Synopsis
Synopsis
APPLICATIONS OF WSNS
1. Area monitoring
2. Environmental monitoring Greenhouse monitoring Landslide detection
3. Industrial monitoring Machine health monitoring
4. Water/Wastewater monitoring Landfill ground well level monitoring and pump
counter Agriculture
5. Fleet monitoring
6. Health Monitoring
7. Security
Types of Simulator:
Routing in WSN
Node deployment
Energy considerations
Node/link heterogeneity
Fault tolerance
Scalability
Network dynamics
Transmission media
Connectivity
Coverage
Data aggregation/convergecast
Quality of service
TRMSimulator
TRMSim-WSN (Trust and Reputation Models Simulator for Wireless Sensor
Networks) is a Java-based simulator aimed to test Trust and Reputation models for
WSNs.
It provides several Trust and Reputation models and new ones can be easily added.
It allows researchers to test and compare their trust and reputation models against a
wide range of WSNs. They can decide whether they want static or dynamic
networks, the percentage of fraudulent nodes, the percentage of nodes acting as
clients or servers, etc .It has been designed to easily adapt and integrate a new
model within the simulator. Only a few classes have to be implemented in order to
carry out this task.
Location-Based
In these protocols, nodes are addressed and used for routing based on their location
in the network. This location can be estimated using received signal strengths or a
low power GPS receiver. This helps in formation of routes and improves efficiency,
as only those nodes need to be considered that are on the route to the base station
from the point of detection. GPSR (Greedy Perimeter Stateless Routing for Wireless
Networks) suggests a geographic location based routing scheme.
LITERATURE REVIEW
[1] N. Aboudagga, M.T. Refaei, M. Eltoweissy, L. DaSilva and J. Quisquater,
Authentication Protocols for Ad Hoc Networks : Taxonomy and Research Issues, In
Proceedings of the 1st ACM international workshop on Quality of service & security in
wireless and mobile networks, Quebec, Canada, 2005, pp. 96-104.
[2] W. Du, R. Wang and P. Ning, An Efficient Scheme for Authentication Public Keys in
Sensor Networks, In Proceeding of 6th ACM International Symposium on Mobile Ad Hoc
Networking and Computing (MobiHoc), IL, USA, 2005, pp. 58-67.
[3] H. Cam, S. Ozdemir, D. Muthuavinashiappan and P. Nair, Energy Efficient Security
Protocol for Wireless Sensor Networks, Vehicular Technology Conference, 2003, vol. 5, pp.
2981-2984.
[4] C. Karlof and D. Wagner, Secure Routing in Wireless Sensor Networks: Attacks and
Countermeasures, In Proceedings of the 1st IEEE International Workshop on Sensor
Network Protocols and Applications, Anchorage, AK, 2003.