SlideShare uma empresa Scribd logo
1 de 8
Baixar para ler offline
International Journal of Network Security & Its Applications (IJNSA), Vol.5, No.2, March 2013
DOI : 10.5121/ijnsa.2013.5209 117
CODE AWARE DYNAMIC SOURCE ROUTING FOR
DISTRIBUTED SENSOR NETWORK
M Abdul Rahiman1
, Nishanth Jain2
, Arun K. Dubey3
and G Manoj Kumar4
1
Director, AICTE, Ministry of HRD,Govt of India, New Delhi, INDIA
rehman_paika@yahoo.com
2
Cosultant,e-Gov, AICTE, Ministry of HRD, New Delhi, INDIA
3
Asst Professor, CSE, Bharati Vidyapeeth College of Engineering, New Delhi
4
Associate Professor, CSE, LBS Inst of Tech for Women, Trivandrum, Kerala
ABSTRACT
Sensor network facilitates monitoring and controlling of physical environments. These wireless networks
consist of dense collection of sensors capable of collection and dissemination of data. They have
application in variety of fields such as military purposes, environment monitoring etc. Typical deployment
of sensor network assumes central processing station or a gateway to which all other nodes route their
data using dynamic source routing (DSR). This causes congestion at central station and thus reduces the
efficiency of the network. In this work we will propose a better dynamic source routing technique using
network coding to reduce total number of transmission in sensor networks resulting in better efficiency.
KEYWORDS
Network Coding, Wireless Sensor Network, Dynamic Source Routing.
1. INTRODUCTION
Wireless sensor networks (WSNs) are one of the most popular networks used in computer
science. It consists of some autonomous sensors used to monitor various natural activities. These
natural activities may be pressure, temperature, sound vibration etc.. Sensor nodes collect data
from natural activities and pass it to central processing station or gateway called sink [1]. Lots of
researches have been made in various areas to enhance the overall throughput of WSNs.
Development of WSNs actuated by some important applications like military surveillance’s,
medical sciences, natural disaster control, etc. The topology of WSNs consists of multiple sources
and single sink. This causes some common problems like congestion at sink, limited resources,
etc. Because of limited resources inefficient DSR is also a major problem for WSNs.
2. DYNAMIC SOURCE ROUTING
Dynamic Source Routing protocol (DSR) is designed for specifically used in multi hop wireless
Ad hoc Network. It allows the network to be completely self organizing and self configuring. The
protocol consists of two mechanism route discovery and route maintenance. The use of source
routing allows packet routing to be trivially loop free. It eliminates the need for up to date routing
information in the intermediate nodes in which the packets are routed. The protocol operates
International Journal of Network Security & Its Applications (IJNSA), Vol.5, No.2, March 2013
118
entirely on demand. This also allows routing packet overhead of DSR to scale automatically to
only that needed to react to changes in the routers themselves in use.
3. NETWORK CODING
Network coding is the technique which is extensively used in wired networks, ad-hoc networks,
and distributed sensor networks, etc. Network coding is quite different from traditional
communication. Network coding achieves vast performance gains by permitting intermediate
nodes to carry out algebraic operations on the incoming data [10]. Network coding allows the
packets to encode and further forward it. The destination sink decodes the packets. Encoding is
simply XOR of data packets which will be called as encoded packet. XOR is simply exclusive-or
of the packets can easily be obtained by XOR truth table. Suppose node Px and Py are two
packets. Such that Px=10110 and Py=01101.Packet encoding=Px XOR Py=10110 XOR 01101=
11011=Pz. Packet decoding=Px XOR Pz=10110 XOR 11011=01101=Py and Py XOR Pz=01101
XOR 11011=10110=Px. Where Pz is encoded packet. Decoding is XOR of data packets (except
the missing one) and the encoded packet as a result the missing packet gets identified [2], [9],
[10].
Consider a sensor network in Figure 1a, having five nodes. Node S1, S2, S3 and S4 has some
packet data to share with each and every node. Assume all links have a time unit capacity. In
current approach, each node broadcasts their data and was listened by their neighboring node
according to Figure. Now there is a bottleneck on node N and have 4 data packets for
transmission. Node N broadcasts all 4 data packets one by one. Each node listen these broadcasts
and collects their data packet. This approach requires 8 broadcasts in all.
Now consider network coding approach illustrated with the help of same example. Each node
broadcasts their data which is collected by neighboring node. Now each sensor node S1, S2, S3
and S4 has 3 data packets received by their neighboring node as shown in Fig 1a. In Figure 1b
and Figure 1c Node N has 4 data packets to transmit. Using network encoding approach node N
encodes the data packets and broadcast it. Now all sensor nodes S1, S2, S3 and S4 listens this
encoded packet and decode these packets by using network decoding shown in Figure 1d. Now
this approach requires 5 broadcasts which are 37 % less than previously discussed approach. This
also reduces the bottleneck, congestion at sink and total transmission on the network and in the
process provides gain in bandwidth, efficiency and power resources of the nodes [14].
4. DEPLOYMENT STRATEGY FOR WSNS
Efficient deployment strategy is necessary to detect event occur in WSNs and obtain the real time
data. For example for a large dense forest there no need deploy WSNs in mountain region. This
can be done by deploying sub sensor networks in a distributed manner. Density of sensors
depends on the occurrence of events. The positions of sensors are predetermined and position of
sensor nodes identified by GPS systems. Each transmission contains a source ID and Sink ID and
transmission is directed to sink node [4], [7]. Proposed topology can be viewed as subsequent part
of large sensor network where each node taking part in data transmission using current
communication approaches.
5. RELATED WORK
In this section we explore the history of network coding and wireless dynamic source routing
(DSR). Ahlswede et al. [1] showed that with network coding, as symbol size approaches infinity,
International Journal of Network Security & Its Applications (IJNSA), Vol.5, No.2, March 2013
119
a source can multicast information at a rate approaching the smallest minimum cut between the
source and any receiver. Practical deployment of network coding is thoroughly described in [5],
[7], [8].Various network coding techniques like linear and random network coding are classified
in [9]. [6] Provides a systematic method to quantify the benefits of using network coding in the
presence of multiple concurrent unicast sessions. A robust network coding aware data aggregation
approach which will result in better performance of the network by reducing the number of
transmitted messages in the network is discussed in [4]. It also gives protection from link failure
to many-to-many network flows from multiple sensor nodes to sink nodes. Benefits of network
coding over wireless networks are described in [14]. Various efficient dynamic source routing
(DSR) techniques are explained in [3], [12], [13]. Also large WSNs topologies are described in
[4]. This gives us motivation to implement better dynamic source routing (DSR) for large WSNs
using network coding.
6. PROPOSED SCHEME
In this section we will discuss system model, proposed approach and algorithm for proposed
scheme.
6.1. System Model
In this work we have considered sensor nodes are deployed in a systematic manner to achieve
efficient network coding. These node senses data from the environment and transmits to sink
node. However these nodes are further classified into three categories. Sensor nodes, who senses
data and transmit, some relay nodes who simply forward the data packet to sink node and
aggregate node identifies the opportunity of network coding and performs it. The function ƒ is
used by the aggregate node to decide whether to apply network coding or not [4]. This topology is
recursive. Consider Figure 2 Node 1, 2,3,4,7 and 10 are initial nodes. These nodes are simply a
sink and relay nodes and it can be called as initial level L0 and it is contains 6 nodes. Now
topology is constructed recursively with Level L1, Level L2, Level L3......Level Lp. Level L1 has
total 12 nodes. 4 of them are aggregate nodes and 8 of them are sensor nodes. Hence we can say
Level L1 contains (r+q) nodes where r is number of sensor nodes and q is number of aggregate
nodes. Now Level L2 can be obtained by 2(r+q) nodes. This recursive method continues to obtain
a large sensor network and makes our topology scalable [4].
International Journal of Network Security & Its Applications (IJNSA), Vol.5, No.2, March 2013
120
To get better performance and efficient network coding we have to made sum assumptions.
• Node deployment is 2D.
• Each sensor node has unique id and sink node maintains the id these sensor nodes.
• All transmission contains Source-ID and Sink-ID.
• Nodes must approximately at equal distance.
• Let p and q are the two received data by an aggregate node and ƒ is a binomial function
which computes significant difference between the two data values and returns yes or no.
If p and q are differ not more than γ then the value of the function ƒ is false else it returns
true. The absolute value of the difference is denoted by d = p ~ q. ƒ :{ 0 if d < γ, 1 else}
6.2. Proposed Work
This research work would primarily concentrate on the design and development of sensor
networks and its overall throughput. Focus of the application on the better dynamic source routing
(DSR) technique using network coding to reduce total number of transmission in sensor networks
resulting in better efficiency. Specified sensor network topology is used as shown in Fig 2 to
achieve better results in wireless dynamic source routing (DSR) networks.
Figure 2: Sensor Network Topology
Node placement is in two dimensional as shown in Fig 2. Now node {1} is sink node. Nodes {5,
6, 8, and 9} are aggregate nodes. Nodes {2, 3, 4, 7, and 10} are relay nodes. Nodes {11, 12, 13,
14, 15, 16, 17 and 18} are sensor nodes.
For Example suppose sensor node 12 and 13 have some information to flood. Now node 12
forwards (Broadcasts) it’s information to relay node 10 and aggregate node 9 and sensor node 13
forwards its information to aggregate node 9. Relay node simply forwards its information to sink
15
6
Wireless Link
1
2 3
4
5
6
7
8
91
0
1
1 1
2
1
3
1
61
7
1
8
S
i
n
k
N
o
d
e
R
e
l
a
y
N
o
d
e
A
g
g
r
e
g
a
t
e
N
o
d
e
S
e
n
s
o
r
N
o
d
e
19
20
14
International Journal of Network Security & Its Applications (IJNSA), Vol.5, No.2, March 2013
121
node. Aggregate node 9 has two packets to forward. It encodes the packets using (XOR)
technique and further forwards it to sink. Now sink has two packets. One is data packet
transmitted by node 12 via relay node 10 and encoded packet transmitted by aggregate node 9. It
simply decode the packet by again XORing both the packets and collect the data packet
transmitted by sensor node 13. Here we can clearly see that sink node achieve the packets in 6
broadcasts instead of 8 which is currently done by wireless dynamic source routing (DSR).
Before hopping to algorithm 1 would like to put emphasis upon the point that we are not
providing the answer to the question: "When to encode data?”. For the purpose of this work we
have used random variable to decide upon when to encode, with equal probabilities.
6.3. Algorithm
To enable encoding and decoding of packets we have used two types of packets namely
normal_packet and code_packet. Where size of normal_packet is fixed and size of code_packet is
will be size of normal_packet plus size of header. Let at an aggregator node we need to encode
pkt1 and pkt2. This is done as following: pkt1 is XORed with pkt2 and is encapsulated under new
header and is then forwarded depending upon the new header. We have also included a bit in each
packet namely codeOn bit which is set if packet is code_packet and unset if it is normal_packet
(though it is redundant as type of packet can be identified by size) in our case. Decoding is
performed by first removing the additional header and then again XORing the packet with other
appropriate packets.
When aggregate node receives data from the sensor nodes function ƒ finds the difference between
the data. If difference is less than some predefined γ and is not significant then there is no need of
encoding and one of the data selected at random, is forwarded to sink node. If the difference is
greater than γ then aggregate node encode (XORs) data and forward to sink node. Each aggregate
node caches the previously received data from the sensor nodes. If data difference between
previously received data and currently received data is significant then encoding done and data
transmitted to sink node. Otherwise no encoding done and the data is transmitted normally.
Algorithm: Aggregate Heuristic(packet pkt1, packet pkt2)
//pkt1i& pkt2i is ith packet sent by leaf node 1 and leaf node 2 respectively.
{
Apply function f on data(pkt1i), data(pkt2i) and if it returns 0 then
{
If data(pkt1i),data(pkt1i-1) not equals to 0
then
{
Perform network coding on pkt1i and pkt1i-1 // pkt1i-1 is cached copy
Transmit data obtained by encoding in previous step
}
ElseIf data(pkt2i),data(pkt2i-1) not equals 0
{
Perform network coding on pkt2i and pkt2i-1
International Journal of Network Security & Its Applications (IJNSA), Vol.5, No.2, March 2013
122
Transmit data obtained by encoding in previous step
}
Else
{
Select either of the packet and transmit
}
}
Else
{
Perform network coding on pkt1 and pkt2
Transmit data obtained by encoding in previous step
}
//End of Algorithm
Function data(packet pkt)
{
Return data encapsulated in packet "pkt"
}
7. SIMULATION RESULTS
Given algorithm is implemented in ns-2.34. Traffic is generated using a CBR traffic generator at
leaf nodes. We have simulated the discussed algorithm on topologies of 20, 44 and 92 nodes. AS
mentioned earlier, function ƒ is simulated with the help of random variable. Caching is only
implemented at aggregate node with cache buffer size of two, one for each leaf node. Results of
simulations are given in Figure 3 for both types of network that is to say network without coding
and network with coding. Each simulation is run four times and so each bar of Figure 3 represents
average of four simulation runs. This is done to mitigate the effect of random variable and
simulation parameters.
Table 1:Coding Gain
No. of nodes Coding gain
20 1.46
44 1.36
92 0.84
One could easily see that for smaller network size (20, 44) total numbers of transmissions per unit
time have reduced. But for the network of 92 nodes it has actually increased. This could possibly
be because for large networks, numbers of collisions in network, without coding are more as
compared to one with network coding.
International Journal of Network Security & Its Applications (IJNSA), Vol.5, No.2, March 2013
123
Figure 3: Simulation result
Line graph for coding gain shown in Table 1. Now from concluded result of coding gain one can
clearly see that coding gain is more than 1 for 0-75 sensor nodes. Hence we can say network
efficiency gives better performance for this range for nodes. After that coding gain degrades to
less than 1. This could possibly be because for large networks, numbers of collisions in network,
with coding are more as compared to one without network coding.
3. CONCLUSIONS & FUTURE WORK
In this paper we have implemented the idea that the function ƒ is used by the aggregate node to
decide whether to apply network coding or not. We have found out that as the size of sensor
network increases, approach with network coding allows better bandwidth utilization. Though we
have not quantified, one could easily argue, as number of transmissions required to send one
packet from leaf node to sink nodes decreases it also provides significant energy savings at sensor
nodes. Although the topology suggested is scalable and robust due to multiple paths from leaf to
sink nodes, the cost effectiveness of this topology still remains an open question. It is also
challenging to come up with a good ƒ, as it depends a lot upon the application and environment.
REFERENCES
[1] Ian F. Akyildiz, Weilian Su, Yogesh Sankara subramaniam and Erda lCayirci, (2002) “ A Survey on
Sensor Networks”, Georgia Institute of Technology.
[2] Rudolf Ahlswede, NingCai, Shuo-Yen Robert Li, Raymond W. Yeung,(2000), “Network Information
Flow”, IEEE Transactions on Information Theory, Vol. 46, No. 4.
[3] Young-ri Choi , Mohamed G. Gouda ,Disciplined Flood Protocols in Sensor Networks, UTCS
Technical Report TR-05-03 ,The University of Texas at Austin.
[4] R. R. Rout , S.K. Ghosh , S. Chakrabarti,2009, Fourth International Conference on Industrial and
Information Systems, ICIIS 2009, 28 - 31 December 2009, Sri Lanka, “Network Coding-aware Data
Aggregation for a Distributed Wireless Sensor Network”, Indian Institute of Technology, Kharagpur.
[5] P. A. Chou, Y. Wu, and K. Jain, (2003), “Practical network coding”, Proc. Allerton Conf. Commun.,
[6] SudiptaSengupta, ShravanRayanchu, and Suman Banerjee, “ Network Coding-Aware Routing in
Wireless Networks”.
[7] S. Katti, H. Rahul, W. Hu, D. Katabi, M. Medard, and J. Crowcroft, (2006), Proc. ACM SIGCOMM,
Sep. 2006, pp. 243–254 , XORs in the air: Practical wireless network coding.
[8] Qunfeng Dong , Jianming Wu ,Wenjun Hu, Jon Crowcroft, “Practical Network Coding in Wireless
Networks” ,University of Wisconsin & Cambridge.
[9] Raymond W. Yeung, Shuo-Yen Robert Li, NingCai, Zhen Zhang, Network Coding Theory.
International Journal of Network Security & Its Applications (IJNSA), Vol.5, No.2, March 2013
124
[10] K V Rashmi, Nihar B Shah and P Vijay Kumar, (2010), “Network Coding”, IISc.
[12] AnanthKini, Vilas Veeraraghavan, Steven Weber, (2004), “Fast and efficient randomized dynamic
source routing (DSR) on lattice sensor networks”, Department of Electrical and Computer
Engineering, Drexel University.
[13] Ting Zhu, ZiguoZhong, Tian He, and Zhi-Li Zhang, Exploring Link Correlation for Efficient
Dynamic source routing (DSR) in Wireless Sensor Networks, University of Minnesota.
[14] Christina Fragouli, J¨orgWidmer, Jean-Yves Le Boudec, “On the Benefits of Network Coding for
Wireless Applications”.
Author
Dr. Abdul Rahiman M is currently working as Director in All India Council for
Technical Education (AICTE), Ministry of HRD, Government of India. He also served
as Director, Vocational Higher Secondary Education (VHSE), Government of Kerala.
He worked as Professor in the Department of Computer Science & Engineering in LBS
Institute of Technology for Women, Trivandrum, Kerala State, India. He did his
M.Tech degree in Computer Science from Kerala University in Computer Science with
specialization in Digital Image Computing and also undergone MBA degree in Systems and Post
Graduate Diploma in Human Resource Management from Kerala University. He has his PhD from
Karpagam University, Coimbatore in the area of pattern recognition. He has many publications in various
International Journals and International conference proceedings. He is a Life Member of Indian Society
for Technical Education (ISTE) and Computer Society of India (CSI)and also Member of International
Association of Computer Science & Information Technology (IACSIT). He is a member of Board of
Governors in Daman Diu Higher Education and also associated with many professional bodies.
He chaired many International Conferences and editorial board member of many International Journals.

Mais conteúdo relacionado

Mais procurados

A Survey on Topology Control and Maintenance in Wireless Sensor Networks
A Survey on Topology Control and Maintenance in Wireless Sensor NetworksA Survey on Topology Control and Maintenance in Wireless Sensor Networks
A Survey on Topology Control and Maintenance in Wireless Sensor Networksijeei-iaes
 
International Refereed Journal of Engineering and Science (IRJES)
International Refereed Journal of Engineering and Science (IRJES)International Refereed Journal of Engineering and Science (IRJES)
International Refereed Journal of Engineering and Science (IRJES)irjes
 
Energy efficient approach based on evolutionary algorithm for coverage contro...
Energy efficient approach based on evolutionary algorithm for coverage contro...Energy efficient approach based on evolutionary algorithm for coverage contro...
Energy efficient approach based on evolutionary algorithm for coverage contro...ijcseit
 
SR-Code: Smart Relay Network Coding for Data Collection for Wireless Sensor N...
SR-Code: Smart Relay Network Coding for Data Collection for Wireless Sensor N...SR-Code: Smart Relay Network Coding for Data Collection for Wireless Sensor N...
SR-Code: Smart Relay Network Coding for Data Collection for Wireless Sensor N...IJERA Editor
 
Localization for wireless sensor
Localization for wireless sensorLocalization for wireless sensor
Localization for wireless sensorIJCNCJournal
 
SECURED GREEDY PERIMETER STATELESS ROUTING FOR WIRELESS SENSOR NETWORKS
SECURED GREEDY PERIMETER STATELESS ROUTING FOR WIRELESS SENSOR NETWORKS SECURED GREEDY PERIMETER STATELESS ROUTING FOR WIRELESS SENSOR NETWORKS
SECURED GREEDY PERIMETER STATELESS ROUTING FOR WIRELESS SENSOR NETWORKS ijasuc
 
COMPARATIVE ANALYSIS OF ROUTE INFORMATION BASED ENHANCED DIVIDE AND RULE STRA...
COMPARATIVE ANALYSIS OF ROUTE INFORMATION BASED ENHANCED DIVIDE AND RULE STRA...COMPARATIVE ANALYSIS OF ROUTE INFORMATION BASED ENHANCED DIVIDE AND RULE STRA...
COMPARATIVE ANALYSIS OF ROUTE INFORMATION BASED ENHANCED DIVIDE AND RULE STRA...ijsc
 
Cut Detection in Wireless Sensor Network
Cut Detection in Wireless Sensor NetworkCut Detection in Wireless Sensor Network
Cut Detection in Wireless Sensor NetworkIJMTST Journal
 
1 p pranitha final_paper--1-5
1 p pranitha final_paper--1-51 p pranitha final_paper--1-5
1 p pranitha final_paper--1-5Alexander Decker
 

Mais procurados (15)

A Survey on Topology Control and Maintenance in Wireless Sensor Networks
A Survey on Topology Control and Maintenance in Wireless Sensor NetworksA Survey on Topology Control and Maintenance in Wireless Sensor Networks
A Survey on Topology Control and Maintenance in Wireless Sensor Networks
 
Fa36942946
Fa36942946Fa36942946
Fa36942946
 
International Refereed Journal of Engineering and Science (IRJES)
International Refereed Journal of Engineering and Science (IRJES)International Refereed Journal of Engineering and Science (IRJES)
International Refereed Journal of Engineering and Science (IRJES)
 
Q026201030106
Q026201030106Q026201030106
Q026201030106
 
iPGCON14_134
iPGCON14_134iPGCON14_134
iPGCON14_134
 
Energy efficient approach based on evolutionary algorithm for coverage contro...
Energy efficient approach based on evolutionary algorithm for coverage contro...Energy efficient approach based on evolutionary algorithm for coverage contro...
Energy efficient approach based on evolutionary algorithm for coverage contro...
 
SR-Code: Smart Relay Network Coding for Data Collection for Wireless Sensor N...
SR-Code: Smart Relay Network Coding for Data Collection for Wireless Sensor N...SR-Code: Smart Relay Network Coding for Data Collection for Wireless Sensor N...
SR-Code: Smart Relay Network Coding for Data Collection for Wireless Sensor N...
 
Ba24345348
Ba24345348Ba24345348
Ba24345348
 
Localization for wireless sensor
Localization for wireless sensorLocalization for wireless sensor
Localization for wireless sensor
 
Aj33201205
Aj33201205Aj33201205
Aj33201205
 
SECURED GREEDY PERIMETER STATELESS ROUTING FOR WIRELESS SENSOR NETWORKS
SECURED GREEDY PERIMETER STATELESS ROUTING FOR WIRELESS SENSOR NETWORKS SECURED GREEDY PERIMETER STATELESS ROUTING FOR WIRELESS SENSOR NETWORKS
SECURED GREEDY PERIMETER STATELESS ROUTING FOR WIRELESS SENSOR NETWORKS
 
COMPARATIVE ANALYSIS OF ROUTE INFORMATION BASED ENHANCED DIVIDE AND RULE STRA...
COMPARATIVE ANALYSIS OF ROUTE INFORMATION BASED ENHANCED DIVIDE AND RULE STRA...COMPARATIVE ANALYSIS OF ROUTE INFORMATION BASED ENHANCED DIVIDE AND RULE STRA...
COMPARATIVE ANALYSIS OF ROUTE INFORMATION BASED ENHANCED DIVIDE AND RULE STRA...
 
Cut Detection in Wireless Sensor Network
Cut Detection in Wireless Sensor NetworkCut Detection in Wireless Sensor Network
Cut Detection in Wireless Sensor Network
 
O026084087
O026084087O026084087
O026084087
 
1 p pranitha final_paper--1-5
1 p pranitha final_paper--1-51 p pranitha final_paper--1-5
1 p pranitha final_paper--1-5
 

Semelhante a CODE AWARE DYNAMIC SOURCE ROUTING FOR DISTRIBUTED SENSOR NETWORK

Shortest path algorithm for data transmission in wireless ad hoc sensor networks
Shortest path algorithm for data transmission in wireless ad hoc sensor networksShortest path algorithm for data transmission in wireless ad hoc sensor networks
Shortest path algorithm for data transmission in wireless ad hoc sensor networksijasuc
 
A Comparison of Routing Protocol for WSNs: Redundancy Based Approach A Compar...
A Comparison of Routing Protocol for WSNs: Redundancy Based Approach A Compar...A Comparison of Routing Protocol for WSNs: Redundancy Based Approach A Compar...
A Comparison of Routing Protocol for WSNs: Redundancy Based Approach A Compar...ijeei-iaes
 
Performance Analysis of Fault Detection in Round Trip Delay and Path Wireless...
Performance Analysis of Fault Detection in Round Trip Delay and Path Wireless...Performance Analysis of Fault Detection in Round Trip Delay and Path Wireless...
Performance Analysis of Fault Detection in Round Trip Delay and Path Wireless...Editor IJMTER
 
An Energy-Efficient Min-Max Optimization with RSA Security in Wireless Sensor...
An Energy-Efficient Min-Max Optimization with RSA Security in Wireless Sensor...An Energy-Efficient Min-Max Optimization with RSA Security in Wireless Sensor...
An Energy-Efficient Min-Max Optimization with RSA Security in Wireless Sensor...IJMTST Journal
 
Characterization of directed diffusion protocol in wireless sensor network
Characterization of directed diffusion protocol in wireless sensor networkCharacterization of directed diffusion protocol in wireless sensor network
Characterization of directed diffusion protocol in wireless sensor networkijwmn
 
Data Centric Approach Based Protocol using Evolutionary Approach in WSN
Data Centric Approach Based Protocol using Evolutionary Approach in WSNData Centric Approach Based Protocol using Evolutionary Approach in WSN
Data Centric Approach Based Protocol using Evolutionary Approach in WSNijsrd.com
 
Some aspects of wireless sensor networks
Some aspects of wireless sensor networksSome aspects of wireless sensor networks
Some aspects of wireless sensor networkspijans
 
Ijarcet vol-2-issue-2-576-581
Ijarcet vol-2-issue-2-576-581Ijarcet vol-2-issue-2-576-581
Ijarcet vol-2-issue-2-576-581Editor IJARCET
 
Proactive Data Reporting of Wireless sensor Network using Wake Up Scheduling ...
Proactive Data Reporting of Wireless sensor Network using Wake Up Scheduling ...Proactive Data Reporting of Wireless sensor Network using Wake Up Scheduling ...
Proactive Data Reporting of Wireless sensor Network using Wake Up Scheduling ...ijsrd.com
 
DATA TRANSMISSION IN WIRELESS SENSOR NETWORKS FOR EFFECTIVE AND SECURE COMMUN...
DATA TRANSMISSION IN WIRELESS SENSOR NETWORKS FOR EFFECTIVE AND SECURE COMMUN...DATA TRANSMISSION IN WIRELESS SENSOR NETWORKS FOR EFFECTIVE AND SECURE COMMUN...
DATA TRANSMISSION IN WIRELESS SENSOR NETWORKS FOR EFFECTIVE AND SECURE COMMUN...IJEEE
 
Grid-Based Multipath with Congestion Avoidance Routing Protocol
Grid-Based Multipath with Congestion Avoidance Routing ProtocolGrid-Based Multipath with Congestion Avoidance Routing Protocol
Grid-Based Multipath with Congestion Avoidance Routing Protocolijtsrd
 
Bidirectional data centric routing protocol to improve the energy efficiency ...
Bidirectional data centric routing protocol to improve the energy efficiency ...Bidirectional data centric routing protocol to improve the energy efficiency ...
Bidirectional data centric routing protocol to improve the energy efficiency ...prj_publication
 
ANN Based Secured Energy Efficient Routing in Wireless Sensor Networks with D...
ANN Based Secured Energy Efficient Routing in Wireless Sensor Networks with D...ANN Based Secured Energy Efficient Routing in Wireless Sensor Networks with D...
ANN Based Secured Energy Efficient Routing in Wireless Sensor Networks with D...ijtsrd
 
EFFECTIVE AND SECURE DATA COMMUNICATION IN WSNs CONSIDERING TRANSFER MODULE O...
EFFECTIVE AND SECURE DATA COMMUNICATION IN WSNs CONSIDERING TRANSFER MODULE O...EFFECTIVE AND SECURE DATA COMMUNICATION IN WSNs CONSIDERING TRANSFER MODULE O...
EFFECTIVE AND SECURE DATA COMMUNICATION IN WSNs CONSIDERING TRANSFER MODULE O...IJEEE
 
The International Journal of Engineering and Science (IJES)
The International Journal of Engineering and Science (IJES)The International Journal of Engineering and Science (IJES)
The International Journal of Engineering and Science (IJES)theijes
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)IJERD Editor
 
Spatial Correlation Based Medium Access Control Protocol Using DSR & AODV Rou...
Spatial Correlation Based Medium Access Control Protocol Using DSR & AODV Rou...Spatial Correlation Based Medium Access Control Protocol Using DSR & AODV Rou...
Spatial Correlation Based Medium Access Control Protocol Using DSR & AODV Rou...IOSR Journals
 
Secure and Efficient DiDrip Protocol for Improving Performance of WSNs
Secure and Efficient DiDrip Protocol for Improving Performance of WSNsSecure and Efficient DiDrip Protocol for Improving Performance of WSNs
Secure and Efficient DiDrip Protocol for Improving Performance of WSNsINFOGAIN PUBLICATION
 

Semelhante a CODE AWARE DYNAMIC SOURCE ROUTING FOR DISTRIBUTED SENSOR NETWORK (20)

Shortest path algorithm for data transmission in wireless ad hoc sensor networks
Shortest path algorithm for data transmission in wireless ad hoc sensor networksShortest path algorithm for data transmission in wireless ad hoc sensor networks
Shortest path algorithm for data transmission in wireless ad hoc sensor networks
 
A Comparison of Routing Protocol for WSNs: Redundancy Based Approach A Compar...
A Comparison of Routing Protocol for WSNs: Redundancy Based Approach A Compar...A Comparison of Routing Protocol for WSNs: Redundancy Based Approach A Compar...
A Comparison of Routing Protocol for WSNs: Redundancy Based Approach A Compar...
 
Performance Analysis of Fault Detection in Round Trip Delay and Path Wireless...
Performance Analysis of Fault Detection in Round Trip Delay and Path Wireless...Performance Analysis of Fault Detection in Round Trip Delay and Path Wireless...
Performance Analysis of Fault Detection in Round Trip Delay and Path Wireless...
 
An Energy-Efficient Min-Max Optimization with RSA Security in Wireless Sensor...
An Energy-Efficient Min-Max Optimization with RSA Security in Wireless Sensor...An Energy-Efficient Min-Max Optimization with RSA Security in Wireless Sensor...
An Energy-Efficient Min-Max Optimization with RSA Security in Wireless Sensor...
 
Characterization of directed diffusion protocol in wireless sensor network
Characterization of directed diffusion protocol in wireless sensor networkCharacterization of directed diffusion protocol in wireless sensor network
Characterization of directed diffusion protocol in wireless sensor network
 
Data Centric Approach Based Protocol using Evolutionary Approach in WSN
Data Centric Approach Based Protocol using Evolutionary Approach in WSNData Centric Approach Based Protocol using Evolutionary Approach in WSN
Data Centric Approach Based Protocol using Evolutionary Approach in WSN
 
Some aspects of wireless sensor networks
Some aspects of wireless sensor networksSome aspects of wireless sensor networks
Some aspects of wireless sensor networks
 
Ijarcet vol-2-issue-2-576-581
Ijarcet vol-2-issue-2-576-581Ijarcet vol-2-issue-2-576-581
Ijarcet vol-2-issue-2-576-581
 
Proactive Data Reporting of Wireless sensor Network using Wake Up Scheduling ...
Proactive Data Reporting of Wireless sensor Network using Wake Up Scheduling ...Proactive Data Reporting of Wireless sensor Network using Wake Up Scheduling ...
Proactive Data Reporting of Wireless sensor Network using Wake Up Scheduling ...
 
DATA TRANSMISSION IN WIRELESS SENSOR NETWORKS FOR EFFECTIVE AND SECURE COMMUN...
DATA TRANSMISSION IN WIRELESS SENSOR NETWORKS FOR EFFECTIVE AND SECURE COMMUN...DATA TRANSMISSION IN WIRELESS SENSOR NETWORKS FOR EFFECTIVE AND SECURE COMMUN...
DATA TRANSMISSION IN WIRELESS SENSOR NETWORKS FOR EFFECTIVE AND SECURE COMMUN...
 
Grid-Based Multipath with Congestion Avoidance Routing Protocol
Grid-Based Multipath with Congestion Avoidance Routing ProtocolGrid-Based Multipath with Congestion Avoidance Routing Protocol
Grid-Based Multipath with Congestion Avoidance Routing Protocol
 
Bidirectional data centric routing protocol to improve the energy efficiency ...
Bidirectional data centric routing protocol to improve the energy efficiency ...Bidirectional data centric routing protocol to improve the energy efficiency ...
Bidirectional data centric routing protocol to improve the energy efficiency ...
 
ANN Based Secured Energy Efficient Routing in Wireless Sensor Networks with D...
ANN Based Secured Energy Efficient Routing in Wireless Sensor Networks with D...ANN Based Secured Energy Efficient Routing in Wireless Sensor Networks with D...
ANN Based Secured Energy Efficient Routing in Wireless Sensor Networks with D...
 
EFFECTIVE AND SECURE DATA COMMUNICATION IN WSNs CONSIDERING TRANSFER MODULE O...
EFFECTIVE AND SECURE DATA COMMUNICATION IN WSNs CONSIDERING TRANSFER MODULE O...EFFECTIVE AND SECURE DATA COMMUNICATION IN WSNs CONSIDERING TRANSFER MODULE O...
EFFECTIVE AND SECURE DATA COMMUNICATION IN WSNs CONSIDERING TRANSFER MODULE O...
 
The International Journal of Engineering and Science (IJES)
The International Journal of Engineering and Science (IJES)The International Journal of Engineering and Science (IJES)
The International Journal of Engineering and Science (IJES)
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)
 
Spatial Correlation Based Medium Access Control Protocol Using DSR & AODV Rou...
Spatial Correlation Based Medium Access Control Protocol Using DSR & AODV Rou...Spatial Correlation Based Medium Access Control Protocol Using DSR & AODV Rou...
Spatial Correlation Based Medium Access Control Protocol Using DSR & AODV Rou...
 
Secure and Efficient DiDrip Protocol for Improving Performance of WSNs
Secure and Efficient DiDrip Protocol for Improving Performance of WSNsSecure and Efficient DiDrip Protocol for Improving Performance of WSNs
Secure and Efficient DiDrip Protocol for Improving Performance of WSNs
 
0512ijdps26
0512ijdps260512ijdps26
0512ijdps26
 
Ijetcas14 591
Ijetcas14 591Ijetcas14 591
Ijetcas14 591
 

Último

Engineering Mechanics Chapter 5 Equilibrium of a Rigid Body
Engineering Mechanics  Chapter 5  Equilibrium of a Rigid BodyEngineering Mechanics  Chapter 5  Equilibrium of a Rigid Body
Engineering Mechanics Chapter 5 Equilibrium of a Rigid BodyAhmadHajasad2
 
Technology Features of Apollo HDD Machine, Its Technical Specification with C...
Technology Features of Apollo HDD Machine, Its Technical Specification with C...Technology Features of Apollo HDD Machine, Its Technical Specification with C...
Technology Features of Apollo HDD Machine, Its Technical Specification with C...Apollo Techno Industries Pvt Ltd
 
Strategies of Urban Morphologyfor Improving Outdoor Thermal Comfort and Susta...
Strategies of Urban Morphologyfor Improving Outdoor Thermal Comfort and Susta...Strategies of Urban Morphologyfor Improving Outdoor Thermal Comfort and Susta...
Strategies of Urban Morphologyfor Improving Outdoor Thermal Comfort and Susta...amrabdallah9
 
Lecture 1: Basics of trigonometry (surveying)
Lecture 1: Basics of trigonometry (surveying)Lecture 1: Basics of trigonometry (surveying)
Lecture 1: Basics of trigonometry (surveying)Bahzad5
 
Renewable Energy & Entrepreneurship Workshop_21Feb2024.pdf
Renewable Energy & Entrepreneurship Workshop_21Feb2024.pdfRenewable Energy & Entrepreneurship Workshop_21Feb2024.pdf
Renewable Energy & Entrepreneurship Workshop_21Feb2024.pdfodunowoeminence2019
 
SATELITE COMMUNICATION UNIT 1 CEC352 REGULATION 2021 PPT BASICS OF SATELITE ....
SATELITE COMMUNICATION UNIT 1 CEC352 REGULATION 2021 PPT BASICS OF SATELITE ....SATELITE COMMUNICATION UNIT 1 CEC352 REGULATION 2021 PPT BASICS OF SATELITE ....
SATELITE COMMUNICATION UNIT 1 CEC352 REGULATION 2021 PPT BASICS OF SATELITE ....santhyamuthu1
 
ASME BPVC 2023 Section I para leer y entender
ASME BPVC 2023 Section I para leer y entenderASME BPVC 2023 Section I para leer y entender
ASME BPVC 2023 Section I para leer y entenderjuancarlos286641
 
cloud computing notes for anna university syllabus
cloud computing notes for anna university syllabuscloud computing notes for anna university syllabus
cloud computing notes for anna university syllabusViolet Violet
 
Best-NO1 Best Rohani Amil In Lahore Kala Ilam In Lahore Kala Jadu Amil In Lah...
Best-NO1 Best Rohani Amil In Lahore Kala Ilam In Lahore Kala Jadu Amil In Lah...Best-NO1 Best Rohani Amil In Lahore Kala Ilam In Lahore Kala Jadu Amil In Lah...
Best-NO1 Best Rohani Amil In Lahore Kala Ilam In Lahore Kala Jadu Amil In Lah...Amil baba
 
Dev.bg DevOps March 2024 Monitoring & Logging
Dev.bg DevOps March 2024 Monitoring & LoggingDev.bg DevOps March 2024 Monitoring & Logging
Dev.bg DevOps March 2024 Monitoring & LoggingMarian Marinov
 
ChatGPT-and-Generative-AI-Landscape Working of generative ai search
ChatGPT-and-Generative-AI-Landscape Working of generative ai searchChatGPT-and-Generative-AI-Landscape Working of generative ai search
ChatGPT-and-Generative-AI-Landscape Working of generative ai searchrohitcse52
 
Gender Bias in Engineer, Honors 203 Project
Gender Bias in Engineer, Honors 203 ProjectGender Bias in Engineer, Honors 203 Project
Gender Bias in Engineer, Honors 203 Projectreemakb03
 
SUMMER TRAINING REPORT ON BUILDING CONSTRUCTION.docx
SUMMER TRAINING REPORT ON BUILDING CONSTRUCTION.docxSUMMER TRAINING REPORT ON BUILDING CONSTRUCTION.docx
SUMMER TRAINING REPORT ON BUILDING CONSTRUCTION.docxNaveenVerma126
 
Guardians and Glitches: Navigating the Duality of Gen AI in AppSec
Guardians and Glitches: Navigating the Duality of Gen AI in AppSecGuardians and Glitches: Navigating the Duality of Gen AI in AppSec
Guardians and Glitches: Navigating the Duality of Gen AI in AppSecTrupti Shiralkar, CISSP
 
Summer training report on BUILDING CONSTRUCTION for DIPLOMA Students.pdf
Summer training report on BUILDING CONSTRUCTION for DIPLOMA Students.pdfSummer training report on BUILDING CONSTRUCTION for DIPLOMA Students.pdf
Summer training report on BUILDING CONSTRUCTION for DIPLOMA Students.pdfNaveenVerma126
 
Nodal seismic construction requirements.pptx
Nodal seismic construction requirements.pptxNodal seismic construction requirements.pptx
Nodal seismic construction requirements.pptxwendy cai
 
The relationship between iot and communication technology
The relationship between iot and communication technologyThe relationship between iot and communication technology
The relationship between iot and communication technologyabdulkadirmukarram03
 
EPE3163_Hydro power stations_Unit2_Lect2.pptx
EPE3163_Hydro power stations_Unit2_Lect2.pptxEPE3163_Hydro power stations_Unit2_Lect2.pptx
EPE3163_Hydro power stations_Unit2_Lect2.pptxJoseeMusabyimana
 

Último (20)

Engineering Mechanics Chapter 5 Equilibrium of a Rigid Body
Engineering Mechanics  Chapter 5  Equilibrium of a Rigid BodyEngineering Mechanics  Chapter 5  Equilibrium of a Rigid Body
Engineering Mechanics Chapter 5 Equilibrium of a Rigid Body
 
Technology Features of Apollo HDD Machine, Its Technical Specification with C...
Technology Features of Apollo HDD Machine, Its Technical Specification with C...Technology Features of Apollo HDD Machine, Its Technical Specification with C...
Technology Features of Apollo HDD Machine, Its Technical Specification with C...
 
Strategies of Urban Morphologyfor Improving Outdoor Thermal Comfort and Susta...
Strategies of Urban Morphologyfor Improving Outdoor Thermal Comfort and Susta...Strategies of Urban Morphologyfor Improving Outdoor Thermal Comfort and Susta...
Strategies of Urban Morphologyfor Improving Outdoor Thermal Comfort and Susta...
 
Lecture 1: Basics of trigonometry (surveying)
Lecture 1: Basics of trigonometry (surveying)Lecture 1: Basics of trigonometry (surveying)
Lecture 1: Basics of trigonometry (surveying)
 
Renewable Energy & Entrepreneurship Workshop_21Feb2024.pdf
Renewable Energy & Entrepreneurship Workshop_21Feb2024.pdfRenewable Energy & Entrepreneurship Workshop_21Feb2024.pdf
Renewable Energy & Entrepreneurship Workshop_21Feb2024.pdf
 
SATELITE COMMUNICATION UNIT 1 CEC352 REGULATION 2021 PPT BASICS OF SATELITE ....
SATELITE COMMUNICATION UNIT 1 CEC352 REGULATION 2021 PPT BASICS OF SATELITE ....SATELITE COMMUNICATION UNIT 1 CEC352 REGULATION 2021 PPT BASICS OF SATELITE ....
SATELITE COMMUNICATION UNIT 1 CEC352 REGULATION 2021 PPT BASICS OF SATELITE ....
 
Lecture 4 .pdf
Lecture 4                              .pdfLecture 4                              .pdf
Lecture 4 .pdf
 
ASME BPVC 2023 Section I para leer y entender
ASME BPVC 2023 Section I para leer y entenderASME BPVC 2023 Section I para leer y entender
ASME BPVC 2023 Section I para leer y entender
 
cloud computing notes for anna university syllabus
cloud computing notes for anna university syllabuscloud computing notes for anna university syllabus
cloud computing notes for anna university syllabus
 
Best-NO1 Best Rohani Amil In Lahore Kala Ilam In Lahore Kala Jadu Amil In Lah...
Best-NO1 Best Rohani Amil In Lahore Kala Ilam In Lahore Kala Jadu Amil In Lah...Best-NO1 Best Rohani Amil In Lahore Kala Ilam In Lahore Kala Jadu Amil In Lah...
Best-NO1 Best Rohani Amil In Lahore Kala Ilam In Lahore Kala Jadu Amil In Lah...
 
Dev.bg DevOps March 2024 Monitoring & Logging
Dev.bg DevOps March 2024 Monitoring & LoggingDev.bg DevOps March 2024 Monitoring & Logging
Dev.bg DevOps March 2024 Monitoring & Logging
 
ChatGPT-and-Generative-AI-Landscape Working of generative ai search
ChatGPT-and-Generative-AI-Landscape Working of generative ai searchChatGPT-and-Generative-AI-Landscape Working of generative ai search
ChatGPT-and-Generative-AI-Landscape Working of generative ai search
 
Gender Bias in Engineer, Honors 203 Project
Gender Bias in Engineer, Honors 203 ProjectGender Bias in Engineer, Honors 203 Project
Gender Bias in Engineer, Honors 203 Project
 
SUMMER TRAINING REPORT ON BUILDING CONSTRUCTION.docx
SUMMER TRAINING REPORT ON BUILDING CONSTRUCTION.docxSUMMER TRAINING REPORT ON BUILDING CONSTRUCTION.docx
SUMMER TRAINING REPORT ON BUILDING CONSTRUCTION.docx
 
Guardians and Glitches: Navigating the Duality of Gen AI in AppSec
Guardians and Glitches: Navigating the Duality of Gen AI in AppSecGuardians and Glitches: Navigating the Duality of Gen AI in AppSec
Guardians and Glitches: Navigating the Duality of Gen AI in AppSec
 
Lecture 2 .pdf
Lecture 2                           .pdfLecture 2                           .pdf
Lecture 2 .pdf
 
Summer training report on BUILDING CONSTRUCTION for DIPLOMA Students.pdf
Summer training report on BUILDING CONSTRUCTION for DIPLOMA Students.pdfSummer training report on BUILDING CONSTRUCTION for DIPLOMA Students.pdf
Summer training report on BUILDING CONSTRUCTION for DIPLOMA Students.pdf
 
Nodal seismic construction requirements.pptx
Nodal seismic construction requirements.pptxNodal seismic construction requirements.pptx
Nodal seismic construction requirements.pptx
 
The relationship between iot and communication technology
The relationship between iot and communication technologyThe relationship between iot and communication technology
The relationship between iot and communication technology
 
EPE3163_Hydro power stations_Unit2_Lect2.pptx
EPE3163_Hydro power stations_Unit2_Lect2.pptxEPE3163_Hydro power stations_Unit2_Lect2.pptx
EPE3163_Hydro power stations_Unit2_Lect2.pptx
 

CODE AWARE DYNAMIC SOURCE ROUTING FOR DISTRIBUTED SENSOR NETWORK

  • 1. International Journal of Network Security & Its Applications (IJNSA), Vol.5, No.2, March 2013 DOI : 10.5121/ijnsa.2013.5209 117 CODE AWARE DYNAMIC SOURCE ROUTING FOR DISTRIBUTED SENSOR NETWORK M Abdul Rahiman1 , Nishanth Jain2 , Arun K. Dubey3 and G Manoj Kumar4 1 Director, AICTE, Ministry of HRD,Govt of India, New Delhi, INDIA rehman_paika@yahoo.com 2 Cosultant,e-Gov, AICTE, Ministry of HRD, New Delhi, INDIA 3 Asst Professor, CSE, Bharati Vidyapeeth College of Engineering, New Delhi 4 Associate Professor, CSE, LBS Inst of Tech for Women, Trivandrum, Kerala ABSTRACT Sensor network facilitates monitoring and controlling of physical environments. These wireless networks consist of dense collection of sensors capable of collection and dissemination of data. They have application in variety of fields such as military purposes, environment monitoring etc. Typical deployment of sensor network assumes central processing station or a gateway to which all other nodes route their data using dynamic source routing (DSR). This causes congestion at central station and thus reduces the efficiency of the network. In this work we will propose a better dynamic source routing technique using network coding to reduce total number of transmission in sensor networks resulting in better efficiency. KEYWORDS Network Coding, Wireless Sensor Network, Dynamic Source Routing. 1. INTRODUCTION Wireless sensor networks (WSNs) are one of the most popular networks used in computer science. It consists of some autonomous sensors used to monitor various natural activities. These natural activities may be pressure, temperature, sound vibration etc.. Sensor nodes collect data from natural activities and pass it to central processing station or gateway called sink [1]. Lots of researches have been made in various areas to enhance the overall throughput of WSNs. Development of WSNs actuated by some important applications like military surveillance’s, medical sciences, natural disaster control, etc. The topology of WSNs consists of multiple sources and single sink. This causes some common problems like congestion at sink, limited resources, etc. Because of limited resources inefficient DSR is also a major problem for WSNs. 2. DYNAMIC SOURCE ROUTING Dynamic Source Routing protocol (DSR) is designed for specifically used in multi hop wireless Ad hoc Network. It allows the network to be completely self organizing and self configuring. The protocol consists of two mechanism route discovery and route maintenance. The use of source routing allows packet routing to be trivially loop free. It eliminates the need for up to date routing information in the intermediate nodes in which the packets are routed. The protocol operates
  • 2. International Journal of Network Security & Its Applications (IJNSA), Vol.5, No.2, March 2013 118 entirely on demand. This also allows routing packet overhead of DSR to scale automatically to only that needed to react to changes in the routers themselves in use. 3. NETWORK CODING Network coding is the technique which is extensively used in wired networks, ad-hoc networks, and distributed sensor networks, etc. Network coding is quite different from traditional communication. Network coding achieves vast performance gains by permitting intermediate nodes to carry out algebraic operations on the incoming data [10]. Network coding allows the packets to encode and further forward it. The destination sink decodes the packets. Encoding is simply XOR of data packets which will be called as encoded packet. XOR is simply exclusive-or of the packets can easily be obtained by XOR truth table. Suppose node Px and Py are two packets. Such that Px=10110 and Py=01101.Packet encoding=Px XOR Py=10110 XOR 01101= 11011=Pz. Packet decoding=Px XOR Pz=10110 XOR 11011=01101=Py and Py XOR Pz=01101 XOR 11011=10110=Px. Where Pz is encoded packet. Decoding is XOR of data packets (except the missing one) and the encoded packet as a result the missing packet gets identified [2], [9], [10]. Consider a sensor network in Figure 1a, having five nodes. Node S1, S2, S3 and S4 has some packet data to share with each and every node. Assume all links have a time unit capacity. In current approach, each node broadcasts their data and was listened by their neighboring node according to Figure. Now there is a bottleneck on node N and have 4 data packets for transmission. Node N broadcasts all 4 data packets one by one. Each node listen these broadcasts and collects their data packet. This approach requires 8 broadcasts in all. Now consider network coding approach illustrated with the help of same example. Each node broadcasts their data which is collected by neighboring node. Now each sensor node S1, S2, S3 and S4 has 3 data packets received by their neighboring node as shown in Fig 1a. In Figure 1b and Figure 1c Node N has 4 data packets to transmit. Using network encoding approach node N encodes the data packets and broadcast it. Now all sensor nodes S1, S2, S3 and S4 listens this encoded packet and decode these packets by using network decoding shown in Figure 1d. Now this approach requires 5 broadcasts which are 37 % less than previously discussed approach. This also reduces the bottleneck, congestion at sink and total transmission on the network and in the process provides gain in bandwidth, efficiency and power resources of the nodes [14]. 4. DEPLOYMENT STRATEGY FOR WSNS Efficient deployment strategy is necessary to detect event occur in WSNs and obtain the real time data. For example for a large dense forest there no need deploy WSNs in mountain region. This can be done by deploying sub sensor networks in a distributed manner. Density of sensors depends on the occurrence of events. The positions of sensors are predetermined and position of sensor nodes identified by GPS systems. Each transmission contains a source ID and Sink ID and transmission is directed to sink node [4], [7]. Proposed topology can be viewed as subsequent part of large sensor network where each node taking part in data transmission using current communication approaches. 5. RELATED WORK In this section we explore the history of network coding and wireless dynamic source routing (DSR). Ahlswede et al. [1] showed that with network coding, as symbol size approaches infinity,
  • 3. International Journal of Network Security & Its Applications (IJNSA), Vol.5, No.2, March 2013 119 a source can multicast information at a rate approaching the smallest minimum cut between the source and any receiver. Practical deployment of network coding is thoroughly described in [5], [7], [8].Various network coding techniques like linear and random network coding are classified in [9]. [6] Provides a systematic method to quantify the benefits of using network coding in the presence of multiple concurrent unicast sessions. A robust network coding aware data aggregation approach which will result in better performance of the network by reducing the number of transmitted messages in the network is discussed in [4]. It also gives protection from link failure to many-to-many network flows from multiple sensor nodes to sink nodes. Benefits of network coding over wireless networks are described in [14]. Various efficient dynamic source routing (DSR) techniques are explained in [3], [12], [13]. Also large WSNs topologies are described in [4]. This gives us motivation to implement better dynamic source routing (DSR) for large WSNs using network coding. 6. PROPOSED SCHEME In this section we will discuss system model, proposed approach and algorithm for proposed scheme. 6.1. System Model In this work we have considered sensor nodes are deployed in a systematic manner to achieve efficient network coding. These node senses data from the environment and transmits to sink node. However these nodes are further classified into three categories. Sensor nodes, who senses data and transmit, some relay nodes who simply forward the data packet to sink node and aggregate node identifies the opportunity of network coding and performs it. The function ƒ is used by the aggregate node to decide whether to apply network coding or not [4]. This topology is recursive. Consider Figure 2 Node 1, 2,3,4,7 and 10 are initial nodes. These nodes are simply a sink and relay nodes and it can be called as initial level L0 and it is contains 6 nodes. Now topology is constructed recursively with Level L1, Level L2, Level L3......Level Lp. Level L1 has total 12 nodes. 4 of them are aggregate nodes and 8 of them are sensor nodes. Hence we can say Level L1 contains (r+q) nodes where r is number of sensor nodes and q is number of aggregate nodes. Now Level L2 can be obtained by 2(r+q) nodes. This recursive method continues to obtain a large sensor network and makes our topology scalable [4].
  • 4. International Journal of Network Security & Its Applications (IJNSA), Vol.5, No.2, March 2013 120 To get better performance and efficient network coding we have to made sum assumptions. • Node deployment is 2D. • Each sensor node has unique id and sink node maintains the id these sensor nodes. • All transmission contains Source-ID and Sink-ID. • Nodes must approximately at equal distance. • Let p and q are the two received data by an aggregate node and ƒ is a binomial function which computes significant difference between the two data values and returns yes or no. If p and q are differ not more than γ then the value of the function ƒ is false else it returns true. The absolute value of the difference is denoted by d = p ~ q. ƒ :{ 0 if d < γ, 1 else} 6.2. Proposed Work This research work would primarily concentrate on the design and development of sensor networks and its overall throughput. Focus of the application on the better dynamic source routing (DSR) technique using network coding to reduce total number of transmission in sensor networks resulting in better efficiency. Specified sensor network topology is used as shown in Fig 2 to achieve better results in wireless dynamic source routing (DSR) networks. Figure 2: Sensor Network Topology Node placement is in two dimensional as shown in Fig 2. Now node {1} is sink node. Nodes {5, 6, 8, and 9} are aggregate nodes. Nodes {2, 3, 4, 7, and 10} are relay nodes. Nodes {11, 12, 13, 14, 15, 16, 17 and 18} are sensor nodes. For Example suppose sensor node 12 and 13 have some information to flood. Now node 12 forwards (Broadcasts) it’s information to relay node 10 and aggregate node 9 and sensor node 13 forwards its information to aggregate node 9. Relay node simply forwards its information to sink 15 6 Wireless Link 1 2 3 4 5 6 7 8 91 0 1 1 1 2 1 3 1 61 7 1 8 S i n k N o d e R e l a y N o d e A g g r e g a t e N o d e S e n s o r N o d e 19 20 14
  • 5. International Journal of Network Security & Its Applications (IJNSA), Vol.5, No.2, March 2013 121 node. Aggregate node 9 has two packets to forward. It encodes the packets using (XOR) technique and further forwards it to sink. Now sink has two packets. One is data packet transmitted by node 12 via relay node 10 and encoded packet transmitted by aggregate node 9. It simply decode the packet by again XORing both the packets and collect the data packet transmitted by sensor node 13. Here we can clearly see that sink node achieve the packets in 6 broadcasts instead of 8 which is currently done by wireless dynamic source routing (DSR). Before hopping to algorithm 1 would like to put emphasis upon the point that we are not providing the answer to the question: "When to encode data?”. For the purpose of this work we have used random variable to decide upon when to encode, with equal probabilities. 6.3. Algorithm To enable encoding and decoding of packets we have used two types of packets namely normal_packet and code_packet. Where size of normal_packet is fixed and size of code_packet is will be size of normal_packet plus size of header. Let at an aggregator node we need to encode pkt1 and pkt2. This is done as following: pkt1 is XORed with pkt2 and is encapsulated under new header and is then forwarded depending upon the new header. We have also included a bit in each packet namely codeOn bit which is set if packet is code_packet and unset if it is normal_packet (though it is redundant as type of packet can be identified by size) in our case. Decoding is performed by first removing the additional header and then again XORing the packet with other appropriate packets. When aggregate node receives data from the sensor nodes function ƒ finds the difference between the data. If difference is less than some predefined γ and is not significant then there is no need of encoding and one of the data selected at random, is forwarded to sink node. If the difference is greater than γ then aggregate node encode (XORs) data and forward to sink node. Each aggregate node caches the previously received data from the sensor nodes. If data difference between previously received data and currently received data is significant then encoding done and data transmitted to sink node. Otherwise no encoding done and the data is transmitted normally. Algorithm: Aggregate Heuristic(packet pkt1, packet pkt2) //pkt1i& pkt2i is ith packet sent by leaf node 1 and leaf node 2 respectively. { Apply function f on data(pkt1i), data(pkt2i) and if it returns 0 then { If data(pkt1i),data(pkt1i-1) not equals to 0 then { Perform network coding on pkt1i and pkt1i-1 // pkt1i-1 is cached copy Transmit data obtained by encoding in previous step } ElseIf data(pkt2i),data(pkt2i-1) not equals 0 { Perform network coding on pkt2i and pkt2i-1
  • 6. International Journal of Network Security & Its Applications (IJNSA), Vol.5, No.2, March 2013 122 Transmit data obtained by encoding in previous step } Else { Select either of the packet and transmit } } Else { Perform network coding on pkt1 and pkt2 Transmit data obtained by encoding in previous step } //End of Algorithm Function data(packet pkt) { Return data encapsulated in packet "pkt" } 7. SIMULATION RESULTS Given algorithm is implemented in ns-2.34. Traffic is generated using a CBR traffic generator at leaf nodes. We have simulated the discussed algorithm on topologies of 20, 44 and 92 nodes. AS mentioned earlier, function ƒ is simulated with the help of random variable. Caching is only implemented at aggregate node with cache buffer size of two, one for each leaf node. Results of simulations are given in Figure 3 for both types of network that is to say network without coding and network with coding. Each simulation is run four times and so each bar of Figure 3 represents average of four simulation runs. This is done to mitigate the effect of random variable and simulation parameters. Table 1:Coding Gain No. of nodes Coding gain 20 1.46 44 1.36 92 0.84 One could easily see that for smaller network size (20, 44) total numbers of transmissions per unit time have reduced. But for the network of 92 nodes it has actually increased. This could possibly be because for large networks, numbers of collisions in network, without coding are more as compared to one with network coding.
  • 7. International Journal of Network Security & Its Applications (IJNSA), Vol.5, No.2, March 2013 123 Figure 3: Simulation result Line graph for coding gain shown in Table 1. Now from concluded result of coding gain one can clearly see that coding gain is more than 1 for 0-75 sensor nodes. Hence we can say network efficiency gives better performance for this range for nodes. After that coding gain degrades to less than 1. This could possibly be because for large networks, numbers of collisions in network, with coding are more as compared to one without network coding. 3. CONCLUSIONS & FUTURE WORK In this paper we have implemented the idea that the function ƒ is used by the aggregate node to decide whether to apply network coding or not. We have found out that as the size of sensor network increases, approach with network coding allows better bandwidth utilization. Though we have not quantified, one could easily argue, as number of transmissions required to send one packet from leaf node to sink nodes decreases it also provides significant energy savings at sensor nodes. Although the topology suggested is scalable and robust due to multiple paths from leaf to sink nodes, the cost effectiveness of this topology still remains an open question. It is also challenging to come up with a good ƒ, as it depends a lot upon the application and environment. REFERENCES [1] Ian F. Akyildiz, Weilian Su, Yogesh Sankara subramaniam and Erda lCayirci, (2002) “ A Survey on Sensor Networks”, Georgia Institute of Technology. [2] Rudolf Ahlswede, NingCai, Shuo-Yen Robert Li, Raymond W. Yeung,(2000), “Network Information Flow”, IEEE Transactions on Information Theory, Vol. 46, No. 4. [3] Young-ri Choi , Mohamed G. Gouda ,Disciplined Flood Protocols in Sensor Networks, UTCS Technical Report TR-05-03 ,The University of Texas at Austin. [4] R. R. Rout , S.K. Ghosh , S. Chakrabarti,2009, Fourth International Conference on Industrial and Information Systems, ICIIS 2009, 28 - 31 December 2009, Sri Lanka, “Network Coding-aware Data Aggregation for a Distributed Wireless Sensor Network”, Indian Institute of Technology, Kharagpur. [5] P. A. Chou, Y. Wu, and K. Jain, (2003), “Practical network coding”, Proc. Allerton Conf. Commun., [6] SudiptaSengupta, ShravanRayanchu, and Suman Banerjee, “ Network Coding-Aware Routing in Wireless Networks”. [7] S. Katti, H. Rahul, W. Hu, D. Katabi, M. Medard, and J. Crowcroft, (2006), Proc. ACM SIGCOMM, Sep. 2006, pp. 243–254 , XORs in the air: Practical wireless network coding. [8] Qunfeng Dong , Jianming Wu ,Wenjun Hu, Jon Crowcroft, “Practical Network Coding in Wireless Networks” ,University of Wisconsin & Cambridge. [9] Raymond W. Yeung, Shuo-Yen Robert Li, NingCai, Zhen Zhang, Network Coding Theory.
  • 8. International Journal of Network Security & Its Applications (IJNSA), Vol.5, No.2, March 2013 124 [10] K V Rashmi, Nihar B Shah and P Vijay Kumar, (2010), “Network Coding”, IISc. [12] AnanthKini, Vilas Veeraraghavan, Steven Weber, (2004), “Fast and efficient randomized dynamic source routing (DSR) on lattice sensor networks”, Department of Electrical and Computer Engineering, Drexel University. [13] Ting Zhu, ZiguoZhong, Tian He, and Zhi-Li Zhang, Exploring Link Correlation for Efficient Dynamic source routing (DSR) in Wireless Sensor Networks, University of Minnesota. [14] Christina Fragouli, J¨orgWidmer, Jean-Yves Le Boudec, “On the Benefits of Network Coding for Wireless Applications”. Author Dr. Abdul Rahiman M is currently working as Director in All India Council for Technical Education (AICTE), Ministry of HRD, Government of India. He also served as Director, Vocational Higher Secondary Education (VHSE), Government of Kerala. He worked as Professor in the Department of Computer Science & Engineering in LBS Institute of Technology for Women, Trivandrum, Kerala State, India. He did his M.Tech degree in Computer Science from Kerala University in Computer Science with specialization in Digital Image Computing and also undergone MBA degree in Systems and Post Graduate Diploma in Human Resource Management from Kerala University. He has his PhD from Karpagam University, Coimbatore in the area of pattern recognition. He has many publications in various International Journals and International conference proceedings. He is a Life Member of Indian Society for Technical Education (ISTE) and Computer Society of India (CSI)and also Member of International Association of Computer Science & Information Technology (IACSIT). He is a member of Board of Governors in Daman Diu Higher Education and also associated with many professional bodies. He chaired many International Conferences and editorial board member of many International Journals.