Get PDF
    Energy conservation in wireless sensor networks (WSNs) is a vital consideration when designing wireless networking protocols. In this paper, we propose a Decentralized Fuzzy Clustering Protocol, named DCFP, which minimizes total network energy dissipation to promote maximum network lifetime. The process of constructing the infrastructure for a given WSN is performed only once at the beginning of the protocol at a base station, which remains unchanged throughout the network’s lifetime. In this initial construction step, a fuzzy C-means algorithm is adopted to allocate sensor nodes into their most appropriate clusters. Subsequently, the protocol runs its rounds where each round is divided into a CH-Election phase and a Data Transmission phase. In the CH-Election phase, the election of new cluster heads is done locally in each cluster where a new multicriteria objective function is proposed to enhance the quality of elected cluster heads. In the Data Transmission phase, the sensing and data transmission from each sensor node to their respective cluster head is performed and cluster heads in turn aggregate and send the sensed data to the base station. Simulation results demonstrate that the proposed protocol improves network lifetime, data delivery, and energy consumption compared to other well-known energy-efficient protocols

    Energy Efficient Clustering Scheme for Wireless Sensor Networks: A Survey

    Get PDF
    Abstract Wireless sensor networks are application specific networks co mposed of large number of sensor nodes. Limited energy resource of sensor nodes make efficient energy consumption of nodes as main design issue. Energy efficiency is achieved from hardware level to network protocol levels. Clustering of nodes is an effective approach to reduce energy consumption of nodes. Clustering algorith ms group nodes in independent clusters. Each cluster has atleast one cluster head. Nodes send data to respective cluster heads. Cluster heads send data to base station. Clustering algorith ms prolong network lifetime by avoiding long distance communicat ion of nodes to base station. In literature various clustering approaches are proposed. Work of this paper discusses working o f few of them and distinguishes them according to operational mode and state of clustering. Work of this paper helps to understand classification of clustering schemes

    A Multi-objective Evolutionary Algorithm to solve Complex Optimization Problems

    Get PDF
    Multi-objective optimization problem formulations reflect pragmatic modeling of several real-life complex optimization problems. In many of them the considered objectives are competitive with each other; emphasizing only one of them during solution generation and evolution incurs high probability of producing a one-sided solution, which is unacceptable with respect to other objectives. An appropriate solution to the multi-objective optimization problem is to investigate a set of solutions that satisfy all of the competing objectives to an acceptable extent, where no solution in the solution set is dominated by others in terms of objective optimization. In this work, we investigate well known Non-dominated Sorting Genetic Algorithm (NSGA-II), and Strength Pareto Evolutionary Algorithm (SPEA-II), to find Pareto optimal solutions for two real-life problems: Task-based Sailor Assignment Problem (TSAP) and Coverage and Lifetime Optimization Problem in Wireless Sensor Networks (CLOP). Both of these problems are multi-objective problems. TSAP constitutes five multi-directional objectives, whereas CLOP is composed of two competing objectives. To validate the special operators developed, these two test bed problems have been used. Finally, traditional NSGA-II and SPEA-II have been blended with these special operators to generate refined solutions of these multi-objective optimization problems

    Cognitive Security Framework For Heterogeneous Sensor Network Using Swarm Intelligence

    Get PDF
    Rapid development of sensor technology has led to applications ranging from academic to military in a short time span. These tiny sensors are deployed in environments where security for data or hardware cannot be guaranteed. Due to resource constraints, traditional security schemes cannot be directly applied. Unfortunately, due to minimal or no communication security schemes, the data, link and the sensor node can be easily tampered by intruder attacks. This dissertation presents a security framework applied to a sensor network that can be managed by a cohesive sensor manager. A simple framework that can support security based on situation assessment is best suited for chaotic and harsh environments. The objective of this research is designing an evolutionary algorithm with controllable parameters to solve existing and new security threats in a heterogeneous communication network. An in-depth analysis of the different threats and the security measures applied considering the resource constrained network is explored. Any framework works best, if the correlated or orthogonal performance parameters are carefully considered based on system goals and functions. Hence, a trade-off between the different performance parameters based on weights from partially ordered sets is applied to satisfy application specific requirements and security measures. The proposed novel framework controls heterogeneous sensor network requirements,and balance the resources optimally and efficiently while communicating securely using a multi-objection function. In addition, the framework can measure the affect of single or combined denial of service attacks and also predict new attacks under both cooperative and non-cooperative sensor nodes. The cognitive intuition of the framework is evaluated under different simulated real time scenarios such as Health-care monitoring, Emergency Responder, VANET, Biometric security access system, and Battlefield monitoring. The proposed three-tiered Cognitive Security Framework is capable of performing situation assessment and performs the appropriate security measures to maintain reliability and security of the system. The first tier of the proposed framework, a crosslayer cognitive security protocol defends the communication link between nodes during denial-of-Service attacks by re-routing data through secure nodes. The cognitive nature of the protocol balances resources and security making optimal decisions to obtain reachable and reliable solutions. The versatility and robustness of the protocol is justified by the results obtained in simulating health-care and emergency responder applications under Sybil and Wormhole attacks. The protocol considers metrics from each layer of the network model to obtain an optimal and feasible resource efficient solution. In the second tier, the emergent behavior of the protocol is further extended to mine information from the nodes to defend the network against denial-of-service attack using Bayesian models. The jammer attack is considered the most vulnerable attack, and therefore simulated vehicular ad-hoc network is experimented with varied types of jammer. Classification of the jammer under various attack scenarios is formulated to predict the genuineness of the attacks on the sensor nodes using receiver operating characteristics. In addition to detecting the jammer attack, a simple technique of locating the jammer under cooperative nodes is implemented. This feature enables the network in isolating the jammer or the reputation of node is affected, thus removing the malicious node from participating in future routes. Finally, a intrusion detection system using `bait\u27 architecture is analyzed where resources is traded-off for the sake of security due to sensitivity of the application. The architecture strategically enables ant agents to detect and track the intruders threateningthe network. The proposed framework is evaluated based on accuracy and speed of intrusion detection before the network is compromised. This process of detecting the intrusion earlier helps learn future attacks, but also serves as a defense countermeasure. The simulated scenarios of this dissertation show that Cognitive Security Framework isbest suited for both homogeneous and heterogeneous sensor networks

    A Survey on Energy-Efficient Strategies in Static Wireless Sensor Networks

    Get PDF
    A comprehensive analysis on the energy-efficient strategy in static Wireless Sensor Networks (WSNs) that are not equipped with any energy harvesting modules is conducted in this article. First, a novel generic mathematical definition of Energy Efficiency (EE) is proposed, which takes the acquisition rate of valid data, the total energy consumption, and the network lifetime of WSNs into consideration simultaneously. To the best of our knowledge, this is the first time that the EE of WSNs is mathematically defined. The energy consumption characteristics of each individual sensor node and the whole network are expounded at length. Accordingly, the concepts concerning EE, namely the Energy-Efficient Means, the Energy-Efficient Tier, and the Energy-Efficient Perspective, are proposed. Subsequently, the relevant energy-efficient strategies proposed from 2002 to 2019 are tracked and reviewed. Specifically, they respectively are classified into five categories: the Energy-Efficient Media Access Control protocol, the Mobile Node Assistance Scheme, the Energy-Efficient Clustering Scheme, the Energy-Efficient Routing Scheme, and the Compressive Sensing--based Scheme. A detailed elaboration on both of the basic principle and the evolution of them is made. Finally, further analysis on the categories is made and the related conclusion is drawn. To be specific, the interdependence among them, the relationships between each of them, and the Energy-Efficient Means, the Energy-Efficient Tier, and the Energy-Efficient Perspective are analyzed in detail. In addition, the specific applicable scenarios for each of them and the relevant statistical analysis are detailed. The proportion and the number of citations for each category are illustrated by the statistical chart. In addition, the existing opportunities and challenges facing WSNs in the context of the new computing paradigm and the feasible direction concerning EE in the future are pointed out

    Base Station Assisted Hierarchical Cluster-Based Routing

    No full text
    Wireless sensor networks (WSNs) are commonly used for continuously monitoring applications. This paper investigates a base station assisted energy efficient rout-ing for hierarchical clusters. The base station deter-mines the number of clusters and the initial set of head-set members. Moreover, instead of a single cluster head, a set of associates called a head-set manages the net-work clusters. The head-set approach not only opti-mizes energy consumption by reducing the number of elections but evenly distributes the long-range trans-missions among the network nodes. Due to the con-trolled addition of redundant associates, the network is available for longer number of transmissions. The sim-ulation results show that the proposed protocol outper-forms the traditional clustering techniques. 1
    corecore