1,810 research outputs found

    Enhanced VGDRA for Dynamic WSN

    Get PDF
    Sensor Nodes are fundamental blocks of Wireless Sensor Networks. The focus of researchers is still on reducing the energy dissipation by the sensor nodes over time. Sensor nodes once deployed have a fixed amount of energy available to them. In order to use the energy efficiently the sensor nodes are grouped together based on the tasks performed by them. These groups of sensor nodes are known as clusters. Each cluster is headed by a cluster head connecting the cluster with the base station. Energy consumption is directly proportional to the distance from the base station. The concept of network lifetime is closely related to the energy consumption and area coverage in wireless sensor network. The main aim of the proposed technique is to select cluster heads in such a way that they extend the network lifetime and increase throughput of the network. The efficiency of the proposed cluster head selection technique is that it covers energy consumption and routes selection for data delivery from sensor node to the base station. In this paper an Enhanced Virtual Grid-based Dynamic Routes Adjustment Scheme is proposed presenting a set of rules for the selection of cluster heads in such a way that the energy consumption by the cluster heads is balanced throughout the network and it does not get over exploited

    A Review on Proposed Implementation of VGDRA and its Comparative Analysis.

    Get PDF
    Recently, a virtual Grid-based dynamic routes adjustment scheme for mobile sink-based wireless sensor networks is introduced. This paper presents the proposed implementation of VGDRA and its comparative analysis, in which we are discussing the approach of efficient data delivery using communication of distance priority i.e. avoiding straight line communication which was used in previous VGDRA scheme. While maintaining nearly optimal routes to mobile sink’s latest location, our scheme aims to minimize the routes reconstruction cost of sensor nodes. In this approach energy model for reducing energy consumption of nodes is used, which will improves lifetime and also reduce cost consumption. DOI: 10.17762/ijritcc2321-8169.150614

    Powerful mobile nodes for enhancing wireless sensor networks\u27 security and lifetime

    Get PDF
    To maintain the proper functioning of critical applications based on Wireless Sensor Networks, we must provide an acceptable level of security while taking into account limited capabilities of the sensors. In this paper we proposed a mobile approach to secure data exchanged by structured nodes in cluster. The approach is based on mobile nodes with significant calculation and energy resources that allow cryptographic key management and periodic rekeying. However, mobility in wireless sensor networks aims to increase the security and lifetime of the entire network. The technical methods used in this paper are based on cryptography elliptic curves and key management through a balanced binary tree. To compare the performance of the proposed approach with other mobile algorithms, we focused on the following metrics: the energy consumed by normal sensors and cluster heads, the number of packets exchanged during key installation, time to generate and distribute cryptographic keys, and the memory used by the different sensors to store keys

    IETF standardization in the field of the Internet of Things (IoT): a survey

    Get PDF
    Smart embedded objects will become an important part of what is called the Internet of Things. However, the integration of embedded devices into the Internet introduces several challenges, since many of the existing Internet technologies and protocols were not designed for this class of devices. In the past few years, there have been many efforts to enable the extension of Internet technologies to constrained devices. Initially, this resulted in proprietary protocols and architectures. Later, the integration of constrained devices into the Internet was embraced by IETF, moving towards standardized IP-based protocols. In this paper, we will briefly review the history of integrating constrained devices into the Internet, followed by an extensive overview of IETF standardization work in the 6LoWPAN, ROLL and CoRE working groups. This is complemented with a broad overview of related research results that illustrate how this work can be extended or used to tackle other problems and with a discussion on open issues and challenges. As such the aim of this paper is twofold: apart from giving readers solid insights in IETF standardization work on the Internet of Things, it also aims to encourage readers to further explore the world of Internet-connected objects, pointing to future research opportunities
    • …
    corecore