Open Access Open Access  Restricted Access Subscription Access
Open Access Open Access Open Access  Restricted Access Restricted Access Subscription Access

Autonomous Greedy Routing in Wireless Sensor Networks


Affiliations
1 Department of Computing Science and Engineering, Galgotias University, India
2 Department of Information Technology, Lebanese French University, Iraq
     

   Subscribe/Renew Journal


Routing is challenging issue in WSN: Cryptography and key management schemes seem good, but they are too expensive in WSN. Prevention-based and detection based are the two approaches that are used in MANET. In prevention-based approaches a centralized key management is required, These applications require a good Quality of Service (QoS) from sensor networks, such as, minimum percentage of sensor coverage in the required area, continuous service during required time slot with minimum (or limited) resources (like sensor energy and channel bandwidth) and minimum outside intervention. The whole network may be affected if the infrastructure is destroyed. So this approach is used to prevent misbehavior, but not detect malicious based routes Detection based approaches are used to detect selfish node along with route that helps to identify malicious misbehavior route. Detection based approaches are based on trust in MANETs. Hence this approach is used to calculate the trust value in trust management schemes. The proposed scheme differentiates, routes, data packets and control packets, and also excludes the other causes that results in dropping packets, such as unreliable wireless connections and buffer overflows. The proposed scheme in a MANET routing protocol, evaluation of the AODV (Adhoc on demand on distance vector) and Low Energy Adaptive Clustering Hierarchy (LEACH) protocol with the NS2 simulator.

Keywords

MANET, WSN, Routing, Quality of Service, AODV.
Subscription Login to verify subscription
User
Notifications
Font Size

  • M.A. Rahman, M.S. Islam and A. Talevski, “Performance Measurement of Various Routing Protocols in Ad-Hoc Network”, Proceedings of International Multi Conference of Engineers and Computer Scientists, pp. 18-20, 2009.
  • R.P. Gupta, D.V.K. Sharma and V.M. Shrimal, “Investigation of Different Parameters of Dynamic Source Routing with varied Terrain Areas and Pause Time for Wireless Sensor Network”, International Journal of Modern Engineering Research, Vol. 1, No. 2, pp. 626-631, 2011.
  • J.N. Al-Karaki and A.E. Kamal, “Routing Techniques in Wireless Sensor Networks: A Survey”, IEEE Wireless Communications, Vol. 11, No. 6, pp. 6-28, 2004.
  • T. Van Dam and K. Langendoen, “An Adaptive Energy-Efficient MAC Protocol for Wireless Sensor Networks”, Proceedings of 1st International Conference on Embedded Networked Sensor Systems, pp. 171-180, 2003.
  • Vijay Mohan Shrimal, Ravindra Prakash Gupta and Virendra Kumar Sharma, “Investigation of Adhoc Topology AODV for Wireless Sensor Networks for Varying Terrain Areas for Different Speed (Node Speed)”, International Journal of Advanced Research in Computer Science and Software Engineering, Vol. 2, No. 1, pp. 12-18, 2012.
  • L. Breslau, D. Estrin, K. Fall, S. Floyd, J. Heidemann, A. Helmy and H. Yu, “Advances in network simulation”, Computer, Vol. 33, No. 5, pp. 59-67, 2000.
  • K. Fall and K. Varadhan, “The ns Manual (formerly ns Notes and Documentation)”, Available at: https://www.isi.edu/nsnam/ns/doc/ns_doc.pdf.
  • Imad Aad, Mohammad Hossein Manshaei and Jean Pierre Hubaux, “ns2 for the Impatient”, Available at: http://www.manshaei.org/files/HoE-ns2-Mobnet09.pdf.
  • A. Aziz, S. Rahayu, N.A. Endut, S. Abdullah, M. Daud and M. Norazman, “Performance Evaluation of AODV, DSR and DYMO Routing Protocol in MANET”, Scientific Research Journal, Vol. 5, No. 2, pp. 49-65, 2008.
  • I.F. Akyildiz, W. Su, Y. Sankarasubramaniam and E. Cayirci, “Wireless Sensor Networks: A Survey”, Computer Networks, Vol. 38, No. 4, pp. 393-422, 2002.

Abstract Views: 194

PDF Views: 0




  • Autonomous Greedy Routing in Wireless Sensor Networks

Abstract Views: 194  |  PDF Views: 0

Authors

N. V. Kousik
Department of Computing Science and Engineering, Galgotias University, India
M. Sivaram
Department of Information Technology, Lebanese French University, Iraq
S. Kalidass
Department of Computing Science and Engineering, Galgotias University, India

Abstract


Routing is challenging issue in WSN: Cryptography and key management schemes seem good, but they are too expensive in WSN. Prevention-based and detection based are the two approaches that are used in MANET. In prevention-based approaches a centralized key management is required, These applications require a good Quality of Service (QoS) from sensor networks, such as, minimum percentage of sensor coverage in the required area, continuous service during required time slot with minimum (or limited) resources (like sensor energy and channel bandwidth) and minimum outside intervention. The whole network may be affected if the infrastructure is destroyed. So this approach is used to prevent misbehavior, but not detect malicious based routes Detection based approaches are used to detect selfish node along with route that helps to identify malicious misbehavior route. Detection based approaches are based on trust in MANETs. Hence this approach is used to calculate the trust value in trust management schemes. The proposed scheme differentiates, routes, data packets and control packets, and also excludes the other causes that results in dropping packets, such as unreliable wireless connections and buffer overflows. The proposed scheme in a MANET routing protocol, evaluation of the AODV (Adhoc on demand on distance vector) and Low Energy Adaptive Clustering Hierarchy (LEACH) protocol with the NS2 simulator.

Keywords


MANET, WSN, Routing, Quality of Service, AODV.

References