345 research outputs found

    A Reliable Network Routing Protocol Design with an Intelligent Mobile Sink and Energy Efficiency over Wireless Sensor Network

    Get PDF
    This is crucial for the successful operation of a Wireless Sensor Network, frequently called as WSN as each of the sensor nodes in the network's structure are in charge of transmitting the information from its original source to its final destination. Several researchers have developed a Mobile sink in an effort to enhance transmission quality. Although it has been shown to be beneficial, the network's overall reliability is compromised by the much more energy-intensive operation of the nodes. In this research, we offer a routing strategy that makes use of cluster and source portability to drastically reduce power usage. We have given this protocol its name: the Intelligent Mobile Sink Assisted Routing Protocol (IMSARP).  To get started, we divide an entire sensor environment into regions, and within each of them, members cast proportional votes to choose who will serve as the Cluster-Head (CH). To determine how to choose the most efficient choice, nodes in the network evaluate the power consumption of all feasible routes. The proposed IMSARP method uses a cluster-based paradigm to construct a mobile-sink routing protocol. The standard quantity of energy within all the clusters serves as what drives the sink's motion. The outcomes section of this research proves the legitimacy and maintains the credibility of the proposed system by presenting the results, which include throughput, delay reduction, energy efficiency, and data transfer rate

    Design and Analysis of Soft Computing Based Improved Routing Protocol in WSN for Energy Efficiency and Lifetime Enhancement

    Get PDF
    Mobile wireless sensor networks have been developed as a result of recent advancements in wireless technologies. Sensors in the network are low-cost and have a short battery life, in addition to their mobility. They are more applicable in terms of the essential properties of these networks. These networks have a variety of uses, including search and rescue operations, health and environmental monitoring, and intelligent traffic management systems, among others. According to the application requirements, mobile wireless sensor nodes are energy limited equipment, so energy conservation is one of the most significant considerations in the design of these networks. Aside from the issues posed by sensor node mobility, we should also consider routing and dynamic clustering. According to studies, cluster models with configurable parameters have a substantial impact on reducing energy usage and extending the network's lifetime. As a result, the primary goal of this study is to describe and select a smart method for clustering in mobile wireless sensor networks utilizing evolutionary algorithms in order to extend the network's lifetime and ensure packet delivery accuracy. For grouping sensor nodes in this work, the Genetic Algorithm is applied initially, followed by Bacterial Conjugation. The simulation's results show a significant increase in clustering speed acceleration. The speed of the nodes is taken into account in the suggested approach for calibrating mobile wireless sensor nodes

    Optimal Coverage in Wireless Sensor Network using Augmented Nature-Inspired Algorithm

    Get PDF
               One of the difficult problems that must be carefully considered before any network configuration is getting the best possible network coverage. The amount of redundant information that is sensed is decreased due to optimal network coverage, which also reduces the restricted energy consumption of battery-powered sensors. WSN sensors can sense, receive, and send data concurrently. Along with the energy limitation, accurate sensors and non-redundant data are a crucial challenge for WSNs. To maximize the ideal coverage and reduce the waste of the constrained sensor battery lifespan, all these actions must be accomplished. Augmented Nature-inspired algorithm is showing promise as a solution to the crucial problems in “Wireless Sensor Networks” (WSNs), particularly those related to the reduced sensor lifetime. For “Wireless Sensor Networks” (WSNs) to provide the best coverage, we focus on algorithms that are inspired by Augmented Nature in this research. In wireless sensor networks, the cluster head is chosen using the Diversity-Driven Multi-Parent Evolutionary Algorithm. For Data encryption Improved Identity Based Encryption (IIBE) is used.  For centralized optimization and reducing coverage gaps in WSNs Time variant Particle Swarm Optimization (PSO) is used. The suggested model's metrics are examined and compared to various traditional algorithms. This model solves the reduced sensor lifetime and redundant information in Wireless Sensor Networks (WSNs) as well as will give real and effective optimum coverage to the Wireless Sensor Networks (WSNs)

    Intrusion Detection Mechanism for Empowered Intruders Using IDEI

    Get PDF
    In the past, intrusion detection has been extensively investigated as a means of ensuring the security of wireless sensor networks. Anti-recon technology has made it possible for an attacker to get knowledge about the detecting nodes and plot a route around them in order to evade detection. An "empowered intruder" is one who poses new threats to current intrusion detection technologies. Furthermore, the intended impact of detection may not be obtained in certain subareas owing to gaps in coverage caused by the initial deployment of detection nodes at random. A vehicle collaboration sensing network model is proposed to solve these difficulties, in which mobile sensing cars and static sensor nodes work together to identify intrusions by empowered intruders. An algorithm for mobile sensing vehicles, called Intrusion Detection Mechanism for Empowered Intruders(IDEI), and a sleep-scheduling technique for static nodes form the basis of our proposal. Sophisticated intruders will be tracked by mobile sensors, which will fill in the gaps in coverage, while static nodes follow a sleep schedule and will be woken when the intruder is discovered close. Our solution is compared to current techniques like Kinetic Theory Based Mobile Sensor Network (KMsn)and Mean Time to Attacks (MTTA) in terms of intrusion detection performance, energy usage, and sensor node movement distance. IDEI's parameter sensitivity is also examined via comprehensive simulations. It is clear from the theoretical analysis and simulation findings that our idea is more efficient and available

    MAC/Routing design for under water sensor networks

    Get PDF
    The huge advances in communication technologies and Micro Electrical and Mechanical Systems (MEMS) have triggered a revolution in sensor networks. One major application of sensor networks is in the investigation of complex and uninhabited under water surfaces; such sensor networks are called the Underwater Wireless Sensor Networks (UWSN). UWSN comprises of a number of sensors which are submerged in water and one or several surface stations or a sinks at which the sensed data is collected. In some underwater sensor applications, autonomous underwater vehicles (AUVs) could be used. The underwater sensor nodes communicate with each other using acoustic signals. Applications for this type of networks include oceanographic data collection, pollution monitoring, offshore exploration and tactical surveillance applications. The novel networking paradigm of UWSN is facing a totally different operating environment than the ground based wireless sensor networks. This introduces new challenges such as huge propagation delays, and limited acoustic link capacity with high attenuation factors. These new challenges have their own impact on the design of most of the networking layers preventing researchers from using the same layers used for other networks. The most affected layers are the Physical, Medium Access Control (MAC), Routing and Transport layers. This work will introduce novel routing and MAC layers’ protocols for UWSNs. The routing protocol will adopt the minimum spanning tree algorithm and focus on maximizing the connectivity of the network, which means maximizing the total number of nodes connected to the root or the sink in this case. The protocol will try also to provide a minimum hop connection for all the nodes in the network taking into account the residual energy, location information and number of children at the next hop node. The other contribution of this work is a MAC Protocol which will incorporate the topology information provided by the routing protocol to minimize the collisions and energy wastage in data transmission. The MAC Protocol will also try to shorten the queuing delays at the intermediate nodes for a message traveling from source to the sink. A comparison will be conducted with other existing routing and MAC protocols. The routing protocol will be tested and compared with the E-Span spanning tree algorithm for data aggregation. The MAC protocol will be compared with Park\u27s protocol proposed in [2] in terms of performance metrics like end-to-end delay and the number of collisions. We will also explore the ability of the proposed protocols to enhance the life span of the network

    Energy Efficient Location Aided Routing Protocol for Wireless MANETs

    Get PDF
    A Mobile Ad-Hoc Network (MANET) is a collection of wireless mobile nodes forming a temporary network without using any centralized access point, infrastructure, or centralized administration. In this paper we introduce an Energy Efficient Location Aided Routing (EELAR) Protocol for MANETs that is based on the Location Aided Routing (LAR). EELAR makes significant reduction in the energy consumption of the mobile nodes batteries by limiting the area of discovering a new route to a smaller zone. Thus, control packets overhead is significantly reduced. In EELAR a reference wireless base station is used and the network's circular area centered at the base station is divided into six equal sub-areas. At route discovery instead of flooding control packets to the whole network area, they are flooded to only the sub-area of the destination mobile node. The base station stores locations of the mobile nodes in a position table. To show the efficiency of the proposed protocol we present simulations using NS-2. Simulation results show that EELAR protocol makes an improvement in control packet overhead and delivery ratio compared to AODV, LAR, and DSR protocols.Comment: 9 Pages IEEE format, International Journal of Computer Science and Information Security, IJCSIS 2009, ISSN 1947 5500, Impact factor 0.423, http://sites.google.com/site/ijcsis

    A blockchain-based trust management system for 5G network slicing enabled C-RAN

    Get PDF
    The mobility nature of the wireless networks and the time-sensitive tasks make it necessary for the system to transfer the messages with a minimum delay. Cloud Radio Access Network (C-RAN) reduces the latency problem. However, due to the trustlessness of 5G networks resulting from the heterogeneity nature of devices. In this article, for the edge devices, there is a need to maintain a trust level in the C-RAN node by checking the rates of devices that are allowed to share data among other devices. The SDN controller is built into a macro-cell that plays the role of a cluster head. The blockchain-based automatically authenticates the edge devices by assigning a unique identification that is shared by the cluster head with all C-RAN nodes connected to it. Simulation results demonstrate that, compared with the benchmark, the proposed approach significantly improves the processing time of blocks, the detection accuracy of malicious nodes, and transaction transmission delay

    Implementation on Maximizing Network Topology Lifetime using Mobile Node Rotation

    Get PDF
    Wireless sensor network (WSN) is facing key challenges like extending network lifetime due to sensor nodes having limited power supplies. Extending WSN lifetime is complicated because nodes often experience differential power consumption. For example, nodes closer to the sink in a given routing topology transmit more data and thus consume power more rapidly than nodes farther from the sink. Inspired by the huddling behavior of emperor penguins where the penguins take turns on the cold extremities of a penguin �huddle�, we propose mobile node rotation, a new method for using low-cost mobile sensor nodes to address differential power consumption and extend WSN lifetime. Specifically, we propose to rotate the nodes through the high power consumption locations. We propose efficient algorithms for single and multiple rounds of rotations
    corecore