Performance And Reliability Improvement Model For WSN
Volume 1 - Issue 2, August 2017 Edition
[Download Full Paper]
Sarita Simaiya, Dr. Sanjay S Chaudhary, Dr. Anu Bharti
Wireless Sensor Network, Reliability, Performance, Security, Energy
The wide utilization of Wireless Sensor Networks (WSNs) is obstructed by the severely limited energy constraints of the individual sensor nodes. This is the reason why a large part of the research in WSNs focuses on the development of energy efficient routing protocols. Energy conservation is one of the major important issues in wireless sensor networks. In WSN communication is based on battery operated computing and sensing devices. In WSN sensor networks energy to be deployed in an Adhoc manner, with a positive approach, individual nodes can be largely inactive at idle periods of time, but when something is detected then becoming suddenly active. In WSN the major challenges for research are conservation of energy and security. Large-scale deployments will require routing protocols that scale to large network sizes in an energy-efficient way. Routing in WSNs is very challenging due to unique inherent characteristics (energy efficiency and awareness, connection maintenance, minimum resource usage limitation, low latency, load balancing in terms of energy used by sensor nodes, etc.) that distinguish this network from other wireless networks such as mobile ad hoc networks, cellular networks, and wireless mesh networks. This paper presents existing issues of WSN which can affect its performance and reliability and also proposed a reliability and performance improvement model for WSN.
. Prakash goud Patil and Umakant Kulkarni, “SVM Based Data Redundancy Elimination for Data Aggregation in Wireless Sensor Networks”, IEEE 2013, PP 1309-1316.
. Ren Yueqing, Xu Lixin, “A study on topological characteristics of wireless sensor network based on complex network”, IEEE 2010, pp 486-489.
. Bala Krishna, M., Doja, M.N., “Self-organized energy conscious clustering protocol for wireless sensor networks”, IEEE 2012, pp 521-526.
. Boniewicz, Miroslaw Toruń, Poland Kozlowska, Anna; Zawadzka, Anna; Lukasiak, Zbigniew; Zielinski, Marek “Review of selected algorithms in the method energy evening algorithm in wireless sensor network”, IEEE 2014, pp 211-216.
. Baghyalakshmi, D.Ebenezer, J. Satya Murty, SLAV, “Low latency and energy efficient routing protocols for wireless sensor networks”, IEEE 2010, pp 11- 16.
. Rong Cui, Zhaowei Qu; Sixing Yin, “Energy-efficient routing protocol for energy harvesting wireless sensor network”, IEEE 2013, pp 500- 504.
. Karim, L. Nasser, “Energy Efficient and Fault Tolerant Routing Protocol for Mobile Sensor Network” IEEE 2011, pp1-6.
. Kordafshari, M.S Pourkabirian, A. Faez, K.; Rahimabadi, A.M., “Energy-Efficient SPEED Routing Protocol for Wireless Sensor Networks”, IEEE 2009, PP 267-271
. Ben Alla, S.; Ezzati, A.; Beni Hssane, A.; Hasnaoui, M.L., “Hierarchical adaptive balanced energy efficient routing protocol (HABRP) for heterogeneous wireless sensor networks”, IEEE 2011, pp 1-6.
. Zaman, N.; Tung Jang Low; Alghamdi, “Energy efficient routing protocol for wireless sensor network”, IEEE 2014, pp 808-814.
. Cunxiang Chen; Zunwen He; Hongmei Sun; Jingming Kuang, “A grid-based energy efficient routing protocol in Wireless Sensor Networks”, IEEE 2013, PP 21-28.
. Pan Zhou; Wei Liu; Wei Yuan; Wenqing Cheng, “An Energy-Efficient Cooperative MISO-Based Routing Protocol for Wireless Sensor Networks”, IEEE 2009, pp 11-18.
. Minhas, A.A.; Fazl-e-Hadi; Sattar, D.; Mushtaq, K, “Energy efficient multicast routing protocols for Wireless Sensor Networks”, IEEE 2011, pp 178 -181.
. Zunnun Narmawala, Sanjay Srivastava, "Survey of Applications of Network Coding in Wired and Wireless Networks" in Proceedings of the 14th National Conference on Communications, IEEE 2008, pp. 153-157.
. Sheikh, R., Singh Chandi, M. and Mishra, D.K., “Security issues in MANET- A review”, IEEE 2010, pp 1-4.
. Kannhavong, B., Nakayama, H., Nemoto, Y. and Kato, N., “A survey of routing attacks in mobile ad hoc networks” IEEE 2007, pp 85-91.
. Verma, M.K., and Joshi, S.; Doohan, N.V. “A survey on- An analysis of secure routing of volatile nodes in MANET”, IEEE 2012, pp 1-3.
. Marianne. A. Azer, “Wormhole Attacks Mitigation in Ad Hoc Networks”, IEEE 2011, pp 561-568.
. R. Maheshwari, J. Gao, and S. R. Das, “Detecting Wormhole Attacks In Wireless Networks Using Connectivity Information,” in Proc. of IEEE INFOCOM, 2007.
. Ali Modirkhazeni, Saeedeh Aghamah moodi, Arsalan Modirkhazeni and Naghmeh Niknejad, “Distributed Approach to Mitigate Wormhole Attack in Wireless Sensor Networks”, IEEE 2011, pp 122-128.