69,595 research outputs found

    TSEP: Threshold-sensitive Stable Election Protocol for WSNs

    Full text link
    Wireless Sensor Networks (WSNs) are expected to find wide applicability and increasing deployment in near future. In this paper, we propose a new protocol, Threshold Sensitive Stable Election Protocol (TSEP), which is reactive protocol using three levels of heterogeneity. Reactive networks, as opposed to proactive networks, respond immediately to changes in relevant parameters of interest. We evaluate performance of our protocol for a simple temperature sensing application and compare results of protocol with some other protocols LEACH, DEEC, SEP, ESEP and TEEN. And from simulation results it is observed that protocol outperforms concerning life time of sensing nodes used.Comment: 10th IEEE International Conference on Frontiers of Information Technology (FIT 12), 201

    HEER: Hybrid Energy Efficient Reactive Protocol for Wireless Sensor Networks

    Full text link
    Wireless Sensor Networks (WSNs) consist of numerous sensors which send sensed data to base station. Energy conservation is an important issue for sensor nodes as they have limited power.Many routing protocols have been proposed earlier for energy efficiency of both homogeneous and heterogeneous environments. We can prolong our stability and network lifetime by reducing our energy consumption. In this research paper, we propose a protocol designed for the characteristics of a reactive homogeneous WSNs, HEER (Hybrid Energy Efficient Reactive) protocol. In HEER, Cluster Head(CH) selection is based on the ratio of residual energy of node and average energy of network. Moreover, to conserve more energy, we introduce Hard Threshold (HT) and Soft Threshold (ST). Finally, simulations show that our protocol has not only prolonged the network lifetime but also significantly increased stability period.Comment: 2nd IEEE Saudi International Electronics, Communications and Photonics Conference (SIECPC 13), 2013, Riyadh, Saudi Arabi

    Precise Packet Loss Pattern Generation by Intentional Interference

    Get PDF
    Abstract—Intermediate-quality links often cause vulnerable connectivity in wireless sensor networks, but packet losses caused by such volatile links are not easy to trace. In order to equip link layer protocol designers with a reliable test and debugging tool, we develop a reactive interferer to generate packet loss patterns precisely. By using intentional interference to emulate parameterized lossy links with very low intrusiveness, our tool facilitates both robustness evaluation of protocols and flaw detection in protocol implementation

    Design and comparative analysis of single-path and epidemic approaches to information and energy management in wireless sensor networks

    No full text
    Intelligent energy management is a key challenge in Wireless Sensor Networks. The choice of an appropriate routing algorithm constitutes a critical factor, especially in unstructured networks where, due to their dynamic nature, a reactive routing protocol is necessary. Such networks often favour packet flooding to fulfil this need. One such algorithm is IDEALS, a technique proposed in the literature, which balances energy consumed with information delivered. This paper evaluates the use of a single-path solution with IDEALS to increase efficiency. Simulation results comparing the two approaches show that the single-path algorithm outperforms flooding in terms of energy consumption for any network size. Furthermore the benefit of IDEALS is preserved as its combination with the single-path algorithm maximises information throughput

    Performance Analysis of On-Demand Routing Protocols in Wireless Mesh Networks

    Get PDF
    Wireless Mesh Networks (WMNs) have recently gained a lot of popularity due to their rapid deployment and instant communication capabilities. WMNs are dynamically self-organizing, self-configuring and self-healing with the nodes in the network automatically establishing an adiej hoc network and preserving the mesh connectivity. Designing a routing protocol for WMNs requires several aspects to consider, such as wireless networks, fixed applications, mobile applications, scalability, better performance metrics, efficient routing within infrastructure, load balancing, throughput enhancement, interference, robustness etc. To support communication, various routing protocols are designed for various networks (e.g. ad hoc, sensor, wired etc.). However, all these protocols are not suitable for WMNs, because of the architectural differences among the networks. In this paper, a detailed simulation based performance study and analysis is performed on the reactive routing protocols to verify the suitability of these protocols over such kind of networks. Ad Hoc On-Demand Distance Vector (AODV), Dynamic Source Routing (DSR) and Dynamic MANET On-demand (DYMO) routing protocol are considered as the representative of reactive routing protocols. The performance differentials are investigated using varying traffic load and number of source. Based on the simulation results, how the performance of each protocol can be improved is also recommended.Wireless Mesh Networks (WMNs), IEEE 802.11s, AODV, DSR, DYMO

    Maximize resource utilization based channel access model with presence of reactive jammer for underwater wireless sensor network

    Get PDF
    Underwater sensor networks (UWSNs) are vulnerable to jamming attacks. Especially, reactive jamming which emerged as a greatest security threat to UWSNs. Reactive jammer are difficult to be removed, defended and identified. Since reactive jammer can control and regulate (i.e., the duration of the jam signal) the probability of jamming for maintaining high vulnerability with low detection probability. The existing model are generally designed considering terrestrial wireless sensor networks (TWSNs). Further, these models are limited in their ability to detect jamming correctly, distinguish between the corrupted and uncorrupted parts of a packet, and be adaptive with the dynamic environment. Cooperative jamming model has presented in recent times to utilize resource efficiently. However, very limited work is carried out using cooperative jamming detection. For overcoming research challenges, this work present Maximize Resource Utilization based Channel Access (MRUCA). The MRUCA uses cross layer design for mitigating reactive jammer (i.e., MRUCA jointly optimizes the cooperative hopping probabilities and channel accessibility probabilities of authenticated sensor device). Along with channel, load capacity of authenticated sensor device is estimated to utilize (maximize) resource efficiently. Experiment outcome shows the proposed MRUCA model attain superior performance than state-of-art model in terms of packet transmission, BER and Detection rate

    Distributed Time-Frequency Division Multiple Access Protocol For Wireless Sensor Networks

    Get PDF
    It is well known that biology-inspired self-maintaining algorithms in wireless sensor nodes achieve near optimum time division multiple access (TDMA) characteristics in a decentralized manner and with very low complexity. We extend such distributed TDMA approaches to multiple channels (frequencies). This is achieved by extending the concept of collaborative reactive listening in order to balance the number of nodes in all available channels. We prove the stability of the new protocol and estimate the delay until the balanced system state is reached. Our approach is benchmarked against single-channel distributed TDMA and channel hopping approaches using TinyOS imote2 wireless sensors.Comment: 4 pages, IEEE Wireless Communications Letters, to appear in 201
    • …
    corecore