SlideShare uma empresa Scribd logo
1 de 4
Baixar para ler offline
9 ICRTEDC -2014
IJEEE, Vol. 1, Spl. Issue 2 (May, 2014) e-ISSN: 1694-2310 | p-ISSN: 1694-2426
EFFECTIVE AND SECURE DATA GV/ICRTEDC/02
COMMUNICATION IN WSNs
CONSIDERING TRANSFER MODULE
OF NODES
1
Dr. Dinesh Arora, 2
Dr.Hardeep Singh
1
Gurukul Vidyapeeth Institute of Engg. & Technology, Banur, Punjab, India
2
Indo Global College of Engg. & Technology, Mohali, Punjab, India
1
drdinesh169@gmail.com, 2
hardeep_saini17@yahoo.co.in
ABSTRACT: Wireless network which allows users to
access information and service regardless of their
geographic position. These networks are highly distributed
networks of small wireless nodes, monitors the
environment or system by measuring physical parameters
such as temperature, pressure. A network consists of
numbers of nodes with one as a source and one as a
destination. Data loss, high energy consumption, reduction
in signal strength and interferences in data were various
factors which incorrupt the transmission in Wireless
sensor networks. A Bio-inspired clustering algorithm
based on BFO has been proposed and investigation on
energy efficient clustering algorithms related to WSNs has
been done in this paper. The contribution of this paper
related to use of Bacteria foraging algorithm firstly for
WSNs for enhancing network lifetime of sensor nodes.
Keywords: Wireless Sensor Network, Sensor Nodes,
Routing in WSNs, BFO;
1. INTRODUCTION
Wireless network which allows users to access
information and service regardless of their geographic
position provides advantage in terms of cost factor,
flexibility, size and power consumption as it can operate in
wide range of environment without the limitation of
physical media when compared with wired technology. In
wireless technology, message can be forwarded over
multiple hops. Wireless networks operate in two basic
modes. These are:
 Infrastructure mode (BSS)
 Ad-Hoc mode (IBSS)
1.1 Infrastructure mode
In BSS mode, network is connected with central device
called as access point (AP). All other communicating
devices called as clients are connected to each other
through central access point. Clients and access point must
use the same label of an Ethernet jack on the wall called
SSID. Clients and AP uses same SSID to identify the
network. A mobile host interacts with a bridge in the
network (called base station) within its communication
radius. Channel is setup in the access point (AP) and
discovered by clients.
Typical example of infrastructure based wireless networks
includes cellular networks, WI-FI, WI-MAX, satellite
communication, radar etc.
1.2 Ad-Hoc Mode (IBSS)
In Ad-Hoc mode, which also called as Independent Base
Service Set (IBSS), no central access point (AP) is
required. Here all nodes use the same SSID and channel.
Here all nodes can exchange information without the use
of pre-existing fixed network infrastructure. Devices are
free to move in the network without bound to any
agreement to stay connected. It is self-organizing and
adaptive network where each mobile host itself acts as a
router. Ad-Hoc network allows spontaneous formation and
deformation of mobile networks.
2. LITERATURE SURVEY
This section enlightens the earlier work done related to
wireless sensor networks. Literature survey illustrating the
various routing protocols for lifetime enhancement,
throughput paths, best roués and in field of wireless sensor
network security.
B.P.S Sahoo, Satyajit Rath, Deepak Puthal [1]
presented the adaptive approach to find an optimal routing
path from source to sink when the sensor node are
deployed randomly deployed in a restricted service area
with single link. Their analysis shows that the approach
they followed reduces the message communication to find
an optimal routing path. Hence the network consumes less
energy and increase the lifetime of network.
Asar Ali, Zeeshan Akbar [2] evaluate the performance of
two different routing protocols like ad hoc on demand
distance vector (AODV) and dynamic source routing
(DSR) for monitoring of critical conditions with the help
of important matrices like throughput and end to end delay
in different scenarios. Based on result derived from
simulation a conclusion is drawn on the comparison
between these two different routing protocols with
parameter like end-to-end delay and throughput.
Theodore Zahariadis et al [3] present a trust aware,
location based routing protocol which protects the WSN
against routing attacks, and also support large scale
WSN’s deployments. Their proposed solution has been
shown to efficiently detect and avoid malicious nodes and
has been implemented in state-of-the-art sensor nodes for
a real-life test-bed. Their work focused on the assessment
of the implementation cost and on the lessons learned
through the design, implementation and validation
process. The domain of WSNs applications is increasing
ICRTEDC-2014 10
widely over the last few years. As severely constrained
node resources, limited network resources and the
requirement to operate in an ad hoc manner characterize
this new type of networking, implementing security
functionality to protect against adversary nodes becomes a
challenging task.
Guoxing Zhan et al [4] proposes a fact that multi hope
routing in wireless sensor network offers little protection
against deception through replaying routing information. It
cannot be solved solely by encryption or authentication
techniques. To secure multi-hop routing in WSNs against
intruders exploiting the replay of routing information, we
propose TARF, a trust-aware routing framework for
WSNs.
3. ROUTING IN WSNs
The Wireless networks are highly distributed networks of
small wireless nodes, monitors the environment or system
by measuring physical parameters such as temperature,
pressure. A network consists of numbers of nodes with
one as a source and one as a destination. In a wide area the
number of nodes is not specified.
Here the concentration point is neither routing nor
transmission but deployment which means to distribute
systematically or strategically. In Wireless sensor
networks this arrangement method is called as sensor take
battle station.
These wireless sensor network’s faces numbers of
following problems at the time of communication.
 Issue regarding deployment
 Issue regarding distance
 Issue regarding energy consumption
 Issue regarding coverage area
3.1 Bacteria Foraging Optimization in WSNs
Bacterial Foraging Optimization (BFO) is a population-
based numerical optimization algorithm. In recent years,
bacterial foraging behaviour has provided rich source of
solution in many engineering applications and
computational model. It has been applied for solving
practical engineering problems like optimal control,
harmonic estimation, channel equalization etc. In this
paper, BFO has been used for cluster head selection to
provide improved energy efficiency in routing. The
process of cluster head selection involves application of a
clustering algorithm. This has been classically done with
LEACH, K-Means and direct method [6].
4. RESEARCH OBJECTIVE
The aim and objective of our research incorporated in our
paper covers the following steps.
1) Optimum route distance between nodes and
sensors
2) Optimum or least power consumption between
location points and sensors.
3) Maximum Bandwidth utilization.
4) Increase in Sensor Coverage.
5) Optimization of Mean location points of wireless
sensors.
5. PROPOSED STEPS TO ACHIEVE THE
OBJECTIVE
 With minimum number of sensor nodes having
maximum coverage in the network and the nodes
are within the communication range.
 By making optimized wireless clusters using the
Euclidean distance from all the location nodes to
the Sensor Nodes.
 By making the Clusters of the sensor nodes with
a corresponding central transceiver point which
will be further chosen from a group of sensors.
 By Optimizing the Sensors position within each
individual cluster, using BFO.

6. PROBLEM FORMULATION
In wireless sensor network data is transmitted through
node to node where distance is the most effecting factor to
the efficiency of the networks. Sensors are to be linked to
many near falling nodes by determining their distances. If
the distance is large than it will result to more energy
consumption and even results to week the signal strength.
If any sensor is linked to large number of nodes to reduce
the coverage area cost, then it will produce delay and leads
to more energy requirement. On other side if the to lower
the deployment cost sensors should be located far from
each other so that they may cover maximum area as well
as maximum numbers of nodes. But this may increase
wireless sensor node power consumption due to the energy
needed to reach large distances. Data loss, high energy
consumption, reduction in signal strength and
interferences in data were various factors which incorrupt
the transmission in Wireless sensor networks.
7. PROMBLEM SOLUTION
For reduction of the challenged faced by the wireless
sensor networks, we need to establish the sensors at a
place where it results to better communication. For this
various factors as distance, coverage area, signal strength,
energy level all has to be determined. There are to two
methods can be used.
 Hit & trial method
 Iterative optimization
8. SYSTEM DESIGN EVALUATION AND
SIMULATION RESULTS
This section includes results of the proposed algorithm in
terms of various parameters by analyzing the result
visually in network animator and graphically evaluating
the performance of the proposed system in terms of
standard parameters, which discussed later in this chapter.
This section also incorporate the validity of proposed work
by comparing the performance with existing system.
8.1 SIMULATION
 Firstly calculate the total number of the users in
the area under the wireless network and also
determine the total numbers of sensors are to be
used in the network for the communication
between the different nodes.
 Identify the initial position of all the nodes in the
network with determining the rough positions of
11 ICRTEDC -2014
sensors anywhere in the coverage area, which
means randomly.
 Calculate the distance between nodes with
respect to each other and their distance from the
sensor nodes also. Based on this data, position of
sensor node and how many numbers of nodes to
be associated to it will be decided.
 According to the clustered information, find out
which node is associated to which sensor in the
network. This clustered data provides the
information about which node is connected to
which sensor node and even tell what numbers of
nodes are connected to the sensor nodes.
 The point of interest is where to place the sensor
node in the coverage area so that it may cover a
wide area with no loss in data and providing low
deployment cost and effective and strong signal
strength. Keeping all these factors in mind “soft
computing technique” is used to optimize the
position of the sensors in the coverage area.
 Soft computing is a technique in which
emphasize gains in understanding system
behavior and used for routing in the network.
Sensors are placed at different positions and a
fitness value or a threshold value is determined
according to position with cohort to distance.
 This process is repeated again and again for all
numbers of sensor nodes in the wireless sensor
networks to get the best position of the sensors in
the network coverage area. Best position here
specifies the position at which sensor when
placed gives strongest signal strength with no loss
in data during transmission and it is connected to
maximum numbers of nodes without producing
delays in the communications.
8.2 RESULTS
1) Getting initial total number of sensors in network:
Here we defined the number of sensors we need,
to place in the network. Initially let we want three
sensors in the network. We can place any number
of sensors in the network according to our
requirement. Before entering the number of
sensors in the network.
2) Getting initial total number of working nodes in
network: After selecting the number of sensors
we want to place in a network, we enter the
number of nodes through which we decide the
best location for sensor. These nodes decide the
reliability of our network. Greater the number of
nodes greater the chances of getting the best
location of sensors.
Get initial location of nodes of network by having user
define and randomly generated x-y coordinates by
selecting option 1 and option 2 from user.
Figure 9.1: Plotting initial location of sensor and nodes in
given network in different presentation
Next step is to optimize sensor location as per their
allotment and using Soft computing algorithm with fitness
function.
Figure 9.2: Optimization algorithm to find best location as
per parameters.
Figure 9.3: Best location finding by optimization
algorithm in each round
ICRTEDC-2014 12
Figure 9.4: Final optimized locations of sensors because of
fitness function and BFO algorithm and finally plot to
demonstrate the problem solution
10. CONCLUSION
A bio-inspired clustering algorithm based on BFO has
been proposed and investigation on energy efficient
clustering algorithms related to WSNs has been done.
This increases Network life of WSNs. The contribution of
this paper related to use of Bacteria foraging algorithm
firstly for WSNs for enhancing network lifetime of sensor
nodes. To validate the algorithm, simulations had been
carried out using MATLAB. Simulation results showed
better performance of BFO as compared to other
clustering protocols like LEACH, K-Means and direct
method in terms of performance metrics like number of
nodes and total energy dissipation in the system. Other
bio-inspired algorithms like Ant colony optimization,
artificial Immune system, Genetic algorithm (significant
time and power consuming) can also be compared to BFO;
but the challenge of reducing computational complexity
still remains.
REFERENCES
1. B. P. S. Sahoo and Deepak Puthal, “DRUG: An Energy-
Efficient Data-Centric Routing Protocol for Wireless Sensor
Network”, Manuscript Accepted for Publication in
International Conference on Intelligent Computing,
Communication & Devices (ICCD-2014) Springer Book
Series on "Advances in Intelligent Systems and Computing.
2. Asar Ali Zeeshan Akbar,” Evaluation of AODV and DSR
Routing Protocols of Wireless Sensor Networks for
Monitoring Applications”, Master’s Degree Thesis,
Karlskrona October 2009.
3. Theodore Zahariadis,Helen Leligou,Panagiotis
Karkazis,Panagiotis Trakadas, “DESIGN AND
IMPLEMENTATION OF A TRUST-AWARE ROUTING
PROTOCOL FOR LARGE WSNs”, International Journal of
Network Security & Its Applications (IJNSA), Vol.2, No.3,
July 2010.
4. Guoxing Zhan, Weisong Shi and Julia Deng, “TARF: A Trust-
Aware Routing Framework for Wireless Sensor Networks”,
EWSN 2010, LNCS 5970, pp. 65–80, Springer-Verlag Berlin
Heidelberg 2010.
5. Shuang Li, Alvin Lim and Cong Liu, “Improving QoS-based
Routing by Limiting Interference in Lossy Wireless Sensor
Networks”, International Journal of Wireless & Mobile
Networks (IJWMN), Vol.2, No.4, November 2010.
6. Sanatan Mohanty, “Energy Efficient Routing Algorithms for
Wireless Sensor Networks and Performance Evaluation of
Quality of Service for IEEE 802.15.4 Networks”, M.Tech
Thesis, National Institute of Technology, Rourkela-769008,
January 2010.

Mais conteĂșdo relacionado

Mais procurados

Some aspects of wireless sensor networks
Some aspects of wireless sensor networksSome aspects of wireless sensor networks
Some aspects of wireless sensor networkspijans
 
An Energy-Efficient Min-Max Optimization with RSA Security in Wireless Sensor...
An Energy-Efficient Min-Max Optimization with RSA Security in Wireless Sensor...An Energy-Efficient Min-Max Optimization with RSA Security in Wireless Sensor...
An Energy-Efficient Min-Max Optimization with RSA Security in Wireless Sensor...IJMTST Journal
 
Performance of energy balanced territorial predator scent marking algorithm b...
Performance of energy balanced territorial predator scent marking algorithm b...Performance of energy balanced territorial predator scent marking algorithm b...
Performance of energy balanced territorial predator scent marking algorithm b...eSAT Publishing House
 
IRJET- Congestion Avoidance and Qos Improvement in Base Station with Femt...
IRJET-  	  Congestion Avoidance and Qos Improvement in Base Station with Femt...IRJET-  	  Congestion Avoidance and Qos Improvement in Base Station with Femt...
IRJET- Congestion Avoidance and Qos Improvement in Base Station with Femt...IRJET Journal
 
The Expansion of 3D wireless sensor network Bumps localization
The Expansion of 3D wireless sensor network Bumps localizationThe Expansion of 3D wireless sensor network Bumps localization
The Expansion of 3D wireless sensor network Bumps localizationIJERA Editor
 
AN IMPROVED DECENTRALIZED APPROACH FOR TRACKING MULTIPLE MOBILE TARGETS THROU...
AN IMPROVED DECENTRALIZED APPROACH FOR TRACKING MULTIPLE MOBILE TARGETS THROU...AN IMPROVED DECENTRALIZED APPROACH FOR TRACKING MULTIPLE MOBILE TARGETS THROU...
AN IMPROVED DECENTRALIZED APPROACH FOR TRACKING MULTIPLE MOBILE TARGETS THROU...ijwmn
 
BOTTLENECK DETECTION ALGORITHM TO ENHANCE LIFETIME OF WSN
BOTTLENECK DETECTION ALGORITHM TO ENHANCE LIFETIME OF WSNBOTTLENECK DETECTION ALGORITHM TO ENHANCE LIFETIME OF WSN
BOTTLENECK DETECTION ALGORITHM TO ENHANCE LIFETIME OF WSNijngnjournal
 
AggreLEACH: Enhance Privacy Preserving in Wireless Sensor Network
AggreLEACH: Enhance Privacy Preserving in Wireless Sensor NetworkAggreLEACH: Enhance Privacy Preserving in Wireless Sensor Network
AggreLEACH: Enhance Privacy Preserving in Wireless Sensor Networkijsrd.com
 
De3211001104
De3211001104De3211001104
De3211001104IJMER
 
Data Centric Approach Based Protocol using Evolutionary Approach in WSN
Data Centric Approach Based Protocol using Evolutionary Approach in WSNData Centric Approach Based Protocol using Evolutionary Approach in WSN
Data Centric Approach Based Protocol using Evolutionary Approach in WSNijsrd.com
 
An Efficient Approach for Outlier Detection in Wireless Sensor Network
An Efficient Approach for Outlier Detection in Wireless Sensor NetworkAn Efficient Approach for Outlier Detection in Wireless Sensor Network
An Efficient Approach for Outlier Detection in Wireless Sensor NetworkIOSR Journals
 
Hybrid Spectrum Sensing Method for Cognitive Radio
Hybrid Spectrum Sensing Method for Cognitive Radio Hybrid Spectrum Sensing Method for Cognitive Radio
Hybrid Spectrum Sensing Method for Cognitive Radio IJECEIAES
 
An Ant colony optimization algorithm to solve the broken link problem in wire...
An Ant colony optimization algorithm to solve the broken link problem in wire...An Ant colony optimization algorithm to solve the broken link problem in wire...
An Ant colony optimization algorithm to solve the broken link problem in wire...IJERA Editor
 
Issues in optimizing the performance of wireless sensor networks
Issues in optimizing the performance of wireless sensor networksIssues in optimizing the performance of wireless sensor networks
Issues in optimizing the performance of wireless sensor networkseSAT Publishing House
 
AN ENERGY EFFICIENT DISTRIBUTED PROTOCOL FOR ENSURING COVERAGE AND CONNECTIVI...
AN ENERGY EFFICIENT DISTRIBUTED PROTOCOL FOR ENSURING COVERAGE AND CONNECTIVI...AN ENERGY EFFICIENT DISTRIBUTED PROTOCOL FOR ENSURING COVERAGE AND CONNECTIVI...
AN ENERGY EFFICIENT DISTRIBUTED PROTOCOL FOR ENSURING COVERAGE AND CONNECTIVI...ijasuc
 
Ber analysis of wi max in multipath fading channels
Ber analysis of wi max in multipath fading channelsBer analysis of wi max in multipath fading channels
Ber analysis of wi max in multipath fading channelseSAT Publishing House
 
Proactive Data Reporting of Wireless sensor Network using Wake Up Scheduling ...
Proactive Data Reporting of Wireless sensor Network using Wake Up Scheduling ...Proactive Data Reporting of Wireless sensor Network using Wake Up Scheduling ...
Proactive Data Reporting of Wireless sensor Network using Wake Up Scheduling ...ijsrd.com
 
J031101064069
J031101064069J031101064069
J031101064069theijes
 
Performance Analysis of Fault Detection in Round Trip Delay and Path Wireless...
Performance Analysis of Fault Detection in Round Trip Delay and Path Wireless...Performance Analysis of Fault Detection in Round Trip Delay and Path Wireless...
Performance Analysis of Fault Detection in Round Trip Delay and Path Wireless...Editor IJMTER
 

Mais procurados (19)

Some aspects of wireless sensor networks
Some aspects of wireless sensor networksSome aspects of wireless sensor networks
Some aspects of wireless sensor networks
 
An Energy-Efficient Min-Max Optimization with RSA Security in Wireless Sensor...
An Energy-Efficient Min-Max Optimization with RSA Security in Wireless Sensor...An Energy-Efficient Min-Max Optimization with RSA Security in Wireless Sensor...
An Energy-Efficient Min-Max Optimization with RSA Security in Wireless Sensor...
 
Performance of energy balanced territorial predator scent marking algorithm b...
Performance of energy balanced territorial predator scent marking algorithm b...Performance of energy balanced territorial predator scent marking algorithm b...
Performance of energy balanced territorial predator scent marking algorithm b...
 
IRJET- Congestion Avoidance and Qos Improvement in Base Station with Femt...
IRJET-  	  Congestion Avoidance and Qos Improvement in Base Station with Femt...IRJET-  	  Congestion Avoidance and Qos Improvement in Base Station with Femt...
IRJET- Congestion Avoidance and Qos Improvement in Base Station with Femt...
 
The Expansion of 3D wireless sensor network Bumps localization
The Expansion of 3D wireless sensor network Bumps localizationThe Expansion of 3D wireless sensor network Bumps localization
The Expansion of 3D wireless sensor network Bumps localization
 
AN IMPROVED DECENTRALIZED APPROACH FOR TRACKING MULTIPLE MOBILE TARGETS THROU...
AN IMPROVED DECENTRALIZED APPROACH FOR TRACKING MULTIPLE MOBILE TARGETS THROU...AN IMPROVED DECENTRALIZED APPROACH FOR TRACKING MULTIPLE MOBILE TARGETS THROU...
AN IMPROVED DECENTRALIZED APPROACH FOR TRACKING MULTIPLE MOBILE TARGETS THROU...
 
BOTTLENECK DETECTION ALGORITHM TO ENHANCE LIFETIME OF WSN
BOTTLENECK DETECTION ALGORITHM TO ENHANCE LIFETIME OF WSNBOTTLENECK DETECTION ALGORITHM TO ENHANCE LIFETIME OF WSN
BOTTLENECK DETECTION ALGORITHM TO ENHANCE LIFETIME OF WSN
 
AggreLEACH: Enhance Privacy Preserving in Wireless Sensor Network
AggreLEACH: Enhance Privacy Preserving in Wireless Sensor NetworkAggreLEACH: Enhance Privacy Preserving in Wireless Sensor Network
AggreLEACH: Enhance Privacy Preserving in Wireless Sensor Network
 
De3211001104
De3211001104De3211001104
De3211001104
 
Data Centric Approach Based Protocol using Evolutionary Approach in WSN
Data Centric Approach Based Protocol using Evolutionary Approach in WSNData Centric Approach Based Protocol using Evolutionary Approach in WSN
Data Centric Approach Based Protocol using Evolutionary Approach in WSN
 
An Efficient Approach for Outlier Detection in Wireless Sensor Network
An Efficient Approach for Outlier Detection in Wireless Sensor NetworkAn Efficient Approach for Outlier Detection in Wireless Sensor Network
An Efficient Approach for Outlier Detection in Wireless Sensor Network
 
Hybrid Spectrum Sensing Method for Cognitive Radio
Hybrid Spectrum Sensing Method for Cognitive Radio Hybrid Spectrum Sensing Method for Cognitive Radio
Hybrid Spectrum Sensing Method for Cognitive Radio
 
An Ant colony optimization algorithm to solve the broken link problem in wire...
An Ant colony optimization algorithm to solve the broken link problem in wire...An Ant colony optimization algorithm to solve the broken link problem in wire...
An Ant colony optimization algorithm to solve the broken link problem in wire...
 
Issues in optimizing the performance of wireless sensor networks
Issues in optimizing the performance of wireless sensor networksIssues in optimizing the performance of wireless sensor networks
Issues in optimizing the performance of wireless sensor networks
 
AN ENERGY EFFICIENT DISTRIBUTED PROTOCOL FOR ENSURING COVERAGE AND CONNECTIVI...
AN ENERGY EFFICIENT DISTRIBUTED PROTOCOL FOR ENSURING COVERAGE AND CONNECTIVI...AN ENERGY EFFICIENT DISTRIBUTED PROTOCOL FOR ENSURING COVERAGE AND CONNECTIVI...
AN ENERGY EFFICIENT DISTRIBUTED PROTOCOL FOR ENSURING COVERAGE AND CONNECTIVI...
 
Ber analysis of wi max in multipath fading channels
Ber analysis of wi max in multipath fading channelsBer analysis of wi max in multipath fading channels
Ber analysis of wi max in multipath fading channels
 
Proactive Data Reporting of Wireless sensor Network using Wake Up Scheduling ...
Proactive Data Reporting of Wireless sensor Network using Wake Up Scheduling ...Proactive Data Reporting of Wireless sensor Network using Wake Up Scheduling ...
Proactive Data Reporting of Wireless sensor Network using Wake Up Scheduling ...
 
J031101064069
J031101064069J031101064069
J031101064069
 
Performance Analysis of Fault Detection in Round Trip Delay and Path Wireless...
Performance Analysis of Fault Detection in Round Trip Delay and Path Wireless...Performance Analysis of Fault Detection in Round Trip Delay and Path Wireless...
Performance Analysis of Fault Detection in Round Trip Delay and Path Wireless...
 

Destaque

Gv icrtedc 01
Gv icrtedc 01Gv icrtedc 01
Gv icrtedc 01IJEEE
 
Manipulated images
Manipulated imagesManipulated images
Manipulated imagesAnna T
 
marinduque
marinduquemarinduque
marinduquephoenix_12_
 
Gv icrtedc 04
Gv icrtedc 04Gv icrtedc 04
Gv icrtedc 04IJEEE
 
Zimbabwe develops 5-year strategy to revive coffee industry
Zimbabwe develops 5-year strategy to revive coffee industryZimbabwe develops 5-year strategy to revive coffee industry
Zimbabwe develops 5-year strategy to revive coffee industryZimpapers Group (1980)
 
The Art & Science of Nursing
The Art & Science of NursingThe Art & Science of Nursing
The Art & Science of Nursingksermeno
 
PresentaciĂłn aspectos demogrĂĄficos
PresentaciĂłn aspectos demogrĂĄficosPresentaciĂłn aspectos demogrĂĄficos
PresentaciĂłn aspectos demogrĂĄficosZairix Mcs
 
Nsrc2013 program-slides
Nsrc2013 program-slidesNsrc2013 program-slides
Nsrc2013 program-slidesDmitry Tseitlin
 
Herramientas para crear o hacer organizadores graficos
Herramientas para crear o hacer organizadores graficosHerramientas para crear o hacer organizadores graficos
Herramientas para crear o hacer organizadores graficosEdison Pinto
 
20 changes of life in 2050
20 changes of life in 205020 changes of life in 2050
20 changes of life in 2050Reza Assadi
 

Destaque (11)

Gv icrtedc 01
Gv icrtedc 01Gv icrtedc 01
Gv icrtedc 01
 
Manipulated images
Manipulated imagesManipulated images
Manipulated images
 
marinduque
marinduquemarinduque
marinduque
 
Gv icrtedc 04
Gv icrtedc 04Gv icrtedc 04
Gv icrtedc 04
 
Zimbabwe develops 5-year strategy to revive coffee industry
Zimbabwe develops 5-year strategy to revive coffee industryZimbabwe develops 5-year strategy to revive coffee industry
Zimbabwe develops 5-year strategy to revive coffee industry
 
The Art & Science of Nursing
The Art & Science of NursingThe Art & Science of Nursing
The Art & Science of Nursing
 
PresentaciĂłn aspectos demogrĂĄficos
PresentaciĂłn aspectos demogrĂĄficosPresentaciĂłn aspectos demogrĂĄficos
PresentaciĂłn aspectos demogrĂĄficos
 
Nsrc2013 program-slides
Nsrc2013 program-slidesNsrc2013 program-slides
Nsrc2013 program-slides
 
Herramientas para crear o hacer organizadores graficos
Herramientas para crear o hacer organizadores graficosHerramientas para crear o hacer organizadores graficos
Herramientas para crear o hacer organizadores graficos
 
20 changes of life in 2050
20 changes of life in 205020 changes of life in 2050
20 changes of life in 2050
 
PMI
PMIPMI
PMI
 

Semelhante a EFFECTIVE AND SECURE DATA COMMUNICATION IN WSNs CONSIDERING TRANSFER MODULE OF NODES

0512ijdps26
0512ijdps260512ijdps26
0512ijdps26Er_Loveleen
 
Cg4301470474
Cg4301470474Cg4301470474
Cg4301470474IJERA Editor
 
Energy Minimization in Wireless Sensor Networks Using Multi Hop Transmission
Energy Minimization in Wireless Sensor Networks Using Multi  Hop TransmissionEnergy Minimization in Wireless Sensor Networks Using Multi  Hop Transmission
Energy Minimization in Wireless Sensor Networks Using Multi Hop TransmissionIOSR Journals
 
Concealed Data Aggregation with Dynamic Intrusion Detection System to Remove ...
Concealed Data Aggregation with Dynamic Intrusion Detection System to Remove ...Concealed Data Aggregation with Dynamic Intrusion Detection System to Remove ...
Concealed Data Aggregation with Dynamic Intrusion Detection System to Remove ...csandit
 
CONCEALED DATA AGGREGATION WITH DYNAMIC INTRUSION DETECTION SYSTEM TO REMOVE ...
CONCEALED DATA AGGREGATION WITH DYNAMIC INTRUSION DETECTION SYSTEM TO REMOVE ...CONCEALED DATA AGGREGATION WITH DYNAMIC INTRUSION DETECTION SYSTEM TO REMOVE ...
CONCEALED DATA AGGREGATION WITH DYNAMIC INTRUSION DETECTION SYSTEM TO REMOVE ...cscpconf
 
F04623943
F04623943F04623943
F04623943IOSR-JEN
 
International journal of computer science and innovation vol 2015-n1-paper5
International journal of computer science and innovation  vol 2015-n1-paper5International journal of computer science and innovation  vol 2015-n1-paper5
International journal of computer science and innovation vol 2015-n1-paper5sophiabelthome
 
IRJET- Studies on Lifetime Enhancement Techniques for Wireless Sensor Network
IRJET- Studies on Lifetime Enhancement Techniques for Wireless Sensor NetworkIRJET- Studies on Lifetime Enhancement Techniques for Wireless Sensor Network
IRJET- Studies on Lifetime Enhancement Techniques for Wireless Sensor NetworkIRJET Journal
 
Characterization of directed diffusion protocol in wireless sensor network
Characterization of directed diffusion protocol in wireless sensor networkCharacterization of directed diffusion protocol in wireless sensor network
Characterization of directed diffusion protocol in wireless sensor networkijwmn
 
Energy Proficient and Security Protocol for WSN: A Review
Energy Proficient and Security Protocol for WSN: A ReviewEnergy Proficient and Security Protocol for WSN: A Review
Energy Proficient and Security Protocol for WSN: A Reviewtheijes
 
A Survey of Fuzzy Logic Based Congestion Estimation Techniques in Wireless S...
A Survey of Fuzzy Logic Based Congestion Estimation  Techniques in Wireless S...A Survey of Fuzzy Logic Based Congestion Estimation  Techniques in Wireless S...
A Survey of Fuzzy Logic Based Congestion Estimation Techniques in Wireless S...IOSR Journals
 
S04404116120
S04404116120S04404116120
S04404116120IJERA Editor
 
CUTTING DOWN ENERGY USAGE IN WIRELESS SENSOR NETWORKS USING DUTY CYCLE TECHNI...
CUTTING DOWN ENERGY USAGE IN WIRELESS SENSOR NETWORKS USING DUTY CYCLE TECHNI...CUTTING DOWN ENERGY USAGE IN WIRELESS SENSOR NETWORKS USING DUTY CYCLE TECHNI...
CUTTING DOWN ENERGY USAGE IN WIRELESS SENSOR NETWORKS USING DUTY CYCLE TECHNI...ijwmn
 
CUTTING DOWN ENERGY USAGE IN WIRELESS SENSOR NETWORKS USING DUTY CYCLE TECHNI...
CUTTING DOWN ENERGY USAGE IN WIRELESS SENSOR NETWORKS USING DUTY CYCLE TECHNI...CUTTING DOWN ENERGY USAGE IN WIRELESS SENSOR NETWORKS USING DUTY CYCLE TECHNI...
CUTTING DOWN ENERGY USAGE IN WIRELESS SENSOR NETWORKS USING DUTY CYCLE TECHNI...ijwmn
 
Ijarcet vol-2-issue-3-916-919
Ijarcet vol-2-issue-3-916-919Ijarcet vol-2-issue-3-916-919
Ijarcet vol-2-issue-3-916-919Editor IJARCET
 
EVENT DRIVEN ROUTING PROTOCOLS FOR WIRELESS SENSOR NETWORK- A SURVEY
EVENT DRIVEN ROUTING PROTOCOLS FOR  WIRELESS SENSOR NETWORK- A SURVEYEVENT DRIVEN ROUTING PROTOCOLS FOR  WIRELESS SENSOR NETWORK- A SURVEY
EVENT DRIVEN ROUTING PROTOCOLS FOR WIRELESS SENSOR NETWORK- A SURVEYijcsa
 
A Survey of Routing Protocols for Structural Health Monitoring
A Survey of Routing Protocols for Structural Health MonitoringA Survey of Routing Protocols for Structural Health Monitoring
A Survey of Routing Protocols for Structural Health MonitoringIJEEE
 
Design Issues and Applications of Wireless Sensor Network
Design Issues and Applications of Wireless Sensor NetworkDesign Issues and Applications of Wireless Sensor Network
Design Issues and Applications of Wireless Sensor Networkijtsrd
 

Semelhante a EFFECTIVE AND SECURE DATA COMMUNICATION IN WSNs CONSIDERING TRANSFER MODULE OF NODES (20)

0512ijdps26
0512ijdps260512ijdps26
0512ijdps26
 
Cg4301470474
Cg4301470474Cg4301470474
Cg4301470474
 
Energy Minimization in Wireless Sensor Networks Using Multi Hop Transmission
Energy Minimization in Wireless Sensor Networks Using Multi  Hop TransmissionEnergy Minimization in Wireless Sensor Networks Using Multi  Hop Transmission
Energy Minimization in Wireless Sensor Networks Using Multi Hop Transmission
 
Ijetcas14 591
Ijetcas14 591Ijetcas14 591
Ijetcas14 591
 
Concealed Data Aggregation with Dynamic Intrusion Detection System to Remove ...
Concealed Data Aggregation with Dynamic Intrusion Detection System to Remove ...Concealed Data Aggregation with Dynamic Intrusion Detection System to Remove ...
Concealed Data Aggregation with Dynamic Intrusion Detection System to Remove ...
 
CONCEALED DATA AGGREGATION WITH DYNAMIC INTRUSION DETECTION SYSTEM TO REMOVE ...
CONCEALED DATA AGGREGATION WITH DYNAMIC INTRUSION DETECTION SYSTEM TO REMOVE ...CONCEALED DATA AGGREGATION WITH DYNAMIC INTRUSION DETECTION SYSTEM TO REMOVE ...
CONCEALED DATA AGGREGATION WITH DYNAMIC INTRUSION DETECTION SYSTEM TO REMOVE ...
 
F04623943
F04623943F04623943
F04623943
 
International journal of computer science and innovation vol 2015-n1-paper5
International journal of computer science and innovation  vol 2015-n1-paper5International journal of computer science and innovation  vol 2015-n1-paper5
International journal of computer science and innovation vol 2015-n1-paper5
 
IRJET- Studies on Lifetime Enhancement Techniques for Wireless Sensor Network
IRJET- Studies on Lifetime Enhancement Techniques for Wireless Sensor NetworkIRJET- Studies on Lifetime Enhancement Techniques for Wireless Sensor Network
IRJET- Studies on Lifetime Enhancement Techniques for Wireless Sensor Network
 
Characterization of directed diffusion protocol in wireless sensor network
Characterization of directed diffusion protocol in wireless sensor networkCharacterization of directed diffusion protocol in wireless sensor network
Characterization of directed diffusion protocol in wireless sensor network
 
Energy Proficient and Security Protocol for WSN: A Review
Energy Proficient and Security Protocol for WSN: A ReviewEnergy Proficient and Security Protocol for WSN: A Review
Energy Proficient and Security Protocol for WSN: A Review
 
A Survey of Fuzzy Logic Based Congestion Estimation Techniques in Wireless S...
A Survey of Fuzzy Logic Based Congestion Estimation  Techniques in Wireless S...A Survey of Fuzzy Logic Based Congestion Estimation  Techniques in Wireless S...
A Survey of Fuzzy Logic Based Congestion Estimation Techniques in Wireless S...
 
S04404116120
S04404116120S04404116120
S04404116120
 
CUTTING DOWN ENERGY USAGE IN WIRELESS SENSOR NETWORKS USING DUTY CYCLE TECHNI...
CUTTING DOWN ENERGY USAGE IN WIRELESS SENSOR NETWORKS USING DUTY CYCLE TECHNI...CUTTING DOWN ENERGY USAGE IN WIRELESS SENSOR NETWORKS USING DUTY CYCLE TECHNI...
CUTTING DOWN ENERGY USAGE IN WIRELESS SENSOR NETWORKS USING DUTY CYCLE TECHNI...
 
CUTTING DOWN ENERGY USAGE IN WIRELESS SENSOR NETWORKS USING DUTY CYCLE TECHNI...
CUTTING DOWN ENERGY USAGE IN WIRELESS SENSOR NETWORKS USING DUTY CYCLE TECHNI...CUTTING DOWN ENERGY USAGE IN WIRELESS SENSOR NETWORKS USING DUTY CYCLE TECHNI...
CUTTING DOWN ENERGY USAGE IN WIRELESS SENSOR NETWORKS USING DUTY CYCLE TECHNI...
 
Ijarcet vol-2-issue-3-916-919
Ijarcet vol-2-issue-3-916-919Ijarcet vol-2-issue-3-916-919
Ijarcet vol-2-issue-3-916-919
 
EVENT DRIVEN ROUTING PROTOCOLS FOR WIRELESS SENSOR NETWORK- A SURVEY
EVENT DRIVEN ROUTING PROTOCOLS FOR  WIRELESS SENSOR NETWORK- A SURVEYEVENT DRIVEN ROUTING PROTOCOLS FOR  WIRELESS SENSOR NETWORK- A SURVEY
EVENT DRIVEN ROUTING PROTOCOLS FOR WIRELESS SENSOR NETWORK- A SURVEY
 
40120140503011
4012014050301140120140503011
40120140503011
 
A Survey of Routing Protocols for Structural Health Monitoring
A Survey of Routing Protocols for Structural Health MonitoringA Survey of Routing Protocols for Structural Health Monitoring
A Survey of Routing Protocols for Structural Health Monitoring
 
Design Issues and Applications of Wireless Sensor Network
Design Issues and Applications of Wireless Sensor NetworkDesign Issues and Applications of Wireless Sensor Network
Design Issues and Applications of Wireless Sensor Network
 

Mais de IJEEE

A survey on Energy Efficient ProtocolsLEACH, Fuzzy-based approach and Neural ...
A survey on Energy Efficient ProtocolsLEACH, Fuzzy-based approach and Neural ...A survey on Energy Efficient ProtocolsLEACH, Fuzzy-based approach and Neural ...
A survey on Energy Efficient ProtocolsLEACH, Fuzzy-based approach and Neural ...IJEEE
 
Implementation of Back-Propagation Neural Network using Scilab and its Conver...
Implementation of Back-Propagation Neural Network using Scilab and its Conver...Implementation of Back-Propagation Neural Network using Scilab and its Conver...
Implementation of Back-Propagation Neural Network using Scilab and its Conver...IJEEE
 
Automated Air Cooled Three Level Inverter system using Arduino
Automated Air Cooled Three Level Inverter system using ArduinoAutomated Air Cooled Three Level Inverter system using Arduino
Automated Air Cooled Three Level Inverter system using ArduinoIJEEE
 
Id136
Id136Id136
Id136IJEEE
 
Id135
Id135Id135
Id135IJEEE
 
An Approach to Speech and Iris based Multimodal Biometric System
An Approach to Speech and Iris based Multimodal Biometric SystemAn Approach to Speech and Iris based Multimodal Biometric System
An Approach to Speech and Iris based Multimodal Biometric SystemIJEEE
 
An Overview of EDFA Gain Flattening by Using Hybrid Amplifier
An Overview of EDFA Gain Flattening by Using Hybrid AmplifierAn Overview of EDFA Gain Flattening by Using Hybrid Amplifier
An Overview of EDFA Gain Flattening by Using Hybrid AmplifierIJEEE
 
Design and Implementation of FPGA Based Low Power Pipelined 64 Bit Risc Proce...
Design and Implementation of FPGA Based Low Power Pipelined 64 Bit Risc Proce...Design and Implementation of FPGA Based Low Power Pipelined 64 Bit Risc Proce...
Design and Implementation of FPGA Based Low Power Pipelined 64 Bit Risc Proce...IJEEE
 
Design of Image Segmentation Algorithm for Autonomous Vehicle Navigationusing...
Design of Image Segmentation Algorithm for Autonomous Vehicle Navigationusing...Design of Image Segmentation Algorithm for Autonomous Vehicle Navigationusing...
Design of Image Segmentation Algorithm for Autonomous Vehicle Navigationusing...IJEEE
 
Performance Analysis of GSM Network for Different Types of Antennas
Performance Analysis of GSM Network for Different Types of Antennas Performance Analysis of GSM Network for Different Types of Antennas
Performance Analysis of GSM Network for Different Types of Antennas IJEEE
 
On the Performance Analysis of Composite Multipath/Shadowing (Weibull-Log Nor...
On the Performance Analysis of Composite Multipath/Shadowing (Weibull-Log Nor...On the Performance Analysis of Composite Multipath/Shadowing (Weibull-Log Nor...
On the Performance Analysis of Composite Multipath/Shadowing (Weibull-Log Nor...IJEEE
 
Design Analysis of Delay Register with PTL Logic using 90 nm Technology
Design Analysis of Delay Register with PTL Logic using 90 nm TechnologyDesign Analysis of Delay Register with PTL Logic using 90 nm Technology
Design Analysis of Delay Register with PTL Logic using 90 nm TechnologyIJEEE
 
Carbon Nanotubes Based Sensor for Detection of Traces of Gas Molecules- A Review
Carbon Nanotubes Based Sensor for Detection of Traces of Gas Molecules- A ReviewCarbon Nanotubes Based Sensor for Detection of Traces of Gas Molecules- A Review
Carbon Nanotubes Based Sensor for Detection of Traces of Gas Molecules- A ReviewIJEEE
 
Routing Protocols in Zigbee Based networks: A Survey
Routing Protocols in Zigbee Based networks: A SurveyRouting Protocols in Zigbee Based networks: A Survey
Routing Protocols in Zigbee Based networks: A SurveyIJEEE
 
Layout Design Analysis of SR Flip Flop using CMOS Technology
Layout Design Analysis of SR Flip Flop using CMOS TechnologyLayout Design Analysis of SR Flip Flop using CMOS Technology
Layout Design Analysis of SR Flip Flop using CMOS TechnologyIJEEE
 
Codec Scheme for Power Optimization in VLSI Interconnects
Codec Scheme for Power Optimization in VLSI InterconnectsCodec Scheme for Power Optimization in VLSI Interconnects
Codec Scheme for Power Optimization in VLSI InterconnectsIJEEE
 
Design of Planar Inverted F-Antenna for Multiband Applications
Design of Planar Inverted F-Antenna for Multiband Applications Design of Planar Inverted F-Antenna for Multiband Applications
Design of Planar Inverted F-Antenna for Multiband Applications IJEEE
 
Design of CMOS Inverter for Low Power and High Speed using Mentor Graphics
Design of CMOS Inverter for Low Power and High Speed using Mentor GraphicsDesign of CMOS Inverter for Low Power and High Speed using Mentor Graphics
Design of CMOS Inverter for Low Power and High Speed using Mentor GraphicsIJEEE
 
Layout Design Analysis of CMOS Comparator using 180nm Technology
Layout Design Analysis of CMOS Comparator using 180nm TechnologyLayout Design Analysis of CMOS Comparator using 180nm Technology
Layout Design Analysis of CMOS Comparator using 180nm TechnologyIJEEE
 
A Survey on Image Segmentation and its Applications in Image Processing
A Survey on Image Segmentation and its Applications in Image Processing A Survey on Image Segmentation and its Applications in Image Processing
A Survey on Image Segmentation and its Applications in Image Processing IJEEE
 

Mais de IJEEE (20)

A survey on Energy Efficient ProtocolsLEACH, Fuzzy-based approach and Neural ...
A survey on Energy Efficient ProtocolsLEACH, Fuzzy-based approach and Neural ...A survey on Energy Efficient ProtocolsLEACH, Fuzzy-based approach and Neural ...
A survey on Energy Efficient ProtocolsLEACH, Fuzzy-based approach and Neural ...
 
Implementation of Back-Propagation Neural Network using Scilab and its Conver...
Implementation of Back-Propagation Neural Network using Scilab and its Conver...Implementation of Back-Propagation Neural Network using Scilab and its Conver...
Implementation of Back-Propagation Neural Network using Scilab and its Conver...
 
Automated Air Cooled Three Level Inverter system using Arduino
Automated Air Cooled Three Level Inverter system using ArduinoAutomated Air Cooled Three Level Inverter system using Arduino
Automated Air Cooled Three Level Inverter system using Arduino
 
Id136
Id136Id136
Id136
 
Id135
Id135Id135
Id135
 
An Approach to Speech and Iris based Multimodal Biometric System
An Approach to Speech and Iris based Multimodal Biometric SystemAn Approach to Speech and Iris based Multimodal Biometric System
An Approach to Speech and Iris based Multimodal Biometric System
 
An Overview of EDFA Gain Flattening by Using Hybrid Amplifier
An Overview of EDFA Gain Flattening by Using Hybrid AmplifierAn Overview of EDFA Gain Flattening by Using Hybrid Amplifier
An Overview of EDFA Gain Flattening by Using Hybrid Amplifier
 
Design and Implementation of FPGA Based Low Power Pipelined 64 Bit Risc Proce...
Design and Implementation of FPGA Based Low Power Pipelined 64 Bit Risc Proce...Design and Implementation of FPGA Based Low Power Pipelined 64 Bit Risc Proce...
Design and Implementation of FPGA Based Low Power Pipelined 64 Bit Risc Proce...
 
Design of Image Segmentation Algorithm for Autonomous Vehicle Navigationusing...
Design of Image Segmentation Algorithm for Autonomous Vehicle Navigationusing...Design of Image Segmentation Algorithm for Autonomous Vehicle Navigationusing...
Design of Image Segmentation Algorithm for Autonomous Vehicle Navigationusing...
 
Performance Analysis of GSM Network for Different Types of Antennas
Performance Analysis of GSM Network for Different Types of Antennas Performance Analysis of GSM Network for Different Types of Antennas
Performance Analysis of GSM Network for Different Types of Antennas
 
On the Performance Analysis of Composite Multipath/Shadowing (Weibull-Log Nor...
On the Performance Analysis of Composite Multipath/Shadowing (Weibull-Log Nor...On the Performance Analysis of Composite Multipath/Shadowing (Weibull-Log Nor...
On the Performance Analysis of Composite Multipath/Shadowing (Weibull-Log Nor...
 
Design Analysis of Delay Register with PTL Logic using 90 nm Technology
Design Analysis of Delay Register with PTL Logic using 90 nm TechnologyDesign Analysis of Delay Register with PTL Logic using 90 nm Technology
Design Analysis of Delay Register with PTL Logic using 90 nm Technology
 
Carbon Nanotubes Based Sensor for Detection of Traces of Gas Molecules- A Review
Carbon Nanotubes Based Sensor for Detection of Traces of Gas Molecules- A ReviewCarbon Nanotubes Based Sensor for Detection of Traces of Gas Molecules- A Review
Carbon Nanotubes Based Sensor for Detection of Traces of Gas Molecules- A Review
 
Routing Protocols in Zigbee Based networks: A Survey
Routing Protocols in Zigbee Based networks: A SurveyRouting Protocols in Zigbee Based networks: A Survey
Routing Protocols in Zigbee Based networks: A Survey
 
Layout Design Analysis of SR Flip Flop using CMOS Technology
Layout Design Analysis of SR Flip Flop using CMOS TechnologyLayout Design Analysis of SR Flip Flop using CMOS Technology
Layout Design Analysis of SR Flip Flop using CMOS Technology
 
Codec Scheme for Power Optimization in VLSI Interconnects
Codec Scheme for Power Optimization in VLSI InterconnectsCodec Scheme for Power Optimization in VLSI Interconnects
Codec Scheme for Power Optimization in VLSI Interconnects
 
Design of Planar Inverted F-Antenna for Multiband Applications
Design of Planar Inverted F-Antenna for Multiband Applications Design of Planar Inverted F-Antenna for Multiband Applications
Design of Planar Inverted F-Antenna for Multiband Applications
 
Design of CMOS Inverter for Low Power and High Speed using Mentor Graphics
Design of CMOS Inverter for Low Power and High Speed using Mentor GraphicsDesign of CMOS Inverter for Low Power and High Speed using Mentor Graphics
Design of CMOS Inverter for Low Power and High Speed using Mentor Graphics
 
Layout Design Analysis of CMOS Comparator using 180nm Technology
Layout Design Analysis of CMOS Comparator using 180nm TechnologyLayout Design Analysis of CMOS Comparator using 180nm Technology
Layout Design Analysis of CMOS Comparator using 180nm Technology
 
A Survey on Image Segmentation and its Applications in Image Processing
A Survey on Image Segmentation and its Applications in Image Processing A Survey on Image Segmentation and its Applications in Image Processing
A Survey on Image Segmentation and its Applications in Image Processing
 

Último

Thermal Engineering Unit - I & II . ppt
Thermal Engineering  Unit - I & II . pptThermal Engineering  Unit - I & II . ppt
Thermal Engineering Unit - I & II . pptDineshKumar4165
 
Intro To Electric Vehicles PDF Notes.pdf
Intro To Electric Vehicles PDF Notes.pdfIntro To Electric Vehicles PDF Notes.pdf
Intro To Electric Vehicles PDF Notes.pdfrs7054576148
 
Booking open Available Pune Call Girls Pargaon 6297143586 Call Hot Indian Gi...
Booking open Available Pune Call Girls Pargaon  6297143586 Call Hot Indian Gi...Booking open Available Pune Call Girls Pargaon  6297143586 Call Hot Indian Gi...
Booking open Available Pune Call Girls Pargaon 6297143586 Call Hot Indian Gi...Call Girls in Nagpur High Profile
 
UNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its PerformanceUNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its Performancesivaprakash250
 
Block diagram reduction techniques in control systems.ppt
Block diagram reduction techniques in control systems.pptBlock diagram reduction techniques in control systems.ppt
Block diagram reduction techniques in control systems.pptNANDHAKUMARA10
 
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXssuser89054b
 
Call Now ≜ 9953056974 â‰ŒđŸ” Call Girls In New Ashok Nagar â‰ŒđŸ” Delhi door step de...
Call Now ≜ 9953056974 â‰ŒđŸ” Call Girls In New Ashok Nagar  â‰ŒđŸ” Delhi door step de...Call Now ≜ 9953056974 â‰ŒđŸ” Call Girls In New Ashok Nagar  â‰ŒđŸ” Delhi door step de...
Call Now ≜ 9953056974 â‰ŒđŸ” Call Girls In New Ashok Nagar â‰ŒđŸ” Delhi door step de...9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
Call Girls in Ramesh Nagar Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
Call Girls in Ramesh Nagar Delhi 💯 Call Us 🔝9953056974 🔝 Escort ServiceCall Girls in Ramesh Nagar Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
Call Girls in Ramesh Nagar Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
Call Girls Walvekar Nagar Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Walvekar Nagar Call Me 7737669865 Budget Friendly No Advance BookingCall Girls Walvekar Nagar Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Walvekar Nagar Call Me 7737669865 Budget Friendly No Advance Bookingroncy bisnoi
 
Design For Accessibility: Getting it right from the start
Design For Accessibility: Getting it right from the startDesign For Accessibility: Getting it right from the start
Design For Accessibility: Getting it right from the startQuintin Balsdon
 
Online banking management system project.pdf
Online banking management system project.pdfOnline banking management system project.pdf
Online banking management system project.pdfKamal Acharya
 
Unit 1 - Soil Classification and Compaction.pdf
Unit 1 - Soil Classification and Compaction.pdfUnit 1 - Soil Classification and Compaction.pdf
Unit 1 - Soil Classification and Compaction.pdfRagavanV2
 
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Bookingdharasingh5698
 
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756dollysharma2066
 
Intze Overhead Water Tank Design by Working Stress - IS Method.pdf
Intze Overhead Water Tank  Design by Working Stress - IS Method.pdfIntze Overhead Water Tank  Design by Working Stress - IS Method.pdf
Intze Overhead Water Tank Design by Working Stress - IS Method.pdfSuman Jyoti
 
Call Girls Wakad Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Wakad Call Me 7737669865 Budget Friendly No Advance BookingCall Girls Wakad Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Wakad Call Me 7737669865 Budget Friendly No Advance Bookingroncy bisnoi
 
Bhosari ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready For ...
Bhosari ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready For ...Bhosari ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready For ...
Bhosari ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready For ...tanu pandey
 
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdfONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdfKamal Acharya
 
KubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghlyKubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghlysanyuktamishra911
 

Último (20)

Thermal Engineering Unit - I & II . ppt
Thermal Engineering  Unit - I & II . pptThermal Engineering  Unit - I & II . ppt
Thermal Engineering Unit - I & II . ppt
 
Intro To Electric Vehicles PDF Notes.pdf
Intro To Electric Vehicles PDF Notes.pdfIntro To Electric Vehicles PDF Notes.pdf
Intro To Electric Vehicles PDF Notes.pdf
 
Booking open Available Pune Call Girls Pargaon 6297143586 Call Hot Indian Gi...
Booking open Available Pune Call Girls Pargaon  6297143586 Call Hot Indian Gi...Booking open Available Pune Call Girls Pargaon  6297143586 Call Hot Indian Gi...
Booking open Available Pune Call Girls Pargaon 6297143586 Call Hot Indian Gi...
 
UNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its PerformanceUNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its Performance
 
Block diagram reduction techniques in control systems.ppt
Block diagram reduction techniques in control systems.pptBlock diagram reduction techniques in control systems.ppt
Block diagram reduction techniques in control systems.ppt
 
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
 
Call Now ≜ 9953056974 â‰ŒđŸ” Call Girls In New Ashok Nagar â‰ŒđŸ” Delhi door step de...
Call Now ≜ 9953056974 â‰ŒđŸ” Call Girls In New Ashok Nagar  â‰ŒđŸ” Delhi door step de...Call Now ≜ 9953056974 â‰ŒđŸ” Call Girls In New Ashok Nagar  â‰ŒđŸ” Delhi door step de...
Call Now ≜ 9953056974 â‰ŒđŸ” Call Girls In New Ashok Nagar â‰ŒđŸ” Delhi door step de...
 
Call Girls in Ramesh Nagar Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
Call Girls in Ramesh Nagar Delhi 💯 Call Us 🔝9953056974 🔝 Escort ServiceCall Girls in Ramesh Nagar Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
Call Girls in Ramesh Nagar Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
 
Call Girls Walvekar Nagar Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Walvekar Nagar Call Me 7737669865 Budget Friendly No Advance BookingCall Girls Walvekar Nagar Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Walvekar Nagar Call Me 7737669865 Budget Friendly No Advance Booking
 
Design For Accessibility: Getting it right from the start
Design For Accessibility: Getting it right from the startDesign For Accessibility: Getting it right from the start
Design For Accessibility: Getting it right from the start
 
Online banking management system project.pdf
Online banking management system project.pdfOnline banking management system project.pdf
Online banking management system project.pdf
 
Unit 1 - Soil Classification and Compaction.pdf
Unit 1 - Soil Classification and Compaction.pdfUnit 1 - Soil Classification and Compaction.pdf
Unit 1 - Soil Classification and Compaction.pdf
 
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
 
(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7
(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7
(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7
 
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
 
Intze Overhead Water Tank Design by Working Stress - IS Method.pdf
Intze Overhead Water Tank  Design by Working Stress - IS Method.pdfIntze Overhead Water Tank  Design by Working Stress - IS Method.pdf
Intze Overhead Water Tank Design by Working Stress - IS Method.pdf
 
Call Girls Wakad Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Wakad Call Me 7737669865 Budget Friendly No Advance BookingCall Girls Wakad Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Wakad Call Me 7737669865 Budget Friendly No Advance Booking
 
Bhosari ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready For ...
Bhosari ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready For ...Bhosari ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready For ...
Bhosari ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready For ...
 
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdfONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
 
KubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghlyKubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghly
 

EFFECTIVE AND SECURE DATA COMMUNICATION IN WSNs CONSIDERING TRANSFER MODULE OF NODES

  • 1. 9 ICRTEDC -2014 IJEEE, Vol. 1, Spl. Issue 2 (May, 2014) e-ISSN: 1694-2310 | p-ISSN: 1694-2426 EFFECTIVE AND SECURE DATA GV/ICRTEDC/02 COMMUNICATION IN WSNs CONSIDERING TRANSFER MODULE OF NODES 1 Dr. Dinesh Arora, 2 Dr.Hardeep Singh 1 Gurukul Vidyapeeth Institute of Engg. & Technology, Banur, Punjab, India 2 Indo Global College of Engg. & Technology, Mohali, Punjab, India 1 drdinesh169@gmail.com, 2 hardeep_saini17@yahoo.co.in ABSTRACT: Wireless network which allows users to access information and service regardless of their geographic position. These networks are highly distributed networks of small wireless nodes, monitors the environment or system by measuring physical parameters such as temperature, pressure. A network consists of numbers of nodes with one as a source and one as a destination. Data loss, high energy consumption, reduction in signal strength and interferences in data were various factors which incorrupt the transmission in Wireless sensor networks. A Bio-inspired clustering algorithm based on BFO has been proposed and investigation on energy efficient clustering algorithms related to WSNs has been done in this paper. The contribution of this paper related to use of Bacteria foraging algorithm firstly for WSNs for enhancing network lifetime of sensor nodes. Keywords: Wireless Sensor Network, Sensor Nodes, Routing in WSNs, BFO; 1. INTRODUCTION Wireless network which allows users to access information and service regardless of their geographic position provides advantage in terms of cost factor, flexibility, size and power consumption as it can operate in wide range of environment without the limitation of physical media when compared with wired technology. In wireless technology, message can be forwarded over multiple hops. Wireless networks operate in two basic modes. These are:  Infrastructure mode (BSS)  Ad-Hoc mode (IBSS) 1.1 Infrastructure mode In BSS mode, network is connected with central device called as access point (AP). All other communicating devices called as clients are connected to each other through central access point. Clients and access point must use the same label of an Ethernet jack on the wall called SSID. Clients and AP uses same SSID to identify the network. A mobile host interacts with a bridge in the network (called base station) within its communication radius. Channel is setup in the access point (AP) and discovered by clients. Typical example of infrastructure based wireless networks includes cellular networks, WI-FI, WI-MAX, satellite communication, radar etc. 1.2 Ad-Hoc Mode (IBSS) In Ad-Hoc mode, which also called as Independent Base Service Set (IBSS), no central access point (AP) is required. Here all nodes use the same SSID and channel. Here all nodes can exchange information without the use of pre-existing fixed network infrastructure. Devices are free to move in the network without bound to any agreement to stay connected. It is self-organizing and adaptive network where each mobile host itself acts as a router. Ad-Hoc network allows spontaneous formation and deformation of mobile networks. 2. LITERATURE SURVEY This section enlightens the earlier work done related to wireless sensor networks. Literature survey illustrating the various routing protocols for lifetime enhancement, throughput paths, best rouĂ©s and in field of wireless sensor network security. B.P.S Sahoo, Satyajit Rath, Deepak Puthal [1] presented the adaptive approach to find an optimal routing path from source to sink when the sensor node are deployed randomly deployed in a restricted service area with single link. Their analysis shows that the approach they followed reduces the message communication to find an optimal routing path. Hence the network consumes less energy and increase the lifetime of network. Asar Ali, Zeeshan Akbar [2] evaluate the performance of two different routing protocols like ad hoc on demand distance vector (AODV) and dynamic source routing (DSR) for monitoring of critical conditions with the help of important matrices like throughput and end to end delay in different scenarios. Based on result derived from simulation a conclusion is drawn on the comparison between these two different routing protocols with parameter like end-to-end delay and throughput. Theodore Zahariadis et al [3] present a trust aware, location based routing protocol which protects the WSN against routing attacks, and also support large scale WSN’s deployments. Their proposed solution has been shown to efficiently detect and avoid malicious nodes and has been implemented in state-of-the-art sensor nodes for a real-life test-bed. Their work focused on the assessment of the implementation cost and on the lessons learned through the design, implementation and validation process. The domain of WSNs applications is increasing
  • 2. ICRTEDC-2014 10 widely over the last few years. As severely constrained node resources, limited network resources and the requirement to operate in an ad hoc manner characterize this new type of networking, implementing security functionality to protect against adversary nodes becomes a challenging task. Guoxing Zhan et al [4] proposes a fact that multi hope routing in wireless sensor network offers little protection against deception through replaying routing information. It cannot be solved solely by encryption or authentication techniques. To secure multi-hop routing in WSNs against intruders exploiting the replay of routing information, we propose TARF, a trust-aware routing framework for WSNs. 3. ROUTING IN WSNs The Wireless networks are highly distributed networks of small wireless nodes, monitors the environment or system by measuring physical parameters such as temperature, pressure. A network consists of numbers of nodes with one as a source and one as a destination. In a wide area the number of nodes is not specified. Here the concentration point is neither routing nor transmission but deployment which means to distribute systematically or strategically. In Wireless sensor networks this arrangement method is called as sensor take battle station. These wireless sensor network’s faces numbers of following problems at the time of communication.  Issue regarding deployment  Issue regarding distance  Issue regarding energy consumption  Issue regarding coverage area 3.1 Bacteria Foraging Optimization in WSNs Bacterial Foraging Optimization (BFO) is a population- based numerical optimization algorithm. In recent years, bacterial foraging behaviour has provided rich source of solution in many engineering applications and computational model. It has been applied for solving practical engineering problems like optimal control, harmonic estimation, channel equalization etc. In this paper, BFO has been used for cluster head selection to provide improved energy efficiency in routing. The process of cluster head selection involves application of a clustering algorithm. This has been classically done with LEACH, K-Means and direct method [6]. 4. RESEARCH OBJECTIVE The aim and objective of our research incorporated in our paper covers the following steps. 1) Optimum route distance between nodes and sensors 2) Optimum or least power consumption between location points and sensors. 3) Maximum Bandwidth utilization. 4) Increase in Sensor Coverage. 5) Optimization of Mean location points of wireless sensors. 5. PROPOSED STEPS TO ACHIEVE THE OBJECTIVE  With minimum number of sensor nodes having maximum coverage in the network and the nodes are within the communication range.  By making optimized wireless clusters using the Euclidean distance from all the location nodes to the Sensor Nodes.  By making the Clusters of the sensor nodes with a corresponding central transceiver point which will be further chosen from a group of sensors.  By Optimizing the Sensors position within each individual cluster, using BFO.  6. PROBLEM FORMULATION In wireless sensor network data is transmitted through node to node where distance is the most effecting factor to the efficiency of the networks. Sensors are to be linked to many near falling nodes by determining their distances. If the distance is large than it will result to more energy consumption and even results to week the signal strength. If any sensor is linked to large number of nodes to reduce the coverage area cost, then it will produce delay and leads to more energy requirement. On other side if the to lower the deployment cost sensors should be located far from each other so that they may cover maximum area as well as maximum numbers of nodes. But this may increase wireless sensor node power consumption due to the energy needed to reach large distances. Data loss, high energy consumption, reduction in signal strength and interferences in data were various factors which incorrupt the transmission in Wireless sensor networks. 7. PROMBLEM SOLUTION For reduction of the challenged faced by the wireless sensor networks, we need to establish the sensors at a place where it results to better communication. For this various factors as distance, coverage area, signal strength, energy level all has to be determined. There are to two methods can be used.  Hit & trial method  Iterative optimization 8. SYSTEM DESIGN EVALUATION AND SIMULATION RESULTS This section includes results of the proposed algorithm in terms of various parameters by analyzing the result visually in network animator and graphically evaluating the performance of the proposed system in terms of standard parameters, which discussed later in this chapter. This section also incorporate the validity of proposed work by comparing the performance with existing system. 8.1 SIMULATION  Firstly calculate the total number of the users in the area under the wireless network and also determine the total numbers of sensors are to be used in the network for the communication between the different nodes.  Identify the initial position of all the nodes in the network with determining the rough positions of
  • 3. 11 ICRTEDC -2014 sensors anywhere in the coverage area, which means randomly.  Calculate the distance between nodes with respect to each other and their distance from the sensor nodes also. Based on this data, position of sensor node and how many numbers of nodes to be associated to it will be decided.  According to the clustered information, find out which node is associated to which sensor in the network. This clustered data provides the information about which node is connected to which sensor node and even tell what numbers of nodes are connected to the sensor nodes.  The point of interest is where to place the sensor node in the coverage area so that it may cover a wide area with no loss in data and providing low deployment cost and effective and strong signal strength. Keeping all these factors in mind “soft computing technique” is used to optimize the position of the sensors in the coverage area.  Soft computing is a technique in which emphasize gains in understanding system behavior and used for routing in the network. Sensors are placed at different positions and a fitness value or a threshold value is determined according to position with cohort to distance.  This process is repeated again and again for all numbers of sensor nodes in the wireless sensor networks to get the best position of the sensors in the network coverage area. Best position here specifies the position at which sensor when placed gives strongest signal strength with no loss in data during transmission and it is connected to maximum numbers of nodes without producing delays in the communications. 8.2 RESULTS 1) Getting initial total number of sensors in network: Here we defined the number of sensors we need, to place in the network. Initially let we want three sensors in the network. We can place any number of sensors in the network according to our requirement. Before entering the number of sensors in the network. 2) Getting initial total number of working nodes in network: After selecting the number of sensors we want to place in a network, we enter the number of nodes through which we decide the best location for sensor. These nodes decide the reliability of our network. Greater the number of nodes greater the chances of getting the best location of sensors. Get initial location of nodes of network by having user define and randomly generated x-y coordinates by selecting option 1 and option 2 from user. Figure 9.1: Plotting initial location of sensor and nodes in given network in different presentation Next step is to optimize sensor location as per their allotment and using Soft computing algorithm with fitness function. Figure 9.2: Optimization algorithm to find best location as per parameters. Figure 9.3: Best location finding by optimization algorithm in each round
  • 4. ICRTEDC-2014 12 Figure 9.4: Final optimized locations of sensors because of fitness function and BFO algorithm and finally plot to demonstrate the problem solution 10. CONCLUSION A bio-inspired clustering algorithm based on BFO has been proposed and investigation on energy efficient clustering algorithms related to WSNs has been done. This increases Network life of WSNs. The contribution of this paper related to use of Bacteria foraging algorithm firstly for WSNs for enhancing network lifetime of sensor nodes. To validate the algorithm, simulations had been carried out using MATLAB. Simulation results showed better performance of BFO as compared to other clustering protocols like LEACH, K-Means and direct method in terms of performance metrics like number of nodes and total energy dissipation in the system. Other bio-inspired algorithms like Ant colony optimization, artificial Immune system, Genetic algorithm (significant time and power consuming) can also be compared to BFO; but the challenge of reducing computational complexity still remains. REFERENCES 1. B. P. S. Sahoo and Deepak Puthal, “DRUG: An Energy- Efficient Data-Centric Routing Protocol for Wireless Sensor Network”, Manuscript Accepted for Publication in International Conference on Intelligent Computing, Communication & Devices (ICCD-2014) Springer Book Series on "Advances in Intelligent Systems and Computing. 2. Asar Ali Zeeshan Akbar,” Evaluation of AODV and DSR Routing Protocols of Wireless Sensor Networks for Monitoring Applications”, Master’s Degree Thesis, Karlskrona October 2009. 3. Theodore Zahariadis,Helen Leligou,Panagiotis Karkazis,Panagiotis Trakadas, “DESIGN AND IMPLEMENTATION OF A TRUST-AWARE ROUTING PROTOCOL FOR LARGE WSNs”, International Journal of Network Security & Its Applications (IJNSA), Vol.2, No.3, July 2010. 4. Guoxing Zhan, Weisong Shi and Julia Deng, “TARF: A Trust- Aware Routing Framework for Wireless Sensor Networks”, EWSN 2010, LNCS 5970, pp. 65–80, Springer-Verlag Berlin Heidelberg 2010. 5. Shuang Li, Alvin Lim and Cong Liu, “Improving QoS-based Routing by Limiting Interference in Lossy Wireless Sensor Networks”, International Journal of Wireless & Mobile Networks (IJWMN), Vol.2, No.4, November 2010. 6. Sanatan Mohanty, “Energy Efficient Routing Algorithms for Wireless Sensor Networks and Performance Evaluation of Quality of Service for IEEE 802.15.4 Networks”, M.Tech Thesis, National Institute of Technology, Rourkela-769008, January 2010.