Open Access Subscription Access
Open Access Subscription Access
Survey of Selfish Node Detection in Wireless Sensor Networks Using Watchdog Method
Zigbee protocol is used to send the packet from source to destination. It does not have any routing table and route discovery method. Tree topology method followed by ZigBee Tree Routing (ZTR). But it will not be provided the best routing path from source to destination. Shortcut Tree Routing (STR) can be used to provide best optimal path. STR will calculate the hop count from source to destination with help of Zigbee protocol. Zigbee protocol having the hierarchical addressing format. Shortcut Tree Routing method does not have security procedure option. Because of this our technique will be protected in safe manner. Most of the sensor networks are having self centered node. Due this there is a possible to get performance degradation between source and destination. These selfish node should be identified to get make better formance for sensor networks. Main theme of our paper is to find selfish node from the networks and providing best route between source to destination. Our aim is to get efficient data delivery using Watchdog method.
Misbehavior Node Detection, Watchdog Method, WSN, Shortcut Tree Routing Method (STR), ZigBee Protocol.
- H. Lu, X. Jia, P.-J. Wan, X. Liu, and F. F. Yao, “A distributed and efficient flooding scheme using 1-hop information in mobile ad hoc networks,” IEEE Transactions on Parallel and Distributed Systems, vol. 18, no. 5, pp. 658-671, May 2007.
- O. Gnawali, R. Fonseca, K. Jamieson, D. Moss, and P. Levis, “Collection tree protocol,” Proceedings of the 7th ACM on Embedded Networked Sensor Systems (SenSys’09), California, 4-6 November, 2009.
- T. Kim, D. Kim, N. Park, S. Yoo, and T. S. Lopez, “Shortcut tree routing in ZigBee networks,” 2nd International Symposium on Wireless Pervasive Computing (ISWPC’07), 2007.
- A. V. Aho, J. E. Hopcroft, and J. D. Ullman, “On finding lowest common ancestors in trees,” SIAM Journal on Computing, vol. 5, no. 1, pp. 115-132, 1976.
- A. Agbaria, M. Hugerat, and R. Friedman, “Efficient and reliable dissemination in mobile ad hoc networks by location extrapolation,” Journal of Computer Networks and Communications, vol. 2011, 2011.
- S. Zair, M. Mehdi, A. Anou, and M. Bensebti, “A bayesian networks in intrusion detection systems,” Journal of Computer Science, vol. 3, no. 5, pp. 259-265, Science Publications, 2007.
- Y.-K. Huang, A.-C. Pang, P.-C. Hsiu, W. Zhuang, and P. Liu, “Distributed throughput optimization for ZigBee cluster-tree networks,” IEEE Transactions on Parallel and Distributed Systems, vol. 23, no. 3, pp. 513-520, March 2012.
- M. S. Pan, C.-H. Tsai, and Y. C. Tseng, “The orphan problem in ZigBee wireless networks,” IEEE Transactions on Mobile Computing, vol. 8, no. 11, pp. 1573-1584, November 2009.
- J. Zhou, and D. D. Roure, “Flood net: Coupling adaptive sampling with energy aware routing in a flood warning system,” Journal of Computer Science and Technology, vol. 22, no. 1, pp. 121-130, January 2007.
- C. E. Perkins, and E. M. Royer, “Ad hoc on-demand distance vector routing,” Proceedings of 2nd IEEE Workshop on Mobile Computer Systems and Applications (WMCSA’99), 25-26 February 1999.
- G. Ding, Z. Sahinoglu, P. Orlik, J. Zhang, and B. Bhargava, “Efficient and reliable broadcast in ZigBee networks,” IEEE Transactions on Mobile Computing, IEEE SECON’05, 2005.
- D. Kim, Y. Doh, S. Yoo, K. Chang, W. Park, and C. Seo, “Low rate WPAN technologies and standards,” KISS Information and Communications Journal, December 2004.
Abstract Views: 30
PDF Views: 2