Wireless Micro-Sensor Network Models

IOSR Journals
IOSR JournalsInternational Organization of Scientific Research (IOSR)

IOSR Journal of Computer Engineering (IOSRJCE)

IOSR Journal of Computer Engineering (IOSRJCE)
ISSN: 2278-0661, ISBN: 2278-8727 Volume 6, Issue 3 (Sep-Oct. 2012), PP 09-14
www.iosrjournals.org
www.iosrjournals.org 9 | Page
Wireless Micro-Sensor Network Models
Ms. Swapnali S. Maske1
, Mrs. Tejaswini A. Pawar2
1
Department of Information Technology, BVCOE, Shivaji University, Kolhapur, India.
2
Department of Computer Science and Engineering, BVCOE, Shivaji University, Kolhapur, India.
Abstract: Wireless sensor network is important in sensing, Collecting and disseminating information about
environmental Phenomenon. This paper contain emerging field to classify wireless micro sensor network
according to different communication functions, data delivery models and network dynamics. This taxonomy
will aid in defining appropriate communication infra structure for diff. sensor network application subspaces. It
allows network designer to choose the Protocol architecture. According to their application this taxonomy will
enable new sensor network models to define for use in further research in this area. The overall communication
behavior in a wireless micro sensor Network is application driven. It is useful to decouple the application
communication used for information dissemination from the infrastructure communication used to configure
and optimize the Network. This separation will aid network designers in selecting the appropriate sensor
network architecture that will best match the characteristics of the communication traffic of a given application.
This will allow the network protocol to achieve the application-specific goals of energy-efficiency, low latency,
and high accuracy in the sensing application. We also believe that a sensor-initiated proactive path recovery
approach with local patching will be beneficial in efficient information dissemination in wireless micro-sensor
networks. The taxonomy presented will be helpful in designing and evaluating future network protocols for
wireless micro-sensor networks. Often, it is possible to implement a sensor network for a specific phenomenon
in a number of different ways. Consider the problem of monitoring a tornado. One option would be to fly
airplanes to sense the tornado (mobile phenomenon; mobile sensors; continuous data delivery). Another would
be to have a sensor grid statically placed on the ground and report data as the tornado passes through (mobile
phenomenon; static sensors; continuous data delivery). Yet another would be to release lightweight sensors into
the tornado (static phenomenon; mobile sensors; Continuous data delivery).
I. Introduction
Development in hardware and wireless network technology introduce a new area were small wireless
devices will provide access to information any time, anywhere as well as actively participate in creating smart
environment. Sensor networks hold the promise of revolutionizing sensing a wide range of application domains.
This is because of their reliability, accuracy, flexibility, cast -effectiveness and case of development. Sensor are
rapidly deployed in remote inhospitable area for a surveillance application sensors are used to analyze the
motion of a tornado; Sensors are used in forest for fire detection; sensors are attached to tool cabs in a large
metropolitan area to study the traffic conditions and plan routes effectively. There is wide range of applications
for sensor network with differing requirements. In report the classification wireless micro-sensor networks from
a communication protocol perspective, I look at characteristic and goals of typical micro-sensor network as well
as different types of communication that required achieving their goals.
The remaining report is organized as Chapter 2 contains Performance Metrics of Sensor Network.
Chapter 3 contains Architecture of Sensor Network. Chapter 4 contains The Data Delivery Models. Chapter 5
contains the Network Dynamic Models for Sensor Network. Chapter 6 contains Some Network Protocol,
Following are the terminologies used in the report.
1.1 Sensor
The device that implements the physical sensing of environmental phenomena and reporting of
measurements (through wireless communication). Typically it consists of five Components-sensing hardware,
memory battery, embedded processor, and trance-receiver [1]. The basic sensor network is shown in Figure 1.1.
Wireless Micro-Sensor Network Models
www.iosrjournals.org 10 | Page
Fig. 1.1 The basic sensor network
1.2 Observer
The end user interested in obtaining information disseminated by the sensor network about the
phenomena.
The observer may indicate interests (or queries) to the network and receive response to these queries [2].
1.3 Phenomenon
The entity of interest to the observer that is being served and optionally analyzed/filtered the sensor
networks. There may be multiple phenomena under observation concurrently in the same network.
While monitoring the phenomena some latency and accuracy must be restricted. In a typical sensor network
individuals sensor serve the local values and disseminate information to other sensors and to the observer.
Sensors network shares many challenges of traditional wireless network. This include limited energy available
to each node band width-limited, error-prone channel communication in sensor network is end-to-end. The
function of network is to repeat information about phenomenon to observer. The observer not necessarily aware
of the sensor networks infrastructure and individual sensor as end point communication.
II. Performance Metrics
Following are the metrics to evaluate sensor network protocols.
2.1 Energy Efficient
As sensor nodes are battery operated, protocols must be energy efficient or maximize system lifetime
2.2 Scalability
It is also a critical footer for large-scale network it is likely that locating interactions through hierarchy and
aggregation will be critical for ensuring scalability.
2.3 System Lifetime
System lifetime is the time until half of nodes die or by application directed metrics such as when the network
stop providing the application with desired information about phenomena.
2.4 Latency
The observer is interested in knowing about the phenomena within a given delay. The precise semantics of
latency are application dependent.
2.5 Accuracy
Primary object of observer is to obtain the accurate information, where accuracy is determined by given
application. The given infrastructure should be adaptive that the application obtain desired accuracy and latency
with minimum energy used.
2.6 Fault tolerance
Due to surrounding physical conditions the sensor may fail, or also fails because of their energy ran out. This is
difficult to replace the existing sensor, so the network is fault tolerance so that actual network condition is
transparent to given application.
Wireless Micro-Sensor Network Models
www.iosrjournals.org 11 | Page
II. Sensor Network Architecture
A Sensor network is a tool for measuring and relaying information about the phenomena to the
observer within the desired performance bond and deployment cost.
The organization of the network as shown in following Figure 3.1
Fig. 3.1 Sensor network architecture
3.1 Infrastructure
The infrastructure consist of the sensor and their deployment status [2], more precisely it consist of
characteristics of sensor e.g. sensing accuracy, memory size, battery life, transmission ranges and deployment
strategy (e.g. sensor density, sensor location and mobility.)
3.2 Network Protocols
The network protocol is responsible creating paths and accomplishing communication between the sensors and
observation.
3.3 Application / Observer
The observer interest queries about the phenomenon as approximated by distributed data that the sensor is
capable of serving.
These queries could be static or dynamic. The translation of data could be done by the application
software at the observer and /or the sensor nodes or directed by human observer.
The network protocol in a sensor network is responsible for all communication both among sensors as well as
between the sensors and observer.
In order to determine how the network protocol behaves for diff. scenario’s, it is important to classify their
feature. In next session different types of communication required in sensor network.
3.4 Communication models
The communication within a sensor network can be classified in to two-category application and
infrastructure [1].
Application communication relates to the transfer of sensor data with the goal of informing the observer
about the phenomena within application communication, there are two modes co-operative and non co-
operative.
Non co-operative sensors do not cooperate at the application revel for information transfer.
The extreme case will be when no sensor communication with its neighbors. All sensors were independently.
Co-operative sensors might be required to communicate with its neighbor s either periodically or after the
occurrence of specific event.
Infrastructure communication refers to the communication needed to configure, maintain and optimize
operation. The infrastructure communication is needed to keep the network functional ensure robust operation
in dynamic environment as well as optimize overall performance.
A sensor network requires both the application and infrastructure communication. In static sensor networks an
initial phase of infrastructure communion is needed to set up the networks furthermore, if the sensors are
mobile, additional communications needed for path discovery/ reconfiguration.
III. Data Delievery Models
Sensor networks can be classified in terms of data delivery models required by applications (observer)
interest as
1.Continues
2. Event driven
3.Observer initiated
4. Hybrid
4.1 Continues
Wireless Micro-Sensor Network Models
www.iosrjournals.org 12 | Page
In the Continues models the sensor communicates their data continuously at a pre-specified rate [1] [2].
Clustering is the most efficient for static networks where data is continuously transmitted.
4.2 Event Driven
In the event driven data models the sensors reporting information only if an event of interest occurs,
here observer is interested in the occurrence of a specific phenomenon or a set of phenomenon [1] [2].
4.3 Observer Initiated
In the observer initiated (or request reply) model the sensors only report their results in response to an explicit
request from the observer (either directly, or indirectly through other sensors)
4.4 Hybrid
Hybrid models are one where the above three approaches can co exists in the network.
In this way we have only classify the data delivery from the application perspective. For any of the above
models the communication approaches can be classified as 1. Flooding (Broadcast based) 2. Unicast 3.
Multicast. In flooding approach sensor broadcast information in neighboring node and it rebroadcast this data
until reaches to the observer.
IV. Network Dynamics Models
A path is formed between phenomena and the observer by a sensor network the sensor network
protocol creates and maintains this path (or multiple paths) under dynamic condition while meeting the
application requirements of low energy, low latency, high accuracy and fault tolerance.
There are several approaches to construct and maintain path between the observer and the
phenomenon. They are classified as static sensor network and mobile / dynamic sensor network, the important
point is mobility because it is most common source of dynamic conditions other source includes sensors failure
and change in observer interest.
5.1 Static Sensor Network
There is no motion among communication sensors, the observer and the phenomenon. An example is a
group of sensors spread for temperature sensing.
In this type of network, sensor nodes requires an initial one time setup infrastructure communication to create
the path between the observer and the sensors with the remaining traffic exclusively application
communication.
5.2 Dynamic Sensors Network
In dynamic sensor network, either the sensors themselves, the observer or the phenomenon are mobile,
whenever a phenomenon associated with sensors moves, the path between observer and phenomenon get failed,
in such situation either observer or the sensor must rebuild a new path. There are two types of rebuilding of new
paths between observer and sensors.
The first approaches is observer-initiated approach, in this case during initial setup the observer can
build multiple paths between itself and the phenomenon. The observer can use the most beneficial path, if path
fails another path can be used, if all paths fail, the observer must rebuild new paths. This observer initiated
approach is a reactive approach where path recovery action is only taken after observe a broken path [1] [2].
Another approach is sensor-initiated approach. In sensor initiated path recovery procedure, path recovery is
initiated by a sensor that is currently a part of logical path between the observer & the phenomenon. It is
planning to move out of range. The sensors perform some local patching by broadcasting a participation request
to neighboring sensor for given logical flow to build a new path. If any sensor sends participation reply message
then the new path is build, if none of sensor reply then sensor can default to sending a path invalidation request
to the observation so that the observer can start building the path.
Dynamic sensor networks can be further classified by considering the motion of the components. This
motion is important. Each of following requires different infrastructure; data delivery models and protocols
5.2.1 Mobile observer
In this case the observer is mobile with respect to the sensors and phenomena. An example of this
paradigm is sensors deployed in an inhospitable area for environment monitoring. For example, a plane might
fly over a field periodically to collect information from a sensor network. Thus the observer, in the plane, is
moving relative to the sensors and phenomena on the ground.
Wireless Micro-Sensor Network Models
www.iosrjournals.org 13 | Page
Fig. 5.2.1 Mobile observer
5.2.2 Mobile sensors
In this case, the sensors are moving with respect to each other and the observer. For example, consider
traffic monitoring implemented by attaching sensors to taxis. As the taxis move, the attached sensors
continuously communicate with each other about their own observations of the traffic conditions. If the sensors
are co-operative, the communication paradigm imposes additional constraints such as detecting the link layer
addresses of the neighbors and constructing localization and in formation dissemination structures. We know
that the overhead of maintaining a globally unique sensor ID in a hierarchical fashion like an IP address is
expensive and not needed. Instead, these sensors should communicate only with their neighbors with the link
layer MAC address. In such networks, the above-mentioned proactive algorithm with local patching for
repairing a path can be used so that the information about the phenomenon is always available to the observer
regardless of the Mobility of the individual sensors.
Fig. 5.2.2 Mobile sensor
5.2.3 Mobile Phenomena
In this case, the phenomenon itself is moving. A typical example of this paradigm is sensors deployed
for animal detection. In this case the infrastructure level communication should be event-driven. Depending on
the density of the phenomena, it will be inefficient if all the sensor nodes are active all the time. Only the
sensors in the vicinity of the mobile phenomenon need to be active. The number of active sensors in the vicinity
of the phenomenon can be determined by application specific goals such as accuracy, latency, and energy
efficiency.
Fig 5.2.3 Mobile phenomenon
V. Overview Of Some Network Protocols
In this section we consider several existing protocols for sensor networks and analyze them in the
context of our taxonomy.
Wireless Micro-Sensor Network Models
www.iosrjournals.org 14 | Page
6.1 Ad Hoc Routing Protocol
Ad hoc routing protocols may be used as the network protocol for sensor networks [2]. However, such
protocols will generally not be good candidates for sensor networks because of the following reasons:
(i) Sensors have low battery power and low available memory;
(ii) The routing table size scales with the network size;
(iii) These networks are designed for end-to-end communication and react inappropriately to mobility;
(iv) Their addressing requirements may be inappropriate for sensor networks;
(v) Ad hoc routing protocols do not support cooperative dissemination;
As ad hoc routing protocols do not inherently support data aggregation or fusion, they will not perform well in
sensor network applications.
6.2 LEACH
LE
ACH is an energy efficient protocol for sensor networks designed for sensor networks with continuous data
delivery mechanism and no mobility [2]. LEACH uses a clustering architecture where member nodes send their
data to the local cluster-head. Cluster-heads aggregate the data from each sensor and then send this information
to the observer node. LEACH uses rotation of the cluster head in order to evenly distribute the energy load.
Once clusters are formed, cluster members use TDMA to communicate with the cluster-head. Thus LEACH is
suitable for networks where every node has data to send at regular intervals. However, it needs to be extended
for event driven models as well as for mobile sensors.
6.3 Direct Diffusion
Directed Diffusion (DD) is a data-centric protocol, where nodes are not addressed by their addresses
but by the data they sense [2]. Attribute-value pairs name data. In directed diffusion observer nodes express the
interest in term of a query, which diffuses through the network using local interactions. Once a sensor node that
satisfies the query (source node) is reached, that node starts transmitting data to the sink node, again using local
interactions. The absence of a notion of a global id (e.g., IP address) makes directed diffusion efficient for
networks with mobility as well. Directed diffusion is applicable for Event-driven and query-driven networks as
defined in our taxonomy.
VI. Conclusion
The overall communication behavior in a wireless micro sensor Network is application driven. It is
useful to decouple the application communication used for information dissemination from the infrastructure
communication used to configure and optimize the Network. This separation will aid network designers in
selecting the appropriate sensor network architecture that will best match the characteristics of the
communication traffic of a given application.
This will allow the network protocol to achieve the application-specific goals of energy-efficiency, low latency,
and high accuracy in the sensing application. We also believe that a sensor-initiated proactive path recovery
approach with local patching will be beneficial in efficient information dissemination in wireless micro-sensor
networks.
The taxonomy presented will be helpful in designing and evaluating future network protocols for
wireless micro-sensor networks.
Often, it is possible to implement a sensor network for a specific phenomenon in a number of different
ways. Consider the problem of monitoring a tornado. One option would be to fly airplanes to sense the tornado
(mobile phenomenon; mobile sensors; continuous data delivery). Another would be to have a sensor grid
statically placed on the ground and report data as the tornado passes through (mobile phenomenon; static
sensors; continuous data delivery). Yet another would be to release lightweight sensors into the tornado (static
phenomenon; mobile sensors; Continuous data delivery).
The accuracy is a function of the sensing technology of the sensors and their distance from the
phenomenon. However, since the performance is measured at the observer end, it is also a function of the
performance of the communication model. We hope that this taxonomy will assist in developing relevant
simulation models to enable empirical study of the performance of the different sensor network organizations
and assist in making design and deployment decisions.
References
[1] Sameer Tilak, Nael B, Abu-Ghazaleh and Wendi Heizelmn,”A Taxonomy of Wireless Micro Sensor Network Models”,
[2] Sameer Tilak, Nael B, Abu-Ghazaleh and Wendi Heizelmn ,” The Updatesd A Taxonomy of Wireless Micro Sensor Network
Models”,ACM And Mobile Computing Review, April 2002,Volume 1,Number 2.

Recomendados

574 501-507 por
574 501-507574 501-507
574 501-507idescitation
382 visualizações7 slides
file4.pdf por
file4.pdffile4.pdf
file4.pdfRajShah860705
67 visualizações5 slides
9345.pdf por
9345.pdf9345.pdf
9345.pdfRajShah860705
42 visualizações4 slides
Some aspects of wireless sensor networks por
Some aspects of wireless sensor networksSome aspects of wireless sensor networks
Some aspects of wireless sensor networkspijans
418 visualizações10 slides
wireless sensor network por
wireless sensor networkwireless sensor network
wireless sensor networkDeepaDasarathan
729 visualizações25 slides
International Journal of Computational Engineering Research(IJCER) por
International Journal of Computational Engineering Research(IJCER) International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER) ijceronline
455 visualizações5 slides

Mais conteúdo relacionado

Mais procurados

WIRELESS SENSOR NETWORK por
WIRELESS SENSOR NETWORKWIRELESS SENSOR NETWORK
WIRELESS SENSOR NETWORKTejas Wasule
14.7K visualizações21 slides
L010527175 por
L010527175L010527175
L010527175IOSR Journals
188 visualizações5 slides
A Review on - Comparative Study of Issues in Cellular, Sensor and Adhoc Networks por
A Review on - Comparative Study of Issues in Cellular, Sensor and Adhoc NetworksA Review on - Comparative Study of Issues in Cellular, Sensor and Adhoc Networks
A Review on - Comparative Study of Issues in Cellular, Sensor and Adhoc Networkscscpconf
66 visualizações7 slides
Secure and Efficient DiDrip Protocol for Improving Performance of WSNs por
Secure and Efficient DiDrip Protocol for Improving Performance of WSNsSecure and Efficient DiDrip Protocol for Improving Performance of WSNs
Secure and Efficient DiDrip Protocol for Improving Performance of WSNsINFOGAIN PUBLICATION
50 visualizações6 slides
Multi-Tiered Communication Security Schemes in Wireless Ad-Hoc Sensor Networks por
Multi-Tiered Communication Security Schemes in Wireless Ad-Hoc Sensor NetworksMulti-Tiered Communication Security Schemes in Wireless Ad-Hoc Sensor Networks
Multi-Tiered Communication Security Schemes in Wireless Ad-Hoc Sensor NetworksIDES Editor
442 visualizações6 slides
An Efficient Security Way of Authentication and Pair wise Key Distribution wi... por
An Efficient Security Way of Authentication and Pair wise Key Distribution wi...An Efficient Security Way of Authentication and Pair wise Key Distribution wi...
An Efficient Security Way of Authentication and Pair wise Key Distribution wi...IJMER
2K visualizações10 slides

Mais procurados(20)

WIRELESS SENSOR NETWORK por Tejas Wasule
WIRELESS SENSOR NETWORKWIRELESS SENSOR NETWORK
WIRELESS SENSOR NETWORK
Tejas Wasule14.7K visualizações
L010527175 por IOSR Journals
L010527175L010527175
L010527175
IOSR Journals188 visualizações
A Review on - Comparative Study of Issues in Cellular, Sensor and Adhoc Networks por cscpconf
A Review on - Comparative Study of Issues in Cellular, Sensor and Adhoc NetworksA Review on - Comparative Study of Issues in Cellular, Sensor and Adhoc Networks
A Review on - Comparative Study of Issues in Cellular, Sensor and Adhoc Networks
cscpconf66 visualizações
Secure and Efficient DiDrip Protocol for Improving Performance of WSNs por INFOGAIN PUBLICATION
Secure and Efficient DiDrip Protocol for Improving Performance of WSNsSecure and Efficient DiDrip Protocol for Improving Performance of WSNs
Secure and Efficient DiDrip Protocol for Improving Performance of WSNs
INFOGAIN PUBLICATION50 visualizações
Multi-Tiered Communication Security Schemes in Wireless Ad-Hoc Sensor Networks por IDES Editor
Multi-Tiered Communication Security Schemes in Wireless Ad-Hoc Sensor NetworksMulti-Tiered Communication Security Schemes in Wireless Ad-Hoc Sensor Networks
Multi-Tiered Communication Security Schemes in Wireless Ad-Hoc Sensor Networks
IDES Editor442 visualizações
An Efficient Security Way of Authentication and Pair wise Key Distribution wi... por IJMER
An Efficient Security Way of Authentication and Pair wise Key Distribution wi...An Efficient Security Way of Authentication and Pair wise Key Distribution wi...
An Efficient Security Way of Authentication and Pair wise Key Distribution wi...
IJMER2K visualizações
WSN IN IOT por skumartarget
WSN IN IOTWSN IN IOT
WSN IN IOT
skumartarget21.5K visualizações
Basics of Wireless sensor networks por Rushin Shah
Basics of Wireless sensor networksBasics of Wireless sensor networks
Basics of Wireless sensor networks
Rushin Shah26K visualizações
SURVEY ON MOBILE AD HOC NETWORK por IAEME Publication
SURVEY ON MOBILE AD HOC NETWORKSURVEY ON MOBILE AD HOC NETWORK
SURVEY ON MOBILE AD HOC NETWORK
IAEME Publication180 visualizações
A SURVEY OF ENERGY-EFFICIENT COMMUNICATION PROTOCOLS IN WSN por IAEME Publication
A SURVEY OF ENERGY-EFFICIENT COMMUNICATION PROTOCOLS IN WSNA SURVEY OF ENERGY-EFFICIENT COMMUNICATION PROTOCOLS IN WSN
A SURVEY OF ENERGY-EFFICIENT COMMUNICATION PROTOCOLS IN WSN
IAEME Publication276 visualizações
02 1 nov17 28apr17 6333 17460-1-ed edit iqbal por IAESIJEECS
02 1 nov17 28apr17 6333 17460-1-ed edit iqbal02 1 nov17 28apr17 6333 17460-1-ed edit iqbal
02 1 nov17 28apr17 6333 17460-1-ed edit iqbal
IAESIJEECS17 visualizações
Node Deployment in Homogeneous and Heterogeneous Wireless Sensor Network por IJMTST Journal
Node Deployment in Homogeneous and Heterogeneous Wireless Sensor NetworkNode Deployment in Homogeneous and Heterogeneous Wireless Sensor Network
Node Deployment in Homogeneous and Heterogeneous Wireless Sensor Network
IJMTST Journal60 visualizações
ENHANCED THREE TIER SECURITY ARCHITECTURE FOR WSN AGAINST MOBILE SINK REPLI... por ijwmn
ENHANCED THREE TIER SECURITY  ARCHITECTURE FOR WSN AGAINST MOBILE SINK  REPLI...ENHANCED THREE TIER SECURITY  ARCHITECTURE FOR WSN AGAINST MOBILE SINK  REPLI...
ENHANCED THREE TIER SECURITY ARCHITECTURE FOR WSN AGAINST MOBILE SINK REPLI...
ijwmn502 visualizações
Wireless Sensor Network Simulators: A Survey and Comparisons por CSCJournals
Wireless Sensor Network Simulators: A Survey and ComparisonsWireless Sensor Network Simulators: A Survey and Comparisons
Wireless Sensor Network Simulators: A Survey and Comparisons
CSCJournals363 visualizações
Fault Diagonosis Approach for WSN using Normal Bias Technique por IDES Editor
Fault Diagonosis Approach for WSN using Normal Bias TechniqueFault Diagonosis Approach for WSN using Normal Bias Technique
Fault Diagonosis Approach for WSN using Normal Bias Technique
IDES Editor682 visualizações
Optimal Operating Performances of Wireless Protocols for Intelligent Sensors ... por chokrio
Optimal Operating Performances of Wireless Protocols for Intelligent Sensors ...Optimal Operating Performances of Wireless Protocols for Intelligent Sensors ...
Optimal Operating Performances of Wireless Protocols for Intelligent Sensors ...
chokrio1.2K visualizações
A0320105 por iosrjournals
A0320105A0320105
A0320105
iosrjournals398 visualizações
Ijnsa050204 por IJNSA Journal
Ijnsa050204Ijnsa050204
Ijnsa050204
IJNSA Journal913 visualizações
A Security Framework for Replication Attacks in Wireless Sensor Networks por IJMER
A Security Framework for Replication Attacks in Wireless Sensor NetworksA Security Framework for Replication Attacks in Wireless Sensor Networks
A Security Framework for Replication Attacks in Wireless Sensor Networks
IJMER491 visualizações
A NOVEL SECURITY PROTOCOL FOR WIRELESS SENSOR NETWORKS BASED ON ELLIPTIC CURV... por IJCNCJournal
A NOVEL SECURITY PROTOCOL FOR WIRELESS SENSOR NETWORKS BASED ON ELLIPTIC CURV...A NOVEL SECURITY PROTOCOL FOR WIRELESS SENSOR NETWORKS BASED ON ELLIPTIC CURV...
A NOVEL SECURITY PROTOCOL FOR WIRELESS SENSOR NETWORKS BASED ON ELLIPTIC CURV...
IJCNCJournal38 visualizações

Destaque

Development Of GUI Based Programme For Thermal Characterisation And Life Expe... por
Development Of GUI Based Programme For Thermal Characterisation And Life Expe...Development Of GUI Based Programme For Thermal Characterisation And Life Expe...
Development Of GUI Based Programme For Thermal Characterisation And Life Expe...IOSR Journals
503 visualizações8 slides
Custom keys por
Custom keysCustom keys
Custom keyssupernovaqp
245 visualizações138 slides
Chaos Based Direct Public Verifiable Signcryption Scheme por
Chaos Based Direct Public Verifiable Signcryption SchemeChaos Based Direct Public Verifiable Signcryption Scheme
Chaos Based Direct Public Verifiable Signcryption SchemeIOSR Journals
360 visualizações7 slides
Secondary Distribution for Grid Interconnected Nine-level Inverter using PV s... por
Secondary Distribution for Grid Interconnected Nine-level Inverter using PV s...Secondary Distribution for Grid Interconnected Nine-level Inverter using PV s...
Secondary Distribution for Grid Interconnected Nine-level Inverter using PV s...IOSR Journals
948 visualizações8 slides
Behavioral Analysis of Second Order Sigma-Delta Modulator for Low frequency A... por
Behavioral Analysis of Second Order Sigma-Delta Modulator for Low frequency A...Behavioral Analysis of Second Order Sigma-Delta Modulator for Low frequency A...
Behavioral Analysis of Second Order Sigma-Delta Modulator for Low frequency A...IOSR Journals
606 visualizações9 slides
Detection of Cancer in Pap smear Cytological Images Using Bag of Texture Feat... por
Detection of Cancer in Pap smear Cytological Images Using Bag of Texture Feat...Detection of Cancer in Pap smear Cytological Images Using Bag of Texture Feat...
Detection of Cancer in Pap smear Cytological Images Using Bag of Texture Feat...IOSR Journals
242 visualizações7 slides

Destaque(20)

Development Of GUI Based Programme For Thermal Characterisation And Life Expe... por IOSR Journals
Development Of GUI Based Programme For Thermal Characterisation And Life Expe...Development Of GUI Based Programme For Thermal Characterisation And Life Expe...
Development Of GUI Based Programme For Thermal Characterisation And Life Expe...
IOSR Journals503 visualizações
Custom keys por supernovaqp
Custom keysCustom keys
Custom keys
supernovaqp245 visualizações
Chaos Based Direct Public Verifiable Signcryption Scheme por IOSR Journals
Chaos Based Direct Public Verifiable Signcryption SchemeChaos Based Direct Public Verifiable Signcryption Scheme
Chaos Based Direct Public Verifiable Signcryption Scheme
IOSR Journals360 visualizações
Secondary Distribution for Grid Interconnected Nine-level Inverter using PV s... por IOSR Journals
Secondary Distribution for Grid Interconnected Nine-level Inverter using PV s...Secondary Distribution for Grid Interconnected Nine-level Inverter using PV s...
Secondary Distribution for Grid Interconnected Nine-level Inverter using PV s...
IOSR Journals948 visualizações
Behavioral Analysis of Second Order Sigma-Delta Modulator for Low frequency A... por IOSR Journals
Behavioral Analysis of Second Order Sigma-Delta Modulator for Low frequency A...Behavioral Analysis of Second Order Sigma-Delta Modulator for Low frequency A...
Behavioral Analysis of Second Order Sigma-Delta Modulator for Low frequency A...
IOSR Journals606 visualizações
Detection of Cancer in Pap smear Cytological Images Using Bag of Texture Feat... por IOSR Journals
Detection of Cancer in Pap smear Cytological Images Using Bag of Texture Feat...Detection of Cancer in Pap smear Cytological Images Using Bag of Texture Feat...
Detection of Cancer in Pap smear Cytological Images Using Bag of Texture Feat...
IOSR Journals242 visualizações
An Approach to Improve Brain Disorder Using Machine Learning Techniques por IOSR Journals
An Approach to Improve Brain Disorder Using Machine Learning TechniquesAn Approach to Improve Brain Disorder Using Machine Learning Techniques
An Approach to Improve Brain Disorder Using Machine Learning Techniques
IOSR Journals541 visualizações
B0451217 por IOSR Journals
B0451217B0451217
B0451217
IOSR Journals468 visualizações
Network Lifespan Maximization For Wireless Sensor Networks Using Nature-Inspi... por IOSR Journals
Network Lifespan Maximization For Wireless Sensor Networks Using Nature-Inspi...Network Lifespan Maximization For Wireless Sensor Networks Using Nature-Inspi...
Network Lifespan Maximization For Wireless Sensor Networks Using Nature-Inspi...
IOSR Journals890 visualizações
Tracking your emails with mailtracking.com por believe52
Tracking your emails with mailtracking.comTracking your emails with mailtracking.com
Tracking your emails with mailtracking.com
believe5258 visualizações
Analysis of Rate Based Congestion Control Algorithms in Wireless Technologies por IOSR Journals
Analysis of Rate Based Congestion Control Algorithms in Wireless TechnologiesAnalysis of Rate Based Congestion Control Algorithms in Wireless Technologies
Analysis of Rate Based Congestion Control Algorithms in Wireless Technologies
IOSR Journals550 visualizações
An Application Jeevan – Kushalaiah Method to Find Lagrangian Multiplier in Ec... por IOSR Journals
An Application Jeevan – Kushalaiah Method to Find Lagrangian Multiplier in Ec...An Application Jeevan – Kushalaiah Method to Find Lagrangian Multiplier in Ec...
An Application Jeevan – Kushalaiah Method to Find Lagrangian Multiplier in Ec...
IOSR Journals485 visualizações
Context Based Web Indexing For Semantic Web por IOSR Journals
Context Based Web Indexing For Semantic WebContext Based Web Indexing For Semantic Web
Context Based Web Indexing For Semantic Web
IOSR Journals528 visualizações
Transient Power Flow in Micro grids with Signal Stability Energy por IOSR Journals
Transient Power Flow in Micro grids with Signal Stability EnergyTransient Power Flow in Micro grids with Signal Stability Energy
Transient Power Flow in Micro grids with Signal Stability Energy
IOSR Journals559 visualizações
A Distinctive Scheme for Extraction of Symmetrical Components along with Harm... por IOSR Journals
A Distinctive Scheme for Extraction of Symmetrical Components along with Harm...A Distinctive Scheme for Extraction of Symmetrical Components along with Harm...
A Distinctive Scheme for Extraction of Symmetrical Components along with Harm...
IOSR Journals451 visualizações
Review paper on performance analysis of AODV, DSDV, OLSR on the basis of pack... por IOSR Journals
Review paper on performance analysis of AODV, DSDV, OLSR on the basis of pack...Review paper on performance analysis of AODV, DSDV, OLSR on the basis of pack...
Review paper on performance analysis of AODV, DSDV, OLSR on the basis of pack...
IOSR Journals238 visualizações
Energy Efficient and Secure, Trusted network discovery for Wireless Sensor Ne... por IOSR Journals
Energy Efficient and Secure, Trusted network discovery for Wireless Sensor Ne...Energy Efficient and Secure, Trusted network discovery for Wireless Sensor Ne...
Energy Efficient and Secure, Trusted network discovery for Wireless Sensor Ne...
IOSR Journals613 visualizações
Characterization of Arsenic contaminated Rice (Oryza Sativa L.) through RAPD ... por IOSR Journals
Characterization of Arsenic contaminated Rice (Oryza Sativa L.) through RAPD ...Characterization of Arsenic contaminated Rice (Oryza Sativa L.) through RAPD ...
Characterization of Arsenic contaminated Rice (Oryza Sativa L.) through RAPD ...
IOSR Journals354 visualizações
Data Classification Algorithm Using k-Nearest Neighbour Method Applied to ECG... por IOSR Journals
Data Classification Algorithm Using k-Nearest Neighbour Method Applied to ECG...Data Classification Algorithm Using k-Nearest Neighbour Method Applied to ECG...
Data Classification Algorithm Using k-Nearest Neighbour Method Applied to ECG...
IOSR Journals360 visualizações
C0941533 por IOSR Journals
C0941533C0941533
C0941533
IOSR Journals520 visualizações

Similar a Wireless Micro-Sensor Network Models

EVENT DRIVEN ROUTING PROTOCOLS FOR WIRELESS SENSOR NETWORK- A SURVEY por
EVENT DRIVEN ROUTING PROTOCOLS FOR  WIRELESS SENSOR NETWORK- A SURVEYEVENT DRIVEN ROUTING PROTOCOLS FOR  WIRELESS SENSOR NETWORK- A SURVEY
EVENT DRIVEN ROUTING PROTOCOLS FOR WIRELESS SENSOR NETWORK- A SURVEYijcsa
2K visualizações16 slides
Wireless Sensors Essay por
Wireless Sensors EssayWireless Sensors Essay
Wireless Sensors EssayRenee Franco
3 visualizações43 slides
F0361026033 por
F0361026033F0361026033
F0361026033ijceronline
343 visualizações8 slides
Comparison of Routing protocols in Wireless Sensor Networks: A Detailed Survey por
Comparison of Routing protocols in Wireless Sensor Networks: A Detailed SurveyComparison of Routing protocols in Wireless Sensor Networks: A Detailed Survey
Comparison of Routing protocols in Wireless Sensor Networks: A Detailed Surveytheijes
541 visualizações8 slides
Wireless sensor Networks.ppt por
Wireless sensor Networks.pptWireless sensor Networks.ppt
Wireless sensor Networks.pptMATRUSRI ENGINEERING COLLEGE
360 visualizações206 slides
Survey of Wireless Sensor Network Application por
Survey of Wireless Sensor Network ApplicationSurvey of Wireless Sensor Network Application
Survey of Wireless Sensor Network Applicationijsrd.com
271 visualizações5 slides

Similar a Wireless Micro-Sensor Network Models(20)

EVENT DRIVEN ROUTING PROTOCOLS FOR WIRELESS SENSOR NETWORK- A SURVEY por ijcsa
EVENT DRIVEN ROUTING PROTOCOLS FOR  WIRELESS SENSOR NETWORK- A SURVEYEVENT DRIVEN ROUTING PROTOCOLS FOR  WIRELESS SENSOR NETWORK- A SURVEY
EVENT DRIVEN ROUTING PROTOCOLS FOR WIRELESS SENSOR NETWORK- A SURVEY
ijcsa2K visualizações
Wireless Sensors Essay por Renee Franco
Wireless Sensors EssayWireless Sensors Essay
Wireless Sensors Essay
Renee Franco3 visualizações
F0361026033 por ijceronline
F0361026033F0361026033
F0361026033
ijceronline343 visualizações
Comparison of Routing protocols in Wireless Sensor Networks: A Detailed Survey por theijes
Comparison of Routing protocols in Wireless Sensor Networks: A Detailed SurveyComparison of Routing protocols in Wireless Sensor Networks: A Detailed Survey
Comparison of Routing protocols in Wireless Sensor Networks: A Detailed Survey
theijes541 visualizações
Survey of Wireless Sensor Network Application por ijsrd.com
Survey of Wireless Sensor Network ApplicationSurvey of Wireless Sensor Network Application
Survey of Wireless Sensor Network Application
ijsrd.com271 visualizações
Data Flow in Wireless Sensor Network Protocol Stack by using Bellman-Ford Rou... por journalBEEI
Data Flow in Wireless Sensor Network Protocol Stack by using Bellman-Ford Rou...Data Flow in Wireless Sensor Network Protocol Stack by using Bellman-Ford Rou...
Data Flow in Wireless Sensor Network Protocol Stack by using Bellman-Ford Rou...
journalBEEI16 visualizações
DATA TRANSMISSION IN WIRELESS SENSOR NETWORKS FOR EFFECTIVE AND SECURE COMMUN... por IJEEE
DATA TRANSMISSION IN WIRELESS SENSOR NETWORKS FOR EFFECTIVE AND SECURE COMMUN...DATA TRANSMISSION IN WIRELESS SENSOR NETWORKS FOR EFFECTIVE AND SECURE COMMUN...
DATA TRANSMISSION IN WIRELESS SENSOR NETWORKS FOR EFFECTIVE AND SECURE COMMUN...
IJEEE 336 visualizações
J0525460 por IOSR Journals
J0525460J0525460
J0525460
IOSR Journals579 visualizações
IJSRED-V1I2P12 por IJSRED
IJSRED-V1I2P12IJSRED-V1I2P12
IJSRED-V1I2P12
IJSRED13 visualizações
wireless sensor network por Pramod Kuruvatti
wireless sensor networkwireless sensor network
wireless sensor network
Pramod Kuruvatti921 visualizações
Mobility_Research_paper por Piyush Jalan
Mobility_Research_paperMobility_Research_paper
Mobility_Research_paper
Piyush Jalan210 visualizações
A Brief Research Study Of Wireless Sensor Network por Cassie Romero
A Brief Research Study Of Wireless Sensor NetworkA Brief Research Study Of Wireless Sensor Network
A Brief Research Study Of Wireless Sensor Network
Cassie Romero4 visualizações
Features of wsn and various routing techniques for wsn a survey por eSAT Publishing House
Features of wsn and various routing techniques for wsn a surveyFeatures of wsn and various routing techniques for wsn a survey
Features of wsn and various routing techniques for wsn a survey
eSAT Publishing House892 visualizações
Features of wsn and various routing techniques for wsn a survey por eSAT Journals
Features of wsn and various routing techniques for wsn     a surveyFeatures of wsn and various routing techniques for wsn     a survey
Features of wsn and various routing techniques for wsn a survey
eSAT Journals195 visualizações
Wireless Sensor Networks Are Defined As The Distribution... por Amy Alexander
Wireless Sensor Networks Are Defined As The Distribution...Wireless Sensor Networks Are Defined As The Distribution...
Wireless Sensor Networks Are Defined As The Distribution...
Amy Alexander2 visualizações
Comparative Performance Analysis of Wireless Communication Protocols for Inte... por chokrio
Comparative Performance Analysis of Wireless Communication Protocols for Inte...Comparative Performance Analysis of Wireless Communication Protocols for Inte...
Comparative Performance Analysis of Wireless Communication Protocols for Inte...
chokrio814 visualizações
Identifying Security Vulnerabilities Survey por Clayton Hatathlie
Identifying Security Vulnerabilities SurveyIdentifying Security Vulnerabilities Survey
Identifying Security Vulnerabilities Survey
Clayton Hatathlie237 visualizações
A Review on Wireless Sensor Network Security por ijtsrd
A Review on Wireless Sensor Network SecurityA Review on Wireless Sensor Network Security
A Review on Wireless Sensor Network Security
ijtsrd31 visualizações
Wireless sensor networks software architecture por Adeel Javaid
Wireless sensor networks software architectureWireless sensor networks software architecture
Wireless sensor networks software architecture
Adeel Javaid2.3K visualizações

Mais de IOSR Journals

A011140104 por
A011140104A011140104
A011140104IOSR Journals
1.2K visualizações4 slides
M0111397100 por
M0111397100M0111397100
M0111397100IOSR Journals
747 visualizações4 slides
L011138596 por
L011138596L011138596
L011138596IOSR Journals
732 visualizações12 slides
K011138084 por
K011138084K011138084
K011138084IOSR Journals
602 visualizações5 slides
J011137479 por
J011137479J011137479
J011137479IOSR Journals
603 visualizações6 slides
I011136673 por
I011136673I011136673
I011136673IOSR Journals
511 visualizações8 slides

Mais de IOSR Journals(20)

A011140104 por IOSR Journals
A011140104A011140104
A011140104
IOSR Journals1.2K visualizações
M0111397100 por IOSR Journals
M0111397100M0111397100
M0111397100
IOSR Journals747 visualizações
L011138596 por IOSR Journals
L011138596L011138596
L011138596
IOSR Journals732 visualizações
K011138084 por IOSR Journals
K011138084K011138084
K011138084
IOSR Journals602 visualizações
J011137479 por IOSR Journals
J011137479J011137479
J011137479
IOSR Journals603 visualizações
I011136673 por IOSR Journals
I011136673I011136673
I011136673
IOSR Journals511 visualizações
G011134454 por IOSR Journals
G011134454G011134454
G011134454
IOSR Journals520 visualizações
H011135565 por IOSR Journals
H011135565H011135565
H011135565
IOSR Journals299 visualizações
F011134043 por IOSR Journals
F011134043F011134043
F011134043
IOSR Journals258 visualizações
E011133639 por IOSR Journals
E011133639E011133639
E011133639
IOSR Journals207 visualizações
D011132635 por IOSR Journals
D011132635D011132635
D011132635
IOSR Journals308 visualizações
C011131925 por IOSR Journals
C011131925C011131925
C011131925
IOSR Journals175 visualizações
B011130918 por IOSR Journals
B011130918B011130918
B011130918
IOSR Journals251 visualizações
A011130108 por IOSR Journals
A011130108A011130108
A011130108
IOSR Journals227 visualizações
I011125160 por IOSR Journals
I011125160I011125160
I011125160
IOSR Journals187 visualizações
H011124050 por IOSR Journals
H011124050H011124050
H011124050
IOSR Journals223 visualizações
G011123539 por IOSR Journals
G011123539G011123539
G011123539
IOSR Journals254 visualizações
F011123134 por IOSR Journals
F011123134F011123134
F011123134
IOSR Journals195 visualizações
E011122530 por IOSR Journals
E011122530E011122530
E011122530
IOSR Journals253 visualizações
D011121524 por IOSR Journals
D011121524D011121524
D011121524
IOSR Journals340 visualizações

Último

DRBD Deep Dive - Philipp Reisner - LINBIT por
DRBD Deep Dive - Philipp Reisner - LINBITDRBD Deep Dive - Philipp Reisner - LINBIT
DRBD Deep Dive - Philipp Reisner - LINBITShapeBlue
62 visualizações21 slides
Mitigating Common CloudStack Instance Deployment Failures - Jithin Raju - Sha... por
Mitigating Common CloudStack Instance Deployment Failures - Jithin Raju - Sha...Mitigating Common CloudStack Instance Deployment Failures - Jithin Raju - Sha...
Mitigating Common CloudStack Instance Deployment Failures - Jithin Raju - Sha...ShapeBlue
74 visualizações18 slides
Future of AR - Facebook Presentation por
Future of AR - Facebook PresentationFuture of AR - Facebook Presentation
Future of AR - Facebook PresentationRob McCarty
46 visualizações27 slides
"Surviving highload with Node.js", Andrii Shumada por
"Surviving highload with Node.js", Andrii Shumada "Surviving highload with Node.js", Andrii Shumada
"Surviving highload with Node.js", Andrii Shumada Fwdays
40 visualizações29 slides
What’s New in CloudStack 4.19 - Abhishek Kumar - ShapeBlue por
What’s New in CloudStack 4.19 - Abhishek Kumar - ShapeBlueWhat’s New in CloudStack 4.19 - Abhishek Kumar - ShapeBlue
What’s New in CloudStack 4.19 - Abhishek Kumar - ShapeBlueShapeBlue
131 visualizações23 slides
Zero to Cloud Hero: Crafting a Private Cloud from Scratch with XCP-ng, Xen Or... por
Zero to Cloud Hero: Crafting a Private Cloud from Scratch with XCP-ng, Xen Or...Zero to Cloud Hero: Crafting a Private Cloud from Scratch with XCP-ng, Xen Or...
Zero to Cloud Hero: Crafting a Private Cloud from Scratch with XCP-ng, Xen Or...ShapeBlue
88 visualizações20 slides

Último(20)

DRBD Deep Dive - Philipp Reisner - LINBIT por ShapeBlue
DRBD Deep Dive - Philipp Reisner - LINBITDRBD Deep Dive - Philipp Reisner - LINBIT
DRBD Deep Dive - Philipp Reisner - LINBIT
ShapeBlue62 visualizações
Mitigating Common CloudStack Instance Deployment Failures - Jithin Raju - Sha... por ShapeBlue
Mitigating Common CloudStack Instance Deployment Failures - Jithin Raju - Sha...Mitigating Common CloudStack Instance Deployment Failures - Jithin Raju - Sha...
Mitigating Common CloudStack Instance Deployment Failures - Jithin Raju - Sha...
ShapeBlue74 visualizações
Future of AR - Facebook Presentation por Rob McCarty
Future of AR - Facebook PresentationFuture of AR - Facebook Presentation
Future of AR - Facebook Presentation
Rob McCarty46 visualizações
"Surviving highload with Node.js", Andrii Shumada por Fwdays
"Surviving highload with Node.js", Andrii Shumada "Surviving highload with Node.js", Andrii Shumada
"Surviving highload with Node.js", Andrii Shumada
Fwdays40 visualizações
What’s New in CloudStack 4.19 - Abhishek Kumar - ShapeBlue por ShapeBlue
What’s New in CloudStack 4.19 - Abhishek Kumar - ShapeBlueWhat’s New in CloudStack 4.19 - Abhishek Kumar - ShapeBlue
What’s New in CloudStack 4.19 - Abhishek Kumar - ShapeBlue
ShapeBlue131 visualizações
Zero to Cloud Hero: Crafting a Private Cloud from Scratch with XCP-ng, Xen Or... por ShapeBlue
Zero to Cloud Hero: Crafting a Private Cloud from Scratch with XCP-ng, Xen Or...Zero to Cloud Hero: Crafting a Private Cloud from Scratch with XCP-ng, Xen Or...
Zero to Cloud Hero: Crafting a Private Cloud from Scratch with XCP-ng, Xen Or...
ShapeBlue88 visualizações
Data Integrity for Banking and Financial Services por Precisely
Data Integrity for Banking and Financial ServicesData Integrity for Banking and Financial Services
Data Integrity for Banking and Financial Services
Precisely56 visualizações
Confidence in CloudStack - Aron Wagner, Nathan Gleason - Americ por ShapeBlue
Confidence in CloudStack - Aron Wagner, Nathan Gleason - AmericConfidence in CloudStack - Aron Wagner, Nathan Gleason - Americ
Confidence in CloudStack - Aron Wagner, Nathan Gleason - Americ
ShapeBlue41 visualizações
Import Export Virtual Machine for KVM Hypervisor - Ayush Pandey - University ... por ShapeBlue
Import Export Virtual Machine for KVM Hypervisor - Ayush Pandey - University ...Import Export Virtual Machine for KVM Hypervisor - Ayush Pandey - University ...
Import Export Virtual Machine for KVM Hypervisor - Ayush Pandey - University ...
ShapeBlue34 visualizações
Backroll, News and Demo - Pierre Charton, Matthias Dhellin, Ousmane Diarra - ... por ShapeBlue
Backroll, News and Demo - Pierre Charton, Matthias Dhellin, Ousmane Diarra - ...Backroll, News and Demo - Pierre Charton, Matthias Dhellin, Ousmane Diarra - ...
Backroll, News and Demo - Pierre Charton, Matthias Dhellin, Ousmane Diarra - ...
ShapeBlue83 visualizações
CloudStack and GitOps at Enterprise Scale - Alex Dometrius, Rene Glover - AT&T por ShapeBlue
CloudStack and GitOps at Enterprise Scale - Alex Dometrius, Rene Glover - AT&TCloudStack and GitOps at Enterprise Scale - Alex Dometrius, Rene Glover - AT&T
CloudStack and GitOps at Enterprise Scale - Alex Dometrius, Rene Glover - AT&T
ShapeBlue56 visualizações
Declarative Kubernetes Cluster Deployment with Cloudstack and Cluster API - O... por ShapeBlue
Declarative Kubernetes Cluster Deployment with Cloudstack and Cluster API - O...Declarative Kubernetes Cluster Deployment with Cloudstack and Cluster API - O...
Declarative Kubernetes Cluster Deployment with Cloudstack and Cluster API - O...
ShapeBlue42 visualizações
Elevating Privacy and Security in CloudStack - Boris Stoyanov - ShapeBlue por ShapeBlue
Elevating Privacy and Security in CloudStack - Boris Stoyanov - ShapeBlueElevating Privacy and Security in CloudStack - Boris Stoyanov - ShapeBlue
Elevating Privacy and Security in CloudStack - Boris Stoyanov - ShapeBlue
ShapeBlue96 visualizações
MVP and prioritization.pdf por rahuldharwal141
MVP and prioritization.pdfMVP and prioritization.pdf
MVP and prioritization.pdf
rahuldharwal14138 visualizações
Setting Up Your First CloudStack Environment with Beginners Challenges - MD R... por ShapeBlue
Setting Up Your First CloudStack Environment with Beginners Challenges - MD R...Setting Up Your First CloudStack Environment with Beginners Challenges - MD R...
Setting Up Your First CloudStack Environment with Beginners Challenges - MD R...
ShapeBlue54 visualizações
Transitioning from VMware vCloud to Apache CloudStack: A Path to Profitabilit... por ShapeBlue
Transitioning from VMware vCloud to Apache CloudStack: A Path to Profitabilit...Transitioning from VMware vCloud to Apache CloudStack: A Path to Profitabilit...
Transitioning from VMware vCloud to Apache CloudStack: A Path to Profitabilit...
ShapeBlue57 visualizações
Network Source of Truth and Infrastructure as Code revisited por Network Automation Forum
Network Source of Truth and Infrastructure as Code revisitedNetwork Source of Truth and Infrastructure as Code revisited
Network Source of Truth and Infrastructure as Code revisited
Network Automation Forum42 visualizações
Updates on the LINSTOR Driver for CloudStack - Rene Peinthor - LINBIT por ShapeBlue
Updates on the LINSTOR Driver for CloudStack - Rene Peinthor - LINBITUpdates on the LINSTOR Driver for CloudStack - Rene Peinthor - LINBIT
Updates on the LINSTOR Driver for CloudStack - Rene Peinthor - LINBIT
ShapeBlue91 visualizações
Ransomware is Knocking your Door_Final.pdf por Security Bootcamp
Ransomware is Knocking your Door_Final.pdfRansomware is Knocking your Door_Final.pdf
Ransomware is Knocking your Door_Final.pdf
Security Bootcamp76 visualizações
Live Demo Showcase: Unveiling Dell PowerFlex’s IaaS Capabilities with Apache ... por ShapeBlue
Live Demo Showcase: Unveiling Dell PowerFlex’s IaaS Capabilities with Apache ...Live Demo Showcase: Unveiling Dell PowerFlex’s IaaS Capabilities with Apache ...
Live Demo Showcase: Unveiling Dell PowerFlex’s IaaS Capabilities with Apache ...
ShapeBlue35 visualizações

Wireless Micro-Sensor Network Models

  • 1. IOSR Journal of Computer Engineering (IOSRJCE) ISSN: 2278-0661, ISBN: 2278-8727 Volume 6, Issue 3 (Sep-Oct. 2012), PP 09-14 www.iosrjournals.org www.iosrjournals.org 9 | Page Wireless Micro-Sensor Network Models Ms. Swapnali S. Maske1 , Mrs. Tejaswini A. Pawar2 1 Department of Information Technology, BVCOE, Shivaji University, Kolhapur, India. 2 Department of Computer Science and Engineering, BVCOE, Shivaji University, Kolhapur, India. Abstract: Wireless sensor network is important in sensing, Collecting and disseminating information about environmental Phenomenon. This paper contain emerging field to classify wireless micro sensor network according to different communication functions, data delivery models and network dynamics. This taxonomy will aid in defining appropriate communication infra structure for diff. sensor network application subspaces. It allows network designer to choose the Protocol architecture. According to their application this taxonomy will enable new sensor network models to define for use in further research in this area. The overall communication behavior in a wireless micro sensor Network is application driven. It is useful to decouple the application communication used for information dissemination from the infrastructure communication used to configure and optimize the Network. This separation will aid network designers in selecting the appropriate sensor network architecture that will best match the characteristics of the communication traffic of a given application. This will allow the network protocol to achieve the application-specific goals of energy-efficiency, low latency, and high accuracy in the sensing application. We also believe that a sensor-initiated proactive path recovery approach with local patching will be beneficial in efficient information dissemination in wireless micro-sensor networks. The taxonomy presented will be helpful in designing and evaluating future network protocols for wireless micro-sensor networks. Often, it is possible to implement a sensor network for a specific phenomenon in a number of different ways. Consider the problem of monitoring a tornado. One option would be to fly airplanes to sense the tornado (mobile phenomenon; mobile sensors; continuous data delivery). Another would be to have a sensor grid statically placed on the ground and report data as the tornado passes through (mobile phenomenon; static sensors; continuous data delivery). Yet another would be to release lightweight sensors into the tornado (static phenomenon; mobile sensors; Continuous data delivery). I. Introduction Development in hardware and wireless network technology introduce a new area were small wireless devices will provide access to information any time, anywhere as well as actively participate in creating smart environment. Sensor networks hold the promise of revolutionizing sensing a wide range of application domains. This is because of their reliability, accuracy, flexibility, cast -effectiveness and case of development. Sensor are rapidly deployed in remote inhospitable area for a surveillance application sensors are used to analyze the motion of a tornado; Sensors are used in forest for fire detection; sensors are attached to tool cabs in a large metropolitan area to study the traffic conditions and plan routes effectively. There is wide range of applications for sensor network with differing requirements. In report the classification wireless micro-sensor networks from a communication protocol perspective, I look at characteristic and goals of typical micro-sensor network as well as different types of communication that required achieving their goals. The remaining report is organized as Chapter 2 contains Performance Metrics of Sensor Network. Chapter 3 contains Architecture of Sensor Network. Chapter 4 contains The Data Delivery Models. Chapter 5 contains the Network Dynamic Models for Sensor Network. Chapter 6 contains Some Network Protocol, Following are the terminologies used in the report. 1.1 Sensor The device that implements the physical sensing of environmental phenomena and reporting of measurements (through wireless communication). Typically it consists of five Components-sensing hardware, memory battery, embedded processor, and trance-receiver [1]. The basic sensor network is shown in Figure 1.1.
  • 2. Wireless Micro-Sensor Network Models www.iosrjournals.org 10 | Page Fig. 1.1 The basic sensor network 1.2 Observer The end user interested in obtaining information disseminated by the sensor network about the phenomena. The observer may indicate interests (or queries) to the network and receive response to these queries [2]. 1.3 Phenomenon The entity of interest to the observer that is being served and optionally analyzed/filtered the sensor networks. There may be multiple phenomena under observation concurrently in the same network. While monitoring the phenomena some latency and accuracy must be restricted. In a typical sensor network individuals sensor serve the local values and disseminate information to other sensors and to the observer. Sensors network shares many challenges of traditional wireless network. This include limited energy available to each node band width-limited, error-prone channel communication in sensor network is end-to-end. The function of network is to repeat information about phenomenon to observer. The observer not necessarily aware of the sensor networks infrastructure and individual sensor as end point communication. II. Performance Metrics Following are the metrics to evaluate sensor network protocols. 2.1 Energy Efficient As sensor nodes are battery operated, protocols must be energy efficient or maximize system lifetime 2.2 Scalability It is also a critical footer for large-scale network it is likely that locating interactions through hierarchy and aggregation will be critical for ensuring scalability. 2.3 System Lifetime System lifetime is the time until half of nodes die or by application directed metrics such as when the network stop providing the application with desired information about phenomena. 2.4 Latency The observer is interested in knowing about the phenomena within a given delay. The precise semantics of latency are application dependent. 2.5 Accuracy Primary object of observer is to obtain the accurate information, where accuracy is determined by given application. The given infrastructure should be adaptive that the application obtain desired accuracy and latency with minimum energy used. 2.6 Fault tolerance Due to surrounding physical conditions the sensor may fail, or also fails because of their energy ran out. This is difficult to replace the existing sensor, so the network is fault tolerance so that actual network condition is transparent to given application.
  • 3. Wireless Micro-Sensor Network Models www.iosrjournals.org 11 | Page II. Sensor Network Architecture A Sensor network is a tool for measuring and relaying information about the phenomena to the observer within the desired performance bond and deployment cost. The organization of the network as shown in following Figure 3.1 Fig. 3.1 Sensor network architecture 3.1 Infrastructure The infrastructure consist of the sensor and their deployment status [2], more precisely it consist of characteristics of sensor e.g. sensing accuracy, memory size, battery life, transmission ranges and deployment strategy (e.g. sensor density, sensor location and mobility.) 3.2 Network Protocols The network protocol is responsible creating paths and accomplishing communication between the sensors and observation. 3.3 Application / Observer The observer interest queries about the phenomenon as approximated by distributed data that the sensor is capable of serving. These queries could be static or dynamic. The translation of data could be done by the application software at the observer and /or the sensor nodes or directed by human observer. The network protocol in a sensor network is responsible for all communication both among sensors as well as between the sensors and observer. In order to determine how the network protocol behaves for diff. scenario’s, it is important to classify their feature. In next session different types of communication required in sensor network. 3.4 Communication models The communication within a sensor network can be classified in to two-category application and infrastructure [1]. Application communication relates to the transfer of sensor data with the goal of informing the observer about the phenomena within application communication, there are two modes co-operative and non co- operative. Non co-operative sensors do not cooperate at the application revel for information transfer. The extreme case will be when no sensor communication with its neighbors. All sensors were independently. Co-operative sensors might be required to communicate with its neighbor s either periodically or after the occurrence of specific event. Infrastructure communication refers to the communication needed to configure, maintain and optimize operation. The infrastructure communication is needed to keep the network functional ensure robust operation in dynamic environment as well as optimize overall performance. A sensor network requires both the application and infrastructure communication. In static sensor networks an initial phase of infrastructure communion is needed to set up the networks furthermore, if the sensors are mobile, additional communications needed for path discovery/ reconfiguration. III. Data Delievery Models Sensor networks can be classified in terms of data delivery models required by applications (observer) interest as 1.Continues 2. Event driven 3.Observer initiated 4. Hybrid 4.1 Continues
  • 4. Wireless Micro-Sensor Network Models www.iosrjournals.org 12 | Page In the Continues models the sensor communicates their data continuously at a pre-specified rate [1] [2]. Clustering is the most efficient for static networks where data is continuously transmitted. 4.2 Event Driven In the event driven data models the sensors reporting information only if an event of interest occurs, here observer is interested in the occurrence of a specific phenomenon or a set of phenomenon [1] [2]. 4.3 Observer Initiated In the observer initiated (or request reply) model the sensors only report their results in response to an explicit request from the observer (either directly, or indirectly through other sensors) 4.4 Hybrid Hybrid models are one where the above three approaches can co exists in the network. In this way we have only classify the data delivery from the application perspective. For any of the above models the communication approaches can be classified as 1. Flooding (Broadcast based) 2. Unicast 3. Multicast. In flooding approach sensor broadcast information in neighboring node and it rebroadcast this data until reaches to the observer. IV. Network Dynamics Models A path is formed between phenomena and the observer by a sensor network the sensor network protocol creates and maintains this path (or multiple paths) under dynamic condition while meeting the application requirements of low energy, low latency, high accuracy and fault tolerance. There are several approaches to construct and maintain path between the observer and the phenomenon. They are classified as static sensor network and mobile / dynamic sensor network, the important point is mobility because it is most common source of dynamic conditions other source includes sensors failure and change in observer interest. 5.1 Static Sensor Network There is no motion among communication sensors, the observer and the phenomenon. An example is a group of sensors spread for temperature sensing. In this type of network, sensor nodes requires an initial one time setup infrastructure communication to create the path between the observer and the sensors with the remaining traffic exclusively application communication. 5.2 Dynamic Sensors Network In dynamic sensor network, either the sensors themselves, the observer or the phenomenon are mobile, whenever a phenomenon associated with sensors moves, the path between observer and phenomenon get failed, in such situation either observer or the sensor must rebuild a new path. There are two types of rebuilding of new paths between observer and sensors. The first approaches is observer-initiated approach, in this case during initial setup the observer can build multiple paths between itself and the phenomenon. The observer can use the most beneficial path, if path fails another path can be used, if all paths fail, the observer must rebuild new paths. This observer initiated approach is a reactive approach where path recovery action is only taken after observe a broken path [1] [2]. Another approach is sensor-initiated approach. In sensor initiated path recovery procedure, path recovery is initiated by a sensor that is currently a part of logical path between the observer & the phenomenon. It is planning to move out of range. The sensors perform some local patching by broadcasting a participation request to neighboring sensor for given logical flow to build a new path. If any sensor sends participation reply message then the new path is build, if none of sensor reply then sensor can default to sending a path invalidation request to the observation so that the observer can start building the path. Dynamic sensor networks can be further classified by considering the motion of the components. This motion is important. Each of following requires different infrastructure; data delivery models and protocols 5.2.1 Mobile observer In this case the observer is mobile with respect to the sensors and phenomena. An example of this paradigm is sensors deployed in an inhospitable area for environment monitoring. For example, a plane might fly over a field periodically to collect information from a sensor network. Thus the observer, in the plane, is moving relative to the sensors and phenomena on the ground.
  • 5. Wireless Micro-Sensor Network Models www.iosrjournals.org 13 | Page Fig. 5.2.1 Mobile observer 5.2.2 Mobile sensors In this case, the sensors are moving with respect to each other and the observer. For example, consider traffic monitoring implemented by attaching sensors to taxis. As the taxis move, the attached sensors continuously communicate with each other about their own observations of the traffic conditions. If the sensors are co-operative, the communication paradigm imposes additional constraints such as detecting the link layer addresses of the neighbors and constructing localization and in formation dissemination structures. We know that the overhead of maintaining a globally unique sensor ID in a hierarchical fashion like an IP address is expensive and not needed. Instead, these sensors should communicate only with their neighbors with the link layer MAC address. In such networks, the above-mentioned proactive algorithm with local patching for repairing a path can be used so that the information about the phenomenon is always available to the observer regardless of the Mobility of the individual sensors. Fig. 5.2.2 Mobile sensor 5.2.3 Mobile Phenomena In this case, the phenomenon itself is moving. A typical example of this paradigm is sensors deployed for animal detection. In this case the infrastructure level communication should be event-driven. Depending on the density of the phenomena, it will be inefficient if all the sensor nodes are active all the time. Only the sensors in the vicinity of the mobile phenomenon need to be active. The number of active sensors in the vicinity of the phenomenon can be determined by application specific goals such as accuracy, latency, and energy efficiency. Fig 5.2.3 Mobile phenomenon V. Overview Of Some Network Protocols In this section we consider several existing protocols for sensor networks and analyze them in the context of our taxonomy.
  • 6. Wireless Micro-Sensor Network Models www.iosrjournals.org 14 | Page 6.1 Ad Hoc Routing Protocol Ad hoc routing protocols may be used as the network protocol for sensor networks [2]. However, such protocols will generally not be good candidates for sensor networks because of the following reasons: (i) Sensors have low battery power and low available memory; (ii) The routing table size scales with the network size; (iii) These networks are designed for end-to-end communication and react inappropriately to mobility; (iv) Their addressing requirements may be inappropriate for sensor networks; (v) Ad hoc routing protocols do not support cooperative dissemination; As ad hoc routing protocols do not inherently support data aggregation or fusion, they will not perform well in sensor network applications. 6.2 LEACH LE ACH is an energy efficient protocol for sensor networks designed for sensor networks with continuous data delivery mechanism and no mobility [2]. LEACH uses a clustering architecture where member nodes send their data to the local cluster-head. Cluster-heads aggregate the data from each sensor and then send this information to the observer node. LEACH uses rotation of the cluster head in order to evenly distribute the energy load. Once clusters are formed, cluster members use TDMA to communicate with the cluster-head. Thus LEACH is suitable for networks where every node has data to send at regular intervals. However, it needs to be extended for event driven models as well as for mobile sensors. 6.3 Direct Diffusion Directed Diffusion (DD) is a data-centric protocol, where nodes are not addressed by their addresses but by the data they sense [2]. Attribute-value pairs name data. In directed diffusion observer nodes express the interest in term of a query, which diffuses through the network using local interactions. Once a sensor node that satisfies the query (source node) is reached, that node starts transmitting data to the sink node, again using local interactions. The absence of a notion of a global id (e.g., IP address) makes directed diffusion efficient for networks with mobility as well. Directed diffusion is applicable for Event-driven and query-driven networks as defined in our taxonomy. VI. Conclusion The overall communication behavior in a wireless micro sensor Network is application driven. It is useful to decouple the application communication used for information dissemination from the infrastructure communication used to configure and optimize the Network. This separation will aid network designers in selecting the appropriate sensor network architecture that will best match the characteristics of the communication traffic of a given application. This will allow the network protocol to achieve the application-specific goals of energy-efficiency, low latency, and high accuracy in the sensing application. We also believe that a sensor-initiated proactive path recovery approach with local patching will be beneficial in efficient information dissemination in wireless micro-sensor networks. The taxonomy presented will be helpful in designing and evaluating future network protocols for wireless micro-sensor networks. Often, it is possible to implement a sensor network for a specific phenomenon in a number of different ways. Consider the problem of monitoring a tornado. One option would be to fly airplanes to sense the tornado (mobile phenomenon; mobile sensors; continuous data delivery). Another would be to have a sensor grid statically placed on the ground and report data as the tornado passes through (mobile phenomenon; static sensors; continuous data delivery). Yet another would be to release lightweight sensors into the tornado (static phenomenon; mobile sensors; Continuous data delivery). The accuracy is a function of the sensing technology of the sensors and their distance from the phenomenon. However, since the performance is measured at the observer end, it is also a function of the performance of the communication model. We hope that this taxonomy will assist in developing relevant simulation models to enable empirical study of the performance of the different sensor network organizations and assist in making design and deployment decisions. References [1] Sameer Tilak, Nael B, Abu-Ghazaleh and Wendi Heizelmn,”A Taxonomy of Wireless Micro Sensor Network Models”, [2] Sameer Tilak, Nael B, Abu-Ghazaleh and Wendi Heizelmn ,” The Updatesd A Taxonomy of Wireless Micro Sensor Network Models”,ACM And Mobile Computing Review, April 2002,Volume 1,Number 2.