3 research outputs found

    Design and implementation of a communicating method for WSN

    Get PDF
    The sensor nodes present in the wireless sensor networks are constrained of energy as they are powered with the help of battery. Deployment of the sensor nodes in the hostile environment makes it unfavorable for the people to change the battery of the senor nodes when it is expired. Due to the energy limitations there is a great need of providing any energy efficient way of communication for the wireless sensor networks. Several techniques of offering communications in a sensor network use the classical layered method that results in great overhead of the network and high energy consumption. It will be very better when a unified technique is present for converting the functions of common protocol to the cross layer method. A cross layer protocol is been implemented in this project to provide congestion control, better routing over the cross layers. This cross layer protocol is designed based on the initiative determination present in cross layer module. This method offers congestion control forwarding based on initiatives contention based on receivers and better communication between the sensor nodes of a wireless sensor network. The implementation of this initiative determination is very easy as it just involves the comparison with the threshold values. Through this cross layer protocol the functions of each layer can be combined very easily .The performance of this cross layer protocol is also identified in this project. Through this cross layer protocol better communications can be provided between the sensor nodes of a wireless sensor networks and also is far better than the classic layered protocols with respect to the energy consumption and network performance

    Cross layer implementation of key establishment protocols in Wireless Sensor Networks

    No full text
    Middle East Technical University and IEEE, Turkish Section2009 24th International Symposium on Computer and Information Sciences, ISCIS 2009 -- 14 September 2009 through 16 September 2009 -- Guzelyurt -- 78549Security in Wireless Sensor Networks (WSN) can be achieved by establishing shared keys among the sensor nodes having possibility to communicate in the field. However, to achieve the optimum network operation after the deployment, there may be no need to establish keys for all the possible links. Because, links to be established are defined by the network configuration and as long as the network connectivity requirement is satisfied number of links to be secured can be limited accordingly. In this sense, key establishment and network configuration performances are related to each other and this cross relation should be considered when implementing security for WSN. In this paper, we have investigated the cross layer relations and performance variations of the selected pre-distribution and public key based key establishment protocols with the network configuration protocol proposed in [6]. We have proposed three methods as straight, reactive and proactive for selection of links to be secured and simulated the performance in terms of network connectivity, total energy cost and resilience to node capture attack. Simulation results indicate that total energy cost can be reduced by reducing the number of links to be secured without affecting the connectivity performance of the configuration protocol. Also we have figured out that the energy and resilience performance of the public key establishment is better than the key pre-distribution for the given network configuration parameters. © 2009 IEEE
    corecore