Click the Desired Domain to Read the Research Articles      

Internet of Things     UAV/USV/Vehicular Ad Hoc Network      Mobile Ad Hoc Network     Underwater/Wireless Sensor Network

     Cloud Computing     Machine Learning     Web/Social Network      Wireless Communication     Cryptography/Network Security     

Intrusion Detection System      Big Data     Image Processing     Data Mining      Malware/Applications

Underwater / Wireless Sensor Netwrok      

Improving Performance and Efficiency of Software-Defined Networking by Identifying Malicious Switches through Deep Learning Model
Thangaraj Ethilu, Abirami Sathappan, Paul Rodrigues

Abstract - In recent times, Software Defined Networking (SDN) has developed widely to provide capable solutions for future internet services. As with the solutions, SDN brings us a hazardous rise in malicious threats. We investigated a sort of Distributed Denial of Services (DDoS) assault known as an internet services attack, which evaluates the influence of both traffic flow and throughput depletions in order to characterize the abnormalities. This sort of attack has a significant impact on the whole SDN. This paper introduces a deep learning method to improve the performance efficiency of the SDN by classifying the network switch into either a trusted switch or a malicious switch device. In this research, an attack detection methodology for Internet services utilizing Software Defined Networking (SDN) is proposed. The SDN controller may evaluate traffic flow, detect anomalies, and restrict both incoming and outgoing traffic as well as source nodes. The SDN considers a Convolutional Neural Network (CNN) based attack detection system that can identify malicious node. Kaggle datasets are used to test and train CNN and the features such as packet duration, packet count, byte count, accuracy for identifying the flow of trusted and malicious switches. According to the results, the CNN-based attack detection system can identify the attack with an accuracy of 89 percent. The comparison evaluation with the already proposed LeNet CNN of the feature classification proves that the flow is the trusted one and with the constant throughput with the help of the deep learning model.

Published: 2022Read / Download
Security Challenges and Related Solutions in Software Defined Networks: A Survey
Konda Srikar Goud, Srinivasa Rao Gidituri

Abstract - In the current digitalized world, everything is interconnected and accessible from everywhere. Although traditional networks are widely adopted, their management is complicated. Therefore, they are not effective in providing services to the future Internet like a wide range of accessibility, high bandwidth, management, and security. On the other hand, Traditional network architecture relies on manual configurations of proprietary devices that are error-prone and inefficient to utilize the network devices properly. Software-defined Networking (SDN) has drawn massive changes in the traditional network paradigm by decoupling the network operations from the physical hardware and encouraging network control to be logically centralized. It provides network programmability and improves security by enabling a global view of the entire network and issues handled effectively by the centralized controller. As a result, SDN allows networks to monitor the traffic and detect vulnerabilities more effectively. It also simplifies the deployment of new services with more flexibility at a faster pace. On the other hand, the decoupling of control and the data planes introduces security threats such as Distributed Denial of Service (DDoS) attacks, Man in the Middle attacks, Saturation attacks, etc. As a result, SDN has attracted a lot of interest from both academics and industry. In this paper, we study security vulnerabilities on layers of SDN, the security frameworks that protect each layer, and many security methodologies for network-wide security.

Published: 2022Read / Download
Energy-Aware Optimal Clustering and Secure Routing Protocol for Heterogeneous Wireless Sensor Network
Swapna M P, G. Satyavathy

Abstract - Wireless Sensor Network (WSN) is a collection of low energy sensor nodes deployed in hostile complex environments. Their functionality gathers requisite data from the environment and transmits it to the base station for further processing. To enhance the performance of WSN, sensor nodes with different energy levels, capabilities and functionalities are deployed, leading to Heterogeneous WSN (HWSN). The initial energy, energy consumption rate, and residual energy differ for each node in a heterogeneous WSN. Many algorithms were proposed to accomplish an energy-efficient steady HWSN, but the performance level is not satisfactory. This paper presents a novel integrated approach, Energy-Aware Optimal Clustering & Securing Routing (EAOCSR). The algorithm amalgamated three techniques optimal clustering, reliable routing and secured transmission, considering energy retention and network lifetime as the vital parameters. Unequal clustering scheme, trust-based reliable and secure routing forms the core of EAOCSR. The performance of EAOCSR is analyzed using MATLAB simulations. It reveals that the proposed routing protocol EAOCSR has superior performance to existing protocols regarding energy utilization, throughput, network lifetime, stability and security.

Published: 2022Read / Download
Reliable and Efficient Routing Model for Unequal Clustering-Based Wireless Sensor Networks
Rudramurthy V C, R.Aparna

Abstract - The lifetime of Wireless Sensor Networks (WSNs) can be extended with the adoption of an effective clustering method. However, the major problem of a multihop-based clustered network is the "hotspot" problem i.e., the Cluster Head (CH) closer to the base station tends to die very fast in comparison with far away nodes due to inter-cluster communication. Furthermore, no prior works have considered reliability and efficient factors together for provisioning modern data-intensive applications under WSN. In addressing research issues, this paper presents a Reliable and Efficient Routing (RER) design under an unequal clustering environment. The RER employs a two-phase model, first an effective CH selection strategy for enhancing efficiency; secondly, Reliable and Efficient Route Selection (RER) model for provisioning application with QoS constraint. Experiment outcomes show that the proposed routing strategy improves network lifetime with reduced communication overhead and communication delay.

Published: 2022Read / Download
Energy-Efficient Hybrid Protocol for Wireless Sensor Networks
S Arockiaraj, Krishanamoorthi Makkithaya, Harishchandra Hebbar N

Abstract - A wireless sensor network (WSN) is a giant web of tiny sensor nodes for specific monitoring and control purposes. It is becoming increasingly common to see WSN-enabled applications in our daily lives. Sensor nodes in most applications rely solely on battery power to function. To monitor fire and animal life, the nodes are placed in remote areas like forests, and the communication in WSN tends to be multi-hop. In such a scenario, if nodes fail due to battery power depletion, recharging or replacing the nodes' batteries becomes difficult or impossible, resulting in network failure. Efficient energy usage is critical for extending the life of the network and lowering the cost of replacement. This multi-hop communication requires an efficient routing mechanism to send the packets from source to destination. Several methods for efficient routing have been proposed in the literature. Among them, the clustering method is shown to be the most energy-efficient. The cluster head (CH) selection process is crucial in cluster-based approaches since the process of CH selection consumes more energy. Low Energy Adaptive Clustering Hierarchical (LEACH) and its most recent versions are widely used in practice. However, in LEACH, the CH nodes are chosen at random without considering the leftover energy. This may result in quick depletion of the energy in the randomly selected CH, resulting in network failure. Energy Efficient Hybrid Clustering (EEHC) is the latest derivative and an improved version of LEACH. EEHC selects the nodes closest to the sink as CH. Due to this type of CH selection, the chances of nodes near the sink failing increase. To solve these difficulties, this article presents an Energy-Efficient Hybrid Protocol (EEHP), a technique for WSN that consumes relatively less energy. This protocol employs a novel CH selection mechanism based on how much energy is left and how far the nodes are from the sink. In each round, the nodes with the highest probability of becoming CH are determined by the combination of distance and residual energy. The outcome of this study is compared with the LEACH and EEHC protocols. The simulation results indicate that the proposed EEHP protocol increases the lifetime of the network by at least 3.8 times when compared to the EEHC protocol and by 6.3 times when compared to the LEACH protocol. Thus, the proposed protocol outperforms LEACH and EEHC in terms of enhanced lifespan by reducing consumed energy and routing overheads.

Published: 2021Read / Download
An Efficient and Secure Text Encryption Scheme for Wireless Sensor Network (WSN) Using Dynamic Key Approach
V. Elamurugu, D. J. Evanjaline

Abstract - In a wireless sensor network (WSN), all detected data is delivered via a wireless communication channel to a sink node, then sent to an information-gathering centre for necessary actions or controls. The sensed data could be readily manipulated or eavesdropped on if security procedures are not used. For WSN, several security solutions based on classical cryptography have been devised, although the sophisticated encryption operations take significant energy. The symmetric and asymmetric key encryption provides efficient data security, but it takes high energy consumption and computational complexity. In this paper, a lightweight, energy-efficient secure text encryption is proposed using the dynamic salt key. There are three primary processes in the suggested paradigm. The first is salt generation. The next step is to encrypt secret text using format-preserving encryption based on the salt key, and the final step is to decrypt the data. The encryption process is more secure, and the hackers cannot capture key values. The proposed approach creates a safe environment for sensors to protect the data quickly, efficiently, and low-computation before sending it across a wireless network to the sink node. The proposed method simulation provides a high level of security while requiring minimal communication and computational resources.

Published: 2021Read / Download
Efficient and Reliable Routing With Cloud Based Source-Location Privacy Protection in Wireless Sensor Networks
R. Nagarajan, G. Maria Priscilla

Abstract - WSNs (Wireless Sensor Networks) have recently gained popularity. WSNs are typically deployed in insecure, unstructured areas where their source location reveals critical information about targets. Sensor deployment in WSNs has been seen in a variety of applications that oversee events and send information to base stations. Optimal route selection and source location privacy are critical issues in WSNs. If an intruder determines the source node by studying traffic mode, an attack could be conducted on a target with ease. Previous methods were based on MSROs (Mobile Sink-based Route Optimizations) and Cloud-Based WSN Protection Schemes. This research work chooses the optimum multi-sink node based on the BFAs (Bacteria Foraging Algorithms). But, it does not yield optimal paths to balance the PDRs (Packet Delivery Ratios) and energy dissipation. To seek a solution to this issue, this study proposes ERR-CSLPPs (Efficient and Reliable Routing with Cloud-based Source-Location Privacy Protections) using AAFBOA (Adaptive Adjustment Factor based Butterfly Optimization Algorithm), allowing the approach to choose the mobile sink node. Depending on the ETCs (Expected Transmission Counts), residual energy, and hop count, the optimal paths are chosen with the help of TOPSISs for efficient transmissions. The actual packets are sent over the preferred path. Next, the cloud-like false hotspot is formed to include counterfeit packets into the WSN to confuse the intruder and yield an elaborate privacy location. Counterfeit packets are included along the delivery path of the actual data packet to extend the time needed for tracing the traffic flow. The experiments reveal that the proposed system yields improved performance when matched with the earlier system in terms of overall energy dissipation, node utilization ratio, transmission delay, security, and network lifetimes.

Published: 2021Read / Download
Link Failure Detection in Multimedia Sensor Networks Using Multi-Tier Clustering Based VGG-CNN Classification Approach
S. Arockia Jayadhas, S. Emalda Roslin

Abstract - The transferring of huge multimedia data over the limited bandwidth environment has many challenges in real time. Wireless Multimedia Sensor Networks (WMSN) is a special type of wireless sensor networks which are used to overcome such bandwidth limitations in order to provide effective transferring of multimedia data. The malicious nodes in WMSN fail the links between the sensor nodes which degrades the efficiency of the entire network. Each node in WMSN may have its own signal transferring capability based on its energy level. If the energy level of the node degrades beyond the threshold level, that node becomes malicious node which is the main reason for the link failure between this node and its surrounding nodes. The data transfer is affected by the link failure nodes which degrades the performance of the entire system. Hence, the detection of link failure is important to improve the performance efficiency of the network system. This paper focuses the link failure detection system using deep learning approach. Hence, the detection of link failure is an important task to improve the performance of the network. This paper proposes an effective methodology for detecting the link failures of clusters in WMSN using deep learning architecture. The nodes in WMSN are grouped in to number of clusters and cluster head is determined using multi tier clustering approach, based on the energy levels and weighting metric approach. Then, the features are computed from each cluster and these features are classified using Visual Geometry Group (VGG) classification approach in order to detect the link failures of the clusters in WMSN. The performance of this developed methodology is analyzed with respect to Packet Delivery Ratio (PDR) and latency.

Published: 2021Read / Download
Whale Optimization Routing Protocol for Minimizing Energy Consumption in Cognitive Radio Wireless Sensor Network
J. Ramkumar, R. Vadivel

Abstract - Cognitive Radio Wireless Sensor Networks (CR-WSN) works on nodes that are dependent on batteries. A critical problem with CR-WSN is a lack of energy, especially in situations such as warfare where rapid and aggressive action is needed. The battery level of nodes degrades CR-WSN performance. Researchers face significant difficulty developing a routing protocol for CR-WSN, and that obstacle is posed by energy consumption to deliver a packet. A substantial number of nodes reside in CR-WSN. Every node in CR-WSN is constrained by battery. To minimize network cost, it should be feasible to have the routing protocol used for CR-WSN to be energy efficient. This paper proposes an optimization-based routing protocol, namely Whale Optimization Routing Protocol (WORP), for identifying the best route in CR-WSN to minimize the delay and lead to network efficiency. WORP draws inspiration from the behaviors of whales as they forage, similar to their hunting activity. By prioritizing residual energy and the total energy of the nodes in the route, WORP encourages energy-aware route selection. WORP is examined via simulation with NS2 against current routing protocols. Benchmark performance metrics are used to assess the effectiveness of WORP. Results make an indication that WORP has superior performance than current routing protocols in CR-WSN.

Published: 2021Read / Download
Optimized Support Vector Machine Based Congestion Control in Wireless Sensor Network Based Internet of Things
P.T. Kasthuribai

Abstract - As the Wireless sensor network (WSN) has significant part in Internet of Things (IoT), it is utilized in various applications such as sensing environment and transmitting data via the internet. Nevertheless, due to the problem of heavy congestion, WSN based IoT obtains longer delay, higher ratio of packet loss and lower throughput. Although machine learning algorithms have been presented by researchers for detecting the congested data in IoT, detection accuracy is further to be improved. So, to control the congestion in WSN based IoT, artificial flora algorithm (AF) based support vector machine (SVM) is presented in this paper. To improve the performance of SVM, penalty parameter and kernel parameter of SVM is optimized using AF algorithm. In this proposed SVM-AF, the performance factors are given as input such as queue size (que), packet loss (pkt loss), cwnd (congestion window size), and throughput (throu). Based on these input factors, the prediction model SVM-AF predicts the congested data and decides whether to offload each device task to the server. Simulation outcomes show that the proposed SVM-AF outperforms the model such as Genetic Algorithm based SVM (SVM-GA) and SVM based on throughput, energy consumption, delivery ratio, and overhead.

Published: 2021Read / Download
Source Location Privacy for Geographical Routing in Wireless Sensor Networks: SLPGR
Manjunath D R, Anil Kumar B

Abstract - Challenges in the military, environment, medical, industrial, home, traffic applications, and agriculture extend the scope of Wireless Sensor Networks. Data security over wireless networks is a challenge because of the presence of malicious and non-malicious users, whose purpose is to intercept communication or prevent the transmission of data by real users to perform data theft. To improve the location privacy in geographical routing, a hash-based location privacy-preserving scheme and fake source identification in grid-based geographical routing protocol in WSN are presented. In the SLPGR approach, SHA-256 hash encoding is implemented which hides the location information from attackers. The proposed fake source identification guarantees that the fake source and real source nodes are situated on different quadrants and have enough distance between them. The Findings indicate that the SLPGR model's packet delivery ratio is further 278 % enhancement contrast to the tree-based diversionary routing, and more than 38 % compared to the CASER random walking system. The safety duration of the proposed method increases approx. 13% more than the tree-based diversionary routing and 11% more than CASER random walk routing. Energy consumption of the proposed method is lower by 3 times than the tree-based diversionary routing method, 1.4 times lower than CASER random walk routing. The comparative analysis of the SLPGR method shows 3 times lesser delivery miss ratio than tree-based devolutionary routing and 2.6 times lesser delivery miss ratio than CASER routing scheme.

Published: 2021Read / Download
Wormhole Detection Using Encrypted Node IDs and Hop Counts in the Event Report of Statistical En-Route Filtering
Ga-Hyeon An, Tae-Ho Cho

Abstract - Wireless Sensor Network (WSN), there are low capacity, low cost, tiny sensor nodes, and sinks. Sensor nodes detect an event occurring in its surroundings and send data about the event to the sink. Sensor nodes have a limited transmission range and computational power. Since the wireless sensor network operates with limited resources than the ad hoc network, it is difficult to apply the defense method as it is, so research on a new defense method is needed. In a WSN, sensor nodes manage, monitor, and collect data for a specific environmental and physical application, and the collected data is transmitted to and used by a base station. Base stations are connected via the Internet and share data with users. Since the sensor node is composed of low power and low capacity, it is mainly used in an unattended environment, so it is easily exposed to various attacks and can be damaged. This type of network makes it difficult to detect wormhole attacks when they occur along with other attacks like false report injection attacks and Sybil attacks. Therefore, to prevent this, in this study, the hop count and the encrypted node ID are added in the report generation process of the statistical en-route filtering technique to detect wormhole attacks even when a wormhole attack occurs along with a false report injection attack to improve security.

Published: 2021Read / Download
Analysis of Energy, Coverage, and Fault Issues and their Impacts on Applications of Wireless Sensor Networks: A Concise Survey
Sandeep Sahu, Sanjay Silakari

Abstract - Energy-efficiency, Coverage-quality, and Fault-tolerance Issues (ECFI) are the three primary and crucial quality assurance standards in a Wireless Sensor Network (WSN). These three standards ensure the network design of a self-configurable and sustainable WSN. First, energy-efficiency mechanisms ensure the prolonging of the overall network lifetime. Second, the coverage quality means how well a region of interest (RoI) is covered. Third, fault-tolerance refers to the ability of a network to continue operating without interruption when one or more components fail. With rapid innovations and developments in Wireless Sensor Network (WSN) applications, many researchers' most sustainable objective is to provide an adeptly operational sensor network. A broad range of applications of WSNs can be seen in the fields of academic, military, industry, medical, and daily needs worldwide. This analysis and survey article's main objective is to highlight different promising challenges on various fundamental characteristics, designing limitations, and their impacts on applications of WSNs. The authors also highlight the energy depletion and energy-provision issues with a concise survey of coverage and fault-related issues in WSNs. The authors finally summarized with discussion and analysis of the overall impacts of ECFI and other parameters on WSNs with simulator availability and future research direction.

Published: 2021Read / Download
Real Time Two Hop Neighbour Strategic Secure Routing with Attribute Specific Blockchain Encryption Scheme for Improved Security in Wireless Sensor Networks
M. Hema Kumar, V. Mohanraj, Y. Suresh , J. Senthilkumar ,G. Nagalalli

Abstract - Wireless Sensor Network (WSN) is most vulnerable to routing attacks which affects the confidentiality and integrity services of the data transmitted between any nodes. Many research efforts have been taken to propose secure routing schemes for improving the data security against routing attacks in WSN. The existing secure routing schemes are not able to dynamically discover the trust path between nodes for ensuring secure transmission without compromising confidentiality and integrity service. To address this issue, a real-time, two-hop neighbour, strategically secure routing scheme is proposed in this paper. According to the strategy of two-hop neighbours, the method selects the forwarding node according to the trust measures computed based on trust energy support and trust forwarding support of the two hop nodes. Further, the data security is enforced at the attribute level. The Blockchain mechanism is enforced where a single block contains information of specific attribute of data which restrict the user who have access to the attribute only can read the data present in the block. The data encryption is performed according to different encryption standards maintained by the system, unique for different attributes. According to the Hash code present in the Blockchain, the user can decode the key and scheme to obtain the original data. The proposed approach improves the performance in secure routing and increases the data security performance.

Published: 2021Read / Download
Query Aware Routing Protocol for Mobility Enabled Wireless Sensor Network
M. Lingaraj, T. N. Sugumar, C. Stanly Felix , J. Ramkumar

Abstract - Mobility Enabled Wireless Sensor Network (MEWSN) plays a significant role in different fields including environmental control, traffic control and healthcare. The performance of MEWSN is dependent not only on sensing but also on routing. Multiple research works are carried out by different researchers in the domain of routing in MEWSN, but still the performance of MEWSN gets lacked. Poor routing is the root cause for the performance degradation of MEWSN. In this paper, a new routing protocol namely Query Aware Routing Protocol (QARP) is proposed to balance the load in MEWSN to prevent congestion and exhausted power utilization. Normal routing protocols either seek to match load or route, but both are considered in QARP. Also, identified routes are classified based on an enhanced relevant vector machine classification algorithm which assists in minimizing the delay and energy consumption. Using NS2, QARP is evaluated against previous routing protocols with standard performance metrics namely throughput, delay, packet delivery ratio and energy consumption. The packet delivery ratio achieved by QARP is 92.6%, where the existing routing protocols IFLIP and PARP has achieved 62.8% and 75.4% respectively.

Published: 2021Read / Download
Probabilistic Based Optimized Adaptive Clustering Scheme for Energy-Efficiency in Sensor Networks
Vasudha, Anoop Kumar

Abstract - The key factor affecting the life span of the sensor network when node battery capacity is constrained is communication energy utilization. Although these networks are commonly used, they still require research to make full use of their outstanding features in communication. The utilization of energy is a major issue for which an optimization strategy to minimize energy usage and enhance the service life of the network is recommended. It was achieved by cultivating the energy balance of all Sensor Nodes (SNs) in clusters to reduce the dissipation of energy during data transmission. The aim of this paper is to implement an optimized refined probabilistic methodology to address the issue of how to conserve energy, maintain a balanced system throughput, and extend the lifespan of sensor network. The suggested scheme strengthens the Cluster Head (CH) selection threshold by taking into account the node's residual power, distance between the node, Base Station (BS), node dormancy mechanism and CH Re-election process. The proposed technique employs clustering with set time frame for transmission, which minimizes count of nodes involved in actual data transfer and will increase the lifespan. The proposed methodology helps to choose energy-aware CHs based on a fitness feature that takes SN's remaining energy and the neighboring SN's energy number. Furthermore, the proposed protocol L-DDRI's (LEACH -Distance Degree Residual Index) efficiency is measured against other common contemporary routing protocols such as Low-energy adaptive clustering hierarchy (LEACH), Uneven Clustering Strategy (UCS) and Distributed Energy-Efficient Clustering (DEEC). Analytical research and extensive simulation demonstrate shows improvement of proposed protocol L-DDRI in terms of lifespan, number of CHs, energy utilization, performance and overall reliability of the network and number of packets sent to Base station other existing technique.

Published: 2021Read / Download
Performance Analysis of a Dynamically Power Managed and Event-Based Wireless Sensor Node Enabled by Queue Discipline
Rakhee Kallimani, Sridhar Iyer

Abstract - In recent years, Wireless Sensor Networks (WSNs) have attracted the attention of researchers in view of providing a system with high performance and low power consumption. The consistent challenge is to address the trade-off between performance and power consumption. Hence, many key performance metrics need to be analysed for the design of an efficient Wireless Sensor Network. Existing power management techniques, when surveyed, have addressed the issue of power and performance of the node but with the limitation on the selection of queue discipline; this motivates our study to analyse the importance on the selection of queue discipline as it majorly plays a vital role in power and performance management. Thus, we developed a Dynamically Power Managed WSN node in MATLAB Simulink depicting the stochastic behaviour of event arrival and performed the analysis on a single server. This article focuses on the study of queue discipline based on M/M/1 queuing theory with a detailed analysis of First In First Out Queue on the performance of an individual WSN node. The innovation of our work is in the detailed analysis of the behaviour of events in the queue..........................

Published: 2021Read / Download
Optimized Cluster Head Selection with Traffic-Aware Reliability Enhanced Routing Protocol for Heterogeneous Wireless Sensor Network (HWSN)
S. Tamilselvi, S. Rizwana

Abstract - Clustering-based routing protocols are mainly used for extending the node's existence in Heterogeneous Wireless Sensor Networks (HWSNs). Several clustering protocols have been designed for splitting the network into different clusters and choosing the Cluster Heads (CHs) for each cluster effectively. Among those, a Traffic-Aware Reliability-based Enhanced Technique for Ordering of Preference by Similarity-Ideal-Solution (TARE-TOPSIS) protocol can determine the probability of every node is considered as CH by considering traffic load, initial and residual energy of each node in the multi-heterogeneity scenarios. It considers only coverage and energy for determining the amount of cluster and the corresponding probabilities. Nonetheless, noise and data transmission rates have a high effect on information or data packets transmitted between nodes and the Base Station (BS). The noise interference in the communication can let few nodes link to further far-away CHs and exploit the multipath amplification. The multipath diversion consumed additional energy than usual energy. Therefore in this article,...........................

Published: 2021Read / Download
Elliptic Curve Cryptography based Secure Image Transmission in Clustered Wireless Sensor Networks
Rekha, Rajeev Gupta

Abstract - Wireless Sensor Networks (WSN) is arising as a potential computing platform in diverse zones such as weather forecasting, modern robotization, medical health care, and military systems, etc. Since the sensors are constantly gathering information from the actual world and communicate with one another through remote connections, keeping up the security and protection of WSN communication is a prerequisite. In this paper, safe confirmation and key organization scheme dependent on Elliptic Curve Cryptography (ECC) has been suggested to make sure about information/picture transmission in WSNs. The scheme proposed in this paper is protected, competent, and appropriate for providing sensor technology based IoT services and applications. The protocol provides all the security features such as mutual authentication, confidentiality, data integrity, perfect forward secrecy, fair key agreement, etc. and is secure against hello flood attack, DoS attack, man-in-middle attack, etc. Simulation software AVISPA has confirmed the safety of the protocol for the known assaults. The performance analysis ensures the superiority of the projected proposal over the existing schemes..........................

Published: 2021Read / Download
Dolphin Swarm Inspired Protocol (DSIP) for Routing in Underwater Wireless Sensor Networks
S. Boopalan, S. Jayasankari

Abstract - Underwater communication is still carried out using communication cables because of the minimum development that is established in underwater wireless communications. The utilization of wires to make sure the connectivity of sensor nodes that are located at the bottom of the sea is highly expensive. Finding the best route to send the sensed data to the destination in minimum duration has become a primary challenge in underwater wireless sensor networks (UWSN). Feasible routing protocols available for general sensor networks are not feasible for UWSN because of the difficult communication medium. Existing routing protocol face the problem of consuming more energy to deliver the data packet and also due to selecting the unfit route it faces more delay. To overcome the routing challenges present in UWSN, Dolphin Swarm Inspired Protocol (DSIP) is proposed in this paper. DSIP is inspired by the swarming nature of dolphins towards finding their food. Four significant phases involved in DSIP to find the best route in UWSN are searching, calling, reception, and predation. NS3 is used to evaluate the performance of DSIP.........................

Published: 2021Read / Download
Performance Evaluation of a MANET based Secure and Energy Optimized Communication Protocol (E2S-AODV) for Underwater Disaster Response Network
Karan Singh, Rajeev Gupta

Abstract - In recent years, the role of telecommunications in Under Water Mobile Ad-hoc Network (UWMANET) has emerged as a significant field during disaster prevention and rescue operations. Various disaster prevention and rescue supported applications are introduced in these years for flood, tsunamis, and underwater earthquakes. While communication in UWMANET, the existing communication system has some limitations like high energy utilization, tremendous packet loss rate, and delay. Sensor nodes can be deployed for data collection from the dense underwater environment. In UWMANET, security is another critical aspect of secure data transmission. In this paper, a new UWMANET based routing protocol, i.e., E2S-AODV (Energy Efficient Secure Ad-hoc On-demand Distance Vector) is designed and tested for Under Water Disaster Response Network (UWDRN) in a controlled environment. The optimum route for data transmission is selected by Pigeons Swarm Optimization (PiSO). PiSO reduces the hop count........................

Published: 2021Read / Download
A Critical Survey on Overhead Control Traffic Reduction Strategies in Software-Defined Wireless Sensor Networking
Simon Atuah Asakipaam, Jerry John Kponyo, Justice Owusu Agyemang, Frederick Egyin Appiah-Twum

Abstract - The rising interest in the Internet of Things has contributed to the rapid deployment of wireless sensor networks (WSNs). However, as a result of the design of the sensor nodes and networks, WSNs exhibit dynamic challenges in mobile and large-scale applications. The nodes are equipped with limited resources and the networks have static architectures. These problems hinder the effective implementation of WSNs. Software-Defined Networking (SDN) is intended to overcome these problems by removing control logic from the data plane and incorporating programmability to allow dynamic management and control of the nodes. Unfortunately, the gains from incorporating SDN into WSNs are diminished by high overhead control traffic, created to discover and maintain a global network topology view, leading to impaired network performance. This paper provides a systematic overview of the software-defined wireless network sensor literature to identify potential gaps and to provide recommendations for future studies.......................

Published: 2021Read / Download
A Comprehensive Survey on Routing Schemes and Challenges in Wireless Sensor Networks (WSN)
Poonam T. Agarkar, Manish D. Chawan, Pradeep T. Karule, Pratik R. Hajare

Abstract - This paper adds to the broad investigation of routing protocols in wireless sensor networks (WSNs). It summarizes the contributions of different researchers in improving the overall performance of WSNs by developing various new and modified routing techniques for general and specific applications in the various field of engineering and technology. A pool of almost 60 research papers and more than 20 survey papers related to various routing techniques were studied thoroughly and represented in a lucid form to help future researchers to contribute effectively in the field of sensor networks. The survey papers considered for this literature are classified for routing algorithms based on the quality of service (QoS), intelligence-based routing (IBR), and routing for dedicated applications while the current research work is distinguished based on cluster head selection phenomenon, forwarding node and other factors contributing to the performance improvement of routing algorithms as per the current focus.......................

Published: 2020Read / Download
Cluster Head Election in Wireless Sensor Network: A Comprehensive Study and Future Directions
Rekha, Rajeev Gupta

Abstract - Due to the advancement of wireless communication interchanges, electronic technology, and micro-electro-mechanical devices, Wireless Sensor Network (WSN) has got advanced as a promising zone of research. WSN consists of a collection of sensor nodes having a little calculative capability, limited memory, and constrained energy assets. Clusters are formed from the collection of sensor nodes whose leader node (Cluster head) can send the sensed information from hubs to the BS. To condense the power consumption and boost group longevity, the cluster head executes data accumulation. This paper discusses many algorithms based on deterministic, probabilistic, adaptive, fuzzy logic, and Multi-attribute decision-making techniques for clustering and cluster head election. Existing algorithms enhance the network lifetime and energy efficiency but fail to provide a better quality of service and security. So many issues and challenges have been laid down and it is concluded that when computational intelligence is combined with network intelligence then QoS and security both can be provided along with the network longevity and energy efficiency in homogeneous as well as a heterogeneous environment......................

Published: 2020Read / Download
Support Vector Regressive Dragonfly Optimized Shift Invariant Deep Neural Learning Based Handover for Seamless Data Delivery in Heterogeneous Network
D. Somashekhara Reddy, C. Chandrasekhar

Abstract - In a Wireless Sensor Network (WSN), seamless mobility management can change the current mobile node's location point to another network devoid of any link failure during communication. The seamless mobility system is very useful to detect the nearest base station over the wireless network without any distinct interference. In this paper, a novel technique called Support Vector Regressive Dragonfly Optimization based Shift Invariant Deep Neural Learning (SVRDO-SIDNL) is introduced for improving the seamless data transmission with minimum delay. The Shift Invariant Deep Neural Learning comprises of many layers to learn the series of input. For each layer, the different processes are carried out to accomplish the traffic optimized seamless data delivery. The input layer of the deep neural learning receives mobile nodes with coverage region and then is sent to the hidden layer. The mobile nodes' signal strength is analyzed by applying the support vector regression at the hidden layer. .....................

Published: 2020Read / Download
Taylor Based Grey Wolf Optimization Algorithm (TGWOA) For Energy Aware Secure Routing Protocol
Robbi Rahim, S. Murugan, S. Priya, S. Magesh, R.Manikandan

Abstract - Wireless Sensor Network (WSN) design to be efficient expects better energy optimization methods as nodes in WSN are operated only through batteries. In WSN, energy is a challenging one in the network during transmission of data. To overcome the energy issue in WSN, Taylor based Grey Wolf Optimization algorithm proposed, which is the integration of the Taylor series with Grey Wolf Optimization approach finding optimal hops to accomplish multi-hop routing. This paper shows the multiple objective-based approaches developed to achieve secure energy-aware multi-hop routing. Moreover, secure routing is to conserve energy efficiently during routing. The proposed method achieves 23.8% of energy, 75% of Packet Delivery Ratio, 35.8% of delay, 53.2% of network lifetime, and 84.8% of scalability.

Published: 2020Read / Download
EEMCCP - A Novel Architecture Protocol Design for Efficient Data Transmission in Underwater Acoustic Wireless Sensor Network
M. Usha, J. Sathiamoorthy, R. Ashween, Bhagavath Nishanth Ramakrishnan

Abstract - Underwater communication is a newer addition to the ad hoc network arena as it opens several avenues of research that can be carried out under water. It has a varied range of applications which it carries out with the help of Autonomous Underwater Vehicles (AUV).Acoustic waves are used for sending out the network signals because they tend to have a lower attenuation under water. Underwater Acoustic Communication (UWAC) is used to send and receive signals underwater. Since UWAC is a relatively new field, there are still a lot of challenges to overcome. Unlike terrestrial communication, UWAC has to encounter factors like limited bandwidth, longer propagation delay, Doppler Effect, and channel availability problems. All of these factors have a direct effect on the throughput. Clustering the network can effectively help in managing the network efficiently. We have proposed an Energy Efficient Minimum Cost Cluster routing Protocol (EEMCCP).............................

Published: 2020Read / Download
Performance Analysis of Wireless Sensor Network Localization Algorithms
Putri Kevin, Dian viely, Udeni T. Samarakoon

Abstract - In recent years, the use of Wireless Sensor Networks (WSNs) has been increasing. Like WSNs protocols development, localization is the main issue and needed to address several areas including 3D and mobile anchor-based localization algorithms. WSNs are being used widely in different fields like environment, disaster relief, target tracking and several other applications like the SCADA system for the high voltage of electricity. In many applications, node localization is very important in which the system needed to know the exact location of the event. This paper addresses the main ideas and techniques published in recent years. We highlight the error performance analysis between the algorithms stated static 3D localization.............................

Published: 2019Read / Download
Wireless Sensor Network Surveillance on Forest Illegal Mining using 'Planned Behaviour Abortion Tower': Analytical Modelling
Eric Opoku Osei , James B. Hayfron-Acquah, Michael Asante

Abstract -The USAID report on climate change vulnerability and adaptation in Ghana confirmed the impact of recent explosion of illegal gold mining in forest reserves and in river body. Government of Ghana responded to such wake-up call in deploying military combatants against perpetrators operating at day and midnight hours when drones are ineffective to monitor. We aimed at wireless sensor network (WSN) deployment to compliment military efforts for real time remote sensing. A conceptual framework on WSN technology is proposed based on expert view gathered from Delphi technique data analysis. A close textual reading of illegal ...........................

Published: 2018Read / Download
MA-LEACH: Energy Efficient Routing Protocol for WSNs using Particle Swarm Optimization and Mobile Aggregator
Alzahraa Elsayed, Mohamed Sharaf

Abstract -Routing protocols for wireless sensor networks pay a great attention to the limited resources of the nodes. As battery lifetime is a major concern, we consider our proposed model as an effort to prolong the network lifetime in harmony with WSNs' constraints. In this paper, we study LEACH routing protocol and its performance and propose an extension to it, MA-LEACH. We introduce a mobile aggregator (MA) which is a gadget adopted to mitigate the overhead on the cluster heads(CHs). In addition, we optimize the trajectory using particle swarm optimization (PSO). Hence, we adapt the TSP problem to our protocol to determine the optimal trajectory that a mobile aggregator could travel to visit every cluster head in the network. We simulate the proposed protocol in MATLAB...................................

Published: 2018Read / Download
A Study of Machine Learning in Wireless Sensor Network
Zaki Ahmad Khan, Abdus Samad

Abstract - Within this Paper, a concept of machine learning strategies suggested in this investigation to address the design issues in WSNs is introduced. As can be viewed within this paper, countless endeavors have induced up to now; several layout issues in wireless sensor networks have been remedied employing numerous machine learning strategies. Utilizing machine learning based algorithms in WSNs need to deem numerous constraints, for instance, minimal sources of the network application that really needs distinct events to be tracked as well as other operational and non-operational aspects.

Published: 2017Read / Download
Energy Efficiency Optimization in Wireless Sensor Network Using Proposed Load Balancing Approach
Sukhkirandeep Kaur, Roohie Naaz Mir

Abstract - Advancement in MEMS technology, networking and embedded microprocessors have led to the development of a new generation of a Wireless Sensor Network (WSN) that can operate in unattended and harsh environment depending upon application. WSN consist of large number of power-conscious devices called sensor nodes that detect and observe any physical phenomenon and can be used in a wide range of applications. Underlying topology plays an important role in the performance of the Wireless Sensor Network. Depending upon the application, deployment is performed either deterministically or randomly. WSN suffers from a lot of issues that includes energy conservation, scalability, latency, computational resources and communication capabilities. Energy efficiency is critical issue in Wireless Sensor Networks as nodes are equipped with limited power supply............................

Published: 2016Read / Download
A Novel Routing Scheme to Avoid Link Error and Packet Dropping in Wireless Sensor Networks
M. Kavitha, B. Ramakrishnan, Resul Das

Abstract - Packet loss is a major issue in Wireless Sensor Network (WSN) data transmission which is caused by malicious packet dropping and link error. In conventional methods, the malicious dropping may result in a packet loss rate that is comparable to normal channel losses, the stochastic processes that characterizes the two phenomena exhibited in different correlation which would affect the network performance i.e. detection accuracy. By detecting the correlations between lost packets, we will decide whether the packet loss is purely due to regular link errors, or is a combined effect of link error and malicious drop. In order to overcome these issues, we have proposed a HLA (Homomorphic Linear Authentication) based on routing protocol which is a collusion proof mechanism and resolves the public auditing problem. Here, the proposed technique will be.............................

Published: 2016Read / Download
Wireless Sensor Network-Based Health Monitoring System for the Elderly and Disabled
Gurkan Tuna, Resul Das , Ayse Tuna

Abstract - Even if the elderly and disabled need the assistance of their families, parents, and healthcare providers, they prefer to live in their homes instead of assisted-living centers. Therefore, their health and activities must be remotely monitored so that in case of an urgent unexpected situation, immediate help can be provided. In this respect, this paper proposes a wireless sensor network-based health monitoring system for the elderly and disabled, and focuses on its development steps. The proposed system is composed of low-cost off-the-shelf components and enables the monitoring of important health parameters of the elderly and disabled. Since it is a wireless and portable health monitoring solution, it can be a valuable remote monitoring tool for health care service providers by reducing the cost of their services. It can be combined with data mining solutions and/or machine learning techniques.............................

Published: 2015Read / Download
Time Based Fault Detection and Isolation In Wireless Sensors Network
Imane Merzougui, Youssef Benabbassi

Abstract - Wireless sensor networks have paved the way for the creation of a new generation of applications in a variety of fields. The main aim of this article is to simulate some faults in the behavior of wireless sensor networks. These faults can be classified as "failures" or "intrusions", and in our work, we have focused on the three following faults: external factors (such as Animals, weather ...), a jamming attack in which the attacker is a mobile entity, and finally an inundation attack (successive Hello messages). In order to address the above issues we have designed a method for the detection and isolation of a faulty sensor and a simulator to show the influence of failures and to test the effectiveness of our solution using C++ programming language. This simulation is Capable of detecting and isolating a faulty sensor even in the case when multiple sensors break down at the same time..............................

Published: 2015Read / Download
Design and Simulation of Wireless Sensor Network Topologies Using the ZigBee Standard
Sercan VANCIN , Ebubekir ERDEM

Abstract - Wireless sensor networks are network systems consisting of hundreds, even thousands of sensor nodes connected to each other through a wireless environment. Sensor nodes have complex functions, such as the detection, collection, calculation and routing of surrounding data with predefined criteria by placing them randomly or according to a certain strategy into diverse areas. In this study, the IEEE 802.15.4/ZigBee wireless communication standard was used, which is more advantageous than other wireless communication standards with respect to parameters like battery usage and low power consumption, providing high performance with short-range sensors as well as making it possible to use 3 different band frequencies in the world. Additionally, the RIVERBED (OPNET) Academic Edition 17.5 simulator, capable of generating correct results..............................

Published: 2015Read / Download
A Probabilistic Key Management Protocol based on Kryptograph for WSN
Prachi

Abstract - Security is a matter of extensive research interest with widespread deployment of WSN (Wireless Sensor Network) in various real life applications. Unreliable wireless communication, physically insecure locations and resource exhaustion attacks render sensor vulnerable to several security breaches. Sensors are supposed to operate on battery in hostile and unattended environment over a longer span of time. Taking into consideration conflict in interest between security and energy consumption, effective security implementation is non-trivial in WSN. A number of security schemes were presented in literature for ad hoc networks. However, most traditional security solutions like public key cryptography and trusted third party schemes are infeasible in WSN due to resource stringent nature. Probabilistic key management scheme (PKMS)...............................

Published: 2015Read / Download
Mitigation of Energy Depletion in Wireless Ad-hoc Sensor Networks through Path Optimization
Sandhya Rani G, Santosh Naidu P

Abstract - Low-power wireless networks are an exciting research direction in sensing and widespread figuring out/calculating. Prior security work in this area has focused mostly on denial of communication at the routing or medium access control levels. This paper explores useful thing/valuable supply using everything up (completely) attacks at the routing rules of conduct layer, which permanently disable networks by quickly draining nodes' battery power. These "Vampire" attacks are not specific to any specific rules of conduct, but rather depend on the properties of many popular classes of routing rules of conduct. We find that all examined rules of conduct are easily able to be harmed or influenced by Vampire attacks, which are terrible and destructive, very hard to detect, and are easy to carry out using as few as one evil and cruel insider sending only rules of conduct cooperative messages...............................

Published: 2015Read / Download
Energy Efficient Routing (EER) For Reducing Congestion and Time Delay in Wireless Sensor Network
A. Anuba Merlyn, A. Anuja Merlyn

Abstract -A Wireless Sensor Network (WSN) has sensor nodes which highly scalable and limited storage capability nodes. In the network, the nodes are in distributed manner and autonomous devices. The sensor node can communicate the information directly or indirectly. In WSN, the packets should be routed from source to destination within the limited power storage. The sensor nodes of WSN are highly mobile and based on the dynamic scenarios in the routing path and the network topology change frequently. A node in the routing path should be aware of the information regarding the nearest node. In traditional routing protocols, every node in the network exchanges periodic one-hop beacons. Beacons are short messages send periodically to indicate the neighbor nodes about their identification and position in the network. In the existing approach, some problems...............................

Published: 2014Read / Download

Talk to Us

Mobile: +91 9442777224

Email Us

everscience2015@gmail.com
Write to Us

EverScience Publications
Nagercoil,
Kanyakumari District,
Tamil Nadu, India.
    EverScience Publications
    Computer Science Research Articles
    A Single Platform to Read Reserch Articles in the Field of Computer Science