Refine your search
Collections
Year
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z All
Sivaram, M.
- Autonomous Greedy Routing in Wireless Sensor Networks
Abstract Views :195 |
PDF Views:0
Authors
Affiliations
1 Department of Computing Science and Engineering, Galgotias University, IN
2 Department of Information Technology, Lebanese French University, IQ
1 Department of Computing Science and Engineering, Galgotias University, IN
2 Department of Information Technology, Lebanese French University, IQ
Source
ICTACT Journal on Communication Technology, Vol 10, No 1 (2019), Pagination: 1947-1952Abstract
Routing is challenging issue in WSN: Cryptography and key management schemes seem good, but they are too expensive in WSN. Prevention-based and detection based are the two approaches that are used in MANET. In prevention-based approaches a centralized key management is required, These applications require a good Quality of Service (QoS) from sensor networks, such as, minimum percentage of sensor coverage in the required area, continuous service during required time slot with minimum (or limited) resources (like sensor energy and channel bandwidth) and minimum outside intervention. The whole network may be affected if the infrastructure is destroyed. So this approach is used to prevent misbehavior, but not detect malicious based routes Detection based approaches are used to detect selfish node along with route that helps to identify malicious misbehavior route. Detection based approaches are based on trust in MANETs. Hence this approach is used to calculate the trust value in trust management schemes. The proposed scheme differentiates, routes, data packets and control packets, and also excludes the other causes that results in dropping packets, such as unreliable wireless connections and buffer overflows. The proposed scheme in a MANET routing protocol, evaluation of the AODV (Adhoc on demand on distance vector) and Low Energy Adaptive Clustering Hierarchy (LEACH) protocol with the NS2 simulator.Keywords
MANET, WSN, Routing, Quality of Service, AODV.References
- M.A. Rahman, M.S. Islam and A. Talevski, “Performance Measurement of Various Routing Protocols in Ad-Hoc Network”, Proceedings of International Multi Conference of Engineers and Computer Scientists, pp. 18-20, 2009.
- R.P. Gupta, D.V.K. Sharma and V.M. Shrimal, “Investigation of Different Parameters of Dynamic Source Routing with varied Terrain Areas and Pause Time for Wireless Sensor Network”, International Journal of Modern Engineering Research, Vol. 1, No. 2, pp. 626-631, 2011.
- J.N. Al-Karaki and A.E. Kamal, “Routing Techniques in Wireless Sensor Networks: A Survey”, IEEE Wireless Communications, Vol. 11, No. 6, pp. 6-28, 2004.
- T. Van Dam and K. Langendoen, “An Adaptive Energy-Efficient MAC Protocol for Wireless Sensor Networks”, Proceedings of 1st International Conference on Embedded Networked Sensor Systems, pp. 171-180, 2003.
- Vijay Mohan Shrimal, Ravindra Prakash Gupta and Virendra Kumar Sharma, “Investigation of Adhoc Topology AODV for Wireless Sensor Networks for Varying Terrain Areas for Different Speed (Node Speed)”, International Journal of Advanced Research in Computer Science and Software Engineering, Vol. 2, No. 1, pp. 12-18, 2012.
- L. Breslau, D. Estrin, K. Fall, S. Floyd, J. Heidemann, A. Helmy and H. Yu, “Advances in network simulation”, Computer, Vol. 33, No. 5, pp. 59-67, 2000.
- K. Fall and K. Varadhan, “The ns Manual (formerly ns Notes and Documentation)”, Available at: https://www.isi.edu/nsnam/ns/doc/ns_doc.pdf.
- Imad Aad, Mohammad Hossein Manshaei and Jean Pierre Hubaux, “ns2 for the Impatient”, Available at: http://www.manshaei.org/files/HoE-ns2-Mobnet09.pdf.
- A. Aziz, S. Rahayu, N.A. Endut, S. Abdullah, M. Daud and M. Norazman, “Performance Evaluation of AODV, DSR and DYMO Routing Protocol in MANET”, Scientific Research Journal, Vol. 5, No. 2, pp. 49-65, 2008.
- I.F. Akyildiz, W. Su, Y. Sankarasubramaniam and E. Cayirci, “Wireless Sensor Networks: A Survey”, Computer Networks, Vol. 38, No. 4, pp. 393-422, 2002.
- Optimized Cooperative QOS Enhanced Distributed Multipath Routing Protocol
Abstract Views :147 |
PDF Views:0
Authors
Affiliations
1 Department of Computer Engineering, Lebanese French University, IQ
2 Department of Information Technology, Emirates College for Management and Information Technology, AE
3 Department of Master of Computer Application, Jain University, IN
1 Department of Computer Engineering, Lebanese French University, IQ
2 Department of Information Technology, Emirates College for Management and Information Technology, AE
3 Department of Master of Computer Application, Jain University, IN
Source
ICTACT Journal on Communication Technology, Vol 10, No 3 (2019), Pagination: 2061-2065Abstract
The link failure is considered in this paper in order to guarantee reliable and continuous transmission of data. And to ensure that cooperative routing is done faster response and effective packet transmission. Cooperative communications are the most recent fields of research; they combine wireless channels’ link quality and broadcasting nature. So communication in ad hoc mobile networks only works properly if the participating nodes work together in routing and transmission. A flow is divided into batches of data packets. When they leave the source node every packet in the same batch has the same forwarder list. The underlying routing protocol used in this work is Proactive Source Routing (PSR), which provides each node with all other nodes on the network. The forwarder list therefore contains the identity of the path nodes from the source node to the location. Once packets progress through the network, forwarding nodes can amend the forwarder list when any changes in the network topology have been observed. In addition, some other nodes not listed as transmitting data may also be transmitted, which is called as small-scale retransmission.Keywords
Link-Quality, QOS, Proactive Source Routing, Multipath Routing Protocol.References
- Y. Chai, W. Shi, T. Shi and X. Yang, “An Efficient Cooperative Hybrid Routing Protocol for Hybrid Wireless Mesh Networks”, Wireless Networks, Vol. 23, No. 5, pp. 1387-1399, 2017.
- P. Vivekanandan and A. Sunitha Nadhini, “A Survey on Efficient Routing Protocol using Mobile Networks”, International Journal of Advances in Engineering and Technology, Vol. 6, No. 1, pp. 370-382, 2013.
- S. Paruchuri and S. Awate, “Organizational Knowledge Networks and Local Search: The Role of IntraOrganizational Inventor Networks”, Strategic Management Journal, Vol. 38, No. 3, pp. 657-675, 2017.
- V. Balasubramanian and A. Karmouch, “Managing the Mobile Ad-Hoc Cloud Ecosystem using software Defined Networking Principles”, Proceedings of International Symposium on Networks, Computers and Communications, pp. 1-6, 2017.
- T.X. Tran, A. Hajisami, P. Pandey and D. Pompili, “Collaborative Mobile Edge Computing in 5G Networks: New Paradigms, Scenarios, and Challenges”, IEEE Communications Magazine, Vol. 55, No. 4, pp. 54-61, 2017.
- B. Blanco, J.O. Fajardo, I. Giannoulakis, E. Kafetzakis, S. Peng, J. Perez Romero and E. Sfakianakis, “Technology Pillars in the Architecture of Future 5G Mobile Networks: NFV, MEC and SDN”, Computer Standards and Interfaces, Vol. 54, pp. 216-228, 2017.
- M.L. Duckers, A.B. Witteveen, J.I. Bisson and M. Olff, “The Association between Disaster Vulnerability and PostDisaster Psychosocial Service Delivery across Europe”, Administration and Policy in Mental Health and Mental Health Services Research, Vol. 44, No. 4, pp. 470-479, 2017.
- C. Arrighi, L. Rossi, E. Trasforini, R. Rudari, L. Ferraris, M. Brugioni and F. Castelli, “Quantification of Flood Risk Mitigation Benefits: A Building-Scale Damage Assessment through the RASOR Platform”, Journal of Environmental Management, Vol. 207, pp. 92-104, 2018.
- C. Zhou and L.Y. Ding, “Safety Barrier Warning System for Underground Construction Sites using Internet-of-Things Technologies”, Automation in Construction, Vol. 83, pp. 372-389, 2017.
- N. Kumar and R.A. Khan, “Emergency Information System Architecture for Disaster Management: Metro City Perspective”, International Journal of Advanced Research in Computer Science, Vol. 8, No. 5, pp. 560-564, 2017.
- E. Burke, M. Pinedo, K.G. Zografos, M.A. Madas and K.N. Androutsopoulos, “Increasing Airport Capacity Utilisation through Optimum Slot Scheduling: Review of Current Developments and Identification of Future Needs”, Journal of Scheduling, Vol. 20, No. 1, pp. 103-113, 2017.
- F. Al-Turjman, “Cognitive Routing Protocol for DisasterInspired Internet of Things”, Future Generation Computer Systems, Vol. 92, pp. 1103-1115, 2017.
- C. Funai, C. Tapparello and W. Heinzelman, “Enabling Multi-Hop Ad Hoc Networks through WiFi Direct MultiGroup Networking”, Proceedings of International Conference on Computing, Networking and Communications, pp. 491-497, 2017.
- D. Aggarwal, “A Study on the Role of Mobile Ad Hoc Networks (MANETS) In Disaster Management”, International Journal of Advanced Research in Computer Science, Vol. 8, No. 5, pp. 1963-1966, 2017.
- X. Xu, A. Chen and C. Yang, “An Optimization Approach for Deriving Upper and Lower Bounds of Transportation Network Vulnerability under Simultaneous Disruptions of Multiple Links”, Transportation Research Procedia, Vol. 23, No. 7, pp. 645-663, 2017.
- S. Rani, J. Malhotra and R. Talwar, “Energy Efficient Chain based Cooperative Routing Protocol for WSN”, Applied Soft Computing, Vol. 35, pp. 386-397, 2015.
- M. Maalej, S. Cherif and H. Besbes, “QoS and Energy Aware Cooperative Routing Protocol for Wildfire Monitoring Wireless Sensor Networks”, The Scientific World Journal, Vol. 2013, pp. 1-11, 2013.
- M. Chen, T. Kwon, S. Mao, Y. Yuan and V.C. Leung, “Reliable and Energy-Efficient Routing Protocol in Dense Wireless Sensor Networks”, International Journal of Sensor Networks, Vol. 4, No. 1-2, pp. 104-112, 2008.