AN EFFECTIVE TECHNIQUE OF SIGNAL TRANSFER IN WIRELESS SENSOR NETWORKS
2
Author(s):
RAJESH SINGH REDU, DINESH KUMAR
Vol - 4, Issue- 2 ,
Page(s) : 170 - 175
(2013 )
DOI : https://doi.org/10.32804/IRJMST
Abstract
networked systems, characterized by severely constrained computational and energy resources, and an ad hoc operational environment. When we work with a large sensor area network with dense sensors , there are some nodes that has to bear the heavy traffic load then over the time such sensor goes weak and they start losing the packet. This packet loss is bearable up to some threshold value, but as the packet loss exceed this level it disturb the whole network and now any kind of data transfer over this node is not reliable. In this paper author will proposed a algorithm that will solve the problem of packets lost and improve the reliability of network. The author will implement this algorithm by help of NS-2 simulator.
- W. Su Y. Sankarasubramaniam E. Cayirci Akyildiz, I.F. A survey on sensor- networks. IEEE Communications Magazine, pages 102{114, 2002.
- Kumar.S.P. Chee-Yee Chong. Sensor networks: Evolution, opportunities, and challenges. Proc IEEE, August 2003.
- Ismail H. Kasimoglui Ian .F. Akyildiz. Wireless sensor and actor :research challenges. (Elsevier) Journal, 2(38):351{367, 2004.
- Sundeep Karthikeyan Vaidynathan, Sayantan sur and Sinha. Data aggre- gation techniques in sensor networks. Technical Report,OSU-CISRC-11/04-TR60, 2004.
- D. Agrawal N. Shrivastava, C. Buragohain and S. Suri. Medians and beyond: new aggregation techniques for sensor networks. Proceedings of the 2nd inter-national conference on Embedded networked sensor systems, pages 239{249, 2004. ACM Press.
- Xiuli Ren and Haibin Yu1. Security mechanisms for wireless sensor networks. IJCSNS International Journal of Computer Science and Network Security,VOL.6(No.3):100{107, March 2006.
- S. Setia S. Zhu and S. Jajodia. Leap: e±cient security mechanisms for large scale distributed sensor networks. Proceedings of the 10th ACM conference on Computer and communications security, pages 62{72, 2003. ACM Press.
- J. Stankovic A. Perrig and D. Wagner. Security in wireless sensor networks.
- P.Nair H.Cam, S.Ozdemir and D. Muthuavinashiappan. Espda: Energy- efficient and secure pattern based data aggregation for wireless sensor networks. Computer Communications IEEE Sensors, 29:446{455, 2006.
- L. Eschenauera nd V. Gligor. A key-managemensct hemef or distributed sensor networks. In Proceedings of the ACM Conference on Computer and Communication Security (CCS), Nov. 2002.
- H. Chan, A. Perrig, and D. Song. Randomk ey predistribution schemes for sensor networks. In Proceedings of IEEE Symposium on Security and Privacy, May 2003.
- F. Bouhafs, M. Merabti, and H. Mokhtar, A Semantic Clustering Routing Protocol for Wireless Sensor Networks, Proceedings of the 3rd IEEE Consumer Communications and Networking Conference, 2006, pp. 351-355.
|