0% found this document useful (0 votes)
48 views

April 2020: Top Read Articles in Wireless & Mobile Networks

This article discusses fault detection and recovery techniques for wireless sensor networks using clustering. It proposes that clusters should have a primary cluster head and secondary cluster head based on node energy levels, to allow for recovery when the primary cluster head fails. When a node's energy is drained, the secondary cluster head can take over as the new primary head to maintain network connectivity. The techniques were simulated in Matlab to analyze energy consumption and how clustering can improve fault tolerance in wireless sensor networks.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
48 views

April 2020: Top Read Articles in Wireless & Mobile Networks

This article discusses fault detection and recovery techniques for wireless sensor networks using clustering. It proposes that clusters should have a primary cluster head and secondary cluster head based on node energy levels, to allow for recovery when the primary cluster head fails. When a node's energy is drained, the secondary cluster head can take over as the new primary head to maintain network connectivity. The techniques were simulated in Matlab to analyze energy consumption and how clustering can improve fault tolerance in wireless sensor networks.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 19

April 2020: Top

Read Articles in
Wireless & Mobile
Networks

International Journal of Wireless & Mobile


Networks (IJWMN)
ISSN:0975-3834 [Online]; 0975-4679 [Print]
http://airccse.org/journal/ijwmn.html
HORIZONTAL AND VERTICAL ZONE BASED LOCATION
TECHNIQUES FOR WIRELESS SENSOR NETWORKS
M. Bala Krishna1* and M. N. Doja2
1*
University School of Information Technology, G G S Indraprastha University, Delhi,
INDIA
2
Department of Computer Engineering, Jamia Millia Islamia, Delhi, INDIA

ABSTRACT
Localization is an important feature in Wireless sensor networks (WSNs). Accuracy in
node localization with proper synchronization and required localization of sensor nodes,
save node energy and enhance the performance of communication network protocols. In
this paper we propose distributed localization algorithms and assume position known
Cluster Head (CH) and position unknown three beacon nodes for each cluster. Using
trilateration technique beacon nodes are located. Additional beacon node is added to
confirm the location of beacon nodes and maintain location accuracy. These position
localized beacon nodes help to locate other sensor nodes. The proposed two distributed
zone based localization algorithms are (i) Horizontal Location Position System (H-LPS),
where cluster is divided into Horizontal Zones (HZs) and beacon nodes locate in
horizontal direction and (ii) Vertical Location Position System (V-LPS), where cluster
is divided into Vertical Zones (VZs) and beacon nodes locate in vertical direction. The
main advantage of zone based localization is nodes belonging to a bounded zone
(horizontal or vertical) are localized and participate in WSN computing. If a bounded
zone is eliminated during localization, then nodes do not participate in localization and
thus save WSN computing. We provide zone based simulations for H-LPS and V-LPS
in comparison with existing localization algorithms like Ad hoc Positioning System
(APS), Recursive Positioning Estimation (RPE) and Directed Positioning Estimation
(DPE). Performance evaluation of H-LPS and V-LPS illustrate that for zone based
localization, H-LPS and V-LPS perform better that existing localization techniques.
Bounded zone performance is optimal for H-LPS and V-LPS compared to existing
localization techniques in WSN.

KEYWORDS

RSSI, Trilateration, Multilateration, Bounded-Box, Time of Arrival (TOA), DV-Hop


(Distance Vector), DV-Distance, Cluster Head (CH), Beacon Node (BN), Horizontal
Zone (HZ) and Vertical Zone (VZ).

Read Full Article :http://airccse.org/journal/jwmn/1110ijwmn14.pdf


REFERENCES

[1] Guoqiang Mao and Baris Fidan (2009), “Localization Algorithms and Strategies for
Wireless Sensor Networks”, Information Science Reference (Imprint of IGI Global), UK.
[2] Masoomeh Rudafshani and Suprakash Datta (2007), “Localization in Wireless Sensor
Networks”,
IPSN’07, April 2007, pp. 51-60.
[3] Guoqiang Mao, Barıs Fidan and Brian D.O. Anderson (2007), “Wireless sensor network
localization techniques”, Elsevier Computer Networks, 2007 Volume 51, pp. 2529-2553.
[4] Azzedine Bouerche, Horacio A.B.F.Oliveira, Eduardo F.Nakamura and Antonio
A.F.Loureiro (2007), “Localization Systems for Wireless Sensor Networks”, IEEE Wireless
Communication Magazine, December 2007, pp. 6-12.
[5] L. Doherty, K. S. J. Pister, and L. El Ghaoui (2001), “Convex position estimation in
wireless sensor networks”, Proceedings of IEEE INFOCOM, volume 3, April 2001, pp. 1655
– 1663.
[6] Y. Shang, W. Ruml, Y Zhang, and M. Fromherz (2004), “Localization from connectivity
in sensor networks”, IEEE Transactions on Parallel and Distributed Systems, no. 11,
volume 15, pp. 961 – 974.
[7] C. Savarese, J. M. Rabaey, and J. Beutel (2001), “Location in distributed ad - hoc
wireless sensor networks”, Proceedings of 2001 International Conference on Acoustics,
Speech, and Signal Processing (ICASSP ’01), May 2001, pp. 2037 – 2040.
[8] Gwo-Jong Yu and Shao-Chun Wang (2008), “A Hierarchical MDS-based Localization
Algorithm for Wireless Sensor Networks”, Journal of Information Technology and
Applications, 2008, Volume 2, No. 4, pp. 197-202.
[9] Cesare Alippi, Giovanni Vanini (2006), “A RSSI-based and calibrated centralized
localization technique for Wireless Sensor Networks”, Proceedings of Fourth IEEE
International Conference on Pervasive Computing and Communications Workshops
(PERCOMW’06), March 2006, pp. 301-305.
[10] J. Albowicz, A. Chen, and L. Zhang (2001), “Recursive position estimation in
sensor networks”,
The 9th International Conference on Network Protocols, November 2001, pp. 35–41.
[11] D. Niculescu and B. Nath (2001), “Ad - hoc positioning system”, Proceedings
of 2001 IEEE Global Communications Conference (Globecom ’ 2001), November 2001, pp.
2926 – 2931.
[12] C. Savarese, K. Langendoen, and J. Rabaey (2002), “Robust positioning
algorithms for distributed ad-hoc wireless sensor networks”, Proceedings of USENIX
Technical Annual Conference, 2002, pp. 317 – 328.
[13] Peng Aiping, Guo Xiaosong, Cai Wei, Li Haibin, (2009) "A Distributed
Localization Scheme for Wireless Sensor Networks Based on Bounding Box Algorithm",
IEEE The Ninth International Conference on Electronic Measurement & Instruments
(ICEMI’2009), pp. 984-988.
[14] T. He, C. Huang, B. Blum, J. Stankovic, and T. Abdelzaher (2003), “Range-Free
Localization Schemes in Large Scale Sensor Networks”, Proceedings of the Ninth Annual
international conference on Mobile computing and networking (MobiCom 2003), pp. 81 –
95.
[15] H. A. B. F. Oliveira, E. F. Nakamura, A. A. F. Loureiro, and A. Boukerche
(2005), “Directed position estimation: A recursive localization approach for wireless sensor
networks”, Proceedings of the 14th IEEE International Conference on Computer
Communications and Networks (IC3N ’05), October 2005, pp. 557–562.
[16] Azzedine Boukerche (2009), "Algorithms and Protocols for Wireless Sensor
Networks", John Wiley & Sons, Inc., New Jersey, USA.
[17] Amitangshu Pal (2010), "Localization Algorithms in Wireless Sensor Networks:
Current Approaches and Future Challenges", Network Protocols and Algorithms, Volume 2,
No. 1.
[18] Sheng-Shih Wang, Kuei-Ping Shih and Chih-Yung Chang (2007), "Distributed
direction-based localization in wireless sensor networks”, Elsevier Computer
Communications, Volume 30, 2007, pp. 1424-1439.
[19] Lei Zhang and Binwei Deng (2009), "A New Range-based Localization
Algorithm for Wireless Sensor Networks", International Colloquium on Computing,
Communication, Control, and Management (CCCM 2009), pp. 111-114.
[20] Nirupama Bulusu,John Heidemann, Deborah Estrub and Tommy Tran
(2004),"Self-Configuring Localization Systems:Design and Experimental Evaluation",
ACM Transactions on Embedded Computing Systems, Vol. 3, No. 1, February 2004, pp.
24–60.
[21] J. A. Costa , N. Patwari , and A. O. Hero (2006) , “ Distributed weighted –
multidimensional scaling for node localization in sensor networks”, ACM Transactions on
Sensor Networks (TOSN) , volume 2 no. 1, February 2006, pp. 39 – 64.
[22] M. L. Sichitiu and V. Ramadurai (2004), “Localization of wireless sensor
networks with a mobile beacon”, Proceedings of the 1st IEEE International Conference on
Mobile Ad Hoc and Sensor Systems (MASS 2004), October 2004, pp. 174–183.

AUTHOR BIOGRAPHIES

M. Bala Krishna is assistant professor in University School of Information


Technology, Guru Gobind Singh Indraprastha University, Delhi, INDIA. His areas of
interest include architecture and protocols in wireless networks and mobile computing. He
had worked in various research projects of embedded systems design and wireless
communication networks. He is working in the area of wireless sensor and ad hoc
networks, and embedded system applications. He is an active member of various reputed
technical organizations.

M. N. Doja is professor in Department of Computer Engineering, Jamia Millia Islamia,


Delhi, INDIA. His research areas include computer networks and mobile wireless networks,
AI and 4G communications. He has various publications in soft computing techniques. He
is author of various books and has publications in various national and international
conferences and journals. He received awards from many prestigious institutions. He is chair
and co-chair of various technical organization committees at national and international
levels.
Fault Detection and Recovery in Wireless
Sensor Network Using Clustering
Abolfazl Akbari1 , Arash Dana2 , Ahmad Khademzadeh3 and Neda
Beikmahdavi4
1
Dept. of Computer Engineering, Islamic Azad University Ayatollah Amoli Branch,
Amol, Iran
2
Islamic Azad University, Central Tehran Branch, Tehran, Iran
3
Iran Telecom Research Center, Tehran, Iran
4
Islamic Azad University Ayatollah Amoli Branch, Amol, Iran

Abstract— Some WSN by a lot of immobile node and with the limited energy and
without further charge of energy. Whereas extension of many sensor nodes and their
operation. Hence it is normal.unactive nodes miss their communication in network,
hence split the network. For avoidance split of network, we proposed a fault recovery
corrupted node and Self Healing is necessary. In this Thesis, we design techniques to
maintain the cluster structure in the event of failures caused by energy-drained nodes.
Initially, node with the maximum residual energy in a cluster becomes cluster heed and
node with the second maximum residual energy becomes secondary cluster heed. Later
on, selection of cluster heed and secondary cluster heed will be based on available
residual energy. We use Matlab software as simulation platform quantities. like, energy
consumption at cluster and number of clusters is computed in evaluation of proposed
algorithm. Eventually we evaluated and compare this proposed method against previous
method and we demonstrate our model is better optimization than other method such as
Venkataraman, in energy consumption rate.

Key words: Sensor Networks, clustering, fault detection, fault recovery.

Read Full Article : http://airccse.org/journal/jwmn/0211ijwmn12.pdf


References
[1] F. Koushanfar, M. Potkonjak, A. Sangiovanni- Vincentelli, “Fault Tolerance in Wireless
Ad-hoc Sensor Networks”, Proceedings of IEEE Sensors 2002, June, 2002.

[2] W. L. Lee, A. Datta, and R. Cardell-Oliver, “Network Management in Wireless Sensor


Networks”, to appear in Handbook on Mobile Ad Hoc and Pervasive Communications,
edited by M. K. Denko and L. T. Yang, American Scientific Publishers.

[3] G. Venkataraman, S. Emmanuel and S.Thambipillai, “Energy-efficient cluster-based


scheme for failure management in sensor networks” IET Commun, Volume 2, Issue 4, April
2008 Page(s):528 – 537

[4] L. Paradis and Q. Han, “A Survey of Fault Management in Wireless Sensor Networks”,
Journal of Network and Systems Management, vol. 15, no. 2, pp. 171-190, 2007.

[5] L. M. S. D. Souza, H. Vogt and M. Beigl, “A survey on fault tolerance in wireless sensor
networks”, 2007.

[6] W. L Lee, A.D., R. Cordell-Oliver, WinMS: Wireless Sensor Network-Management


System, An Adaptive Policy-Based Management for Wireless Sensor Networks. 2006.

[7] L. B. Ruiz, I. G.Siqueira, L. B. Oliveira, H. C. Wong, J.M. S. Nigeria, and A. A. F. Loureiro.


“Fault management in event-driven wireless sensor networks”, MSWiM’04, October 4-6,
2004, Venezia, Italy

[8] G. Gupta and M. Younis; Fault tolerant clustering of wireless sensor networks; WCNC’03,
pp. 1579.1584.

[9] M. Ding, D. Chen, K. Xing, and X. Cheng, “Localized fault-tolerant event boundary
detection in sensor networks”, in Proceedings of the 24th Annual Joint Conference of the
IEEE Computer and Communications Societies (INFOCOM '05), vol. 2, pp. 902–913,
Miami, Fla, USA, March 2005

[10] C. Hsin and M.Liu, “Self-monitoring of Wireless Sensor Networks”, Computer


Communications, 2005. 29: p. 462-478

[11] S. Chessa and P. Santi, “Crash faults identification in wireless sensor networks”, Comput.
Commun., 2002, 25, (14), pp. 1273-1282.

[12] W. R. Heinzelman, A. Chandrakasan, and H. Balakrishnan, "Energy-Efficient


Communication Protocol for Wireless Microsensor Networks," Proc. Hawaii Int'l Conf.
System Sciences 2000.

[13] GUPTA G., YOUNIS M.: ‘Fault-tolerant clustering of wireless sensor networks’. Proc.
IEEE WCNC, New Orleans, USA,March 2003, vol. 3, p. 1579 – 1584

[14] N. Bulusu, J. Heidemann and D. Estrin, ”GPS-less Low Cost Outdoor Localization For Very
Small Devices”, IEEE Personal Communications, Special Issue on "Smart Spaces and
Environments", Vol. 7, No. 5, pp. 28-34, October 2000.
[15] Radhika Nagpal, ”Organizing a Global Coordinate System from Local Information on an
Amorphous Computer”, MIT AI Memo 1666, August 1999

Authors
1. Abolfazl Akbari
B.S in Computer Engineering, Science & Technology University, Iran,
Babol.
M.S. in Computer Engineering, Islamic Azad University Science And
Research Branch Iran, Tehran.

2. Arash Dana Photo


Dept. of Elect. Eng. Islamic Azad University , Central Tehran Branch,
Tehran, Iran

3. Ahmad Khademzadeh
Education and National Scientific and International Scientific
Cooperation Department, Iran Telecom Research Canter, Tehran, Iran

4. Neda Beikmahdavi
AN ENHANCED HYBRID ROUTING AND
CLUSTERING TECHNIQUE FOR WIRELESS SENSOR
NETWORK
Hasan Al-Refai

Department of Computer Science, Philadelphia University, Jordan

ABSTRACT
Wireless Sensor Networks (WSN) have extensively deployed in a wide range of applications.
However, WSN still faces several limitations in processing capabilities, memory, and power supply
of sensor nodes. It is required to extend the lifetime of WSN. Mainly this is achieved by routing
protocols choosing the best transmission path in-network with desired power conservation.This
cause is developing a generic protocol framework for WSNa big challenge. This work proposed a
new routing technique, described as Hybrid Routing-Clustering (HRC) model. This new approach
takes advantage of clustering and routing procedures defined in K-Mean clustering and AODV
routing, which constituted of three phases. This development aims to achieve enhanced power
conservation rate in consequence network lifetime. An extensive evaluation methodology utilized to
measure the performance of the proposed model in simulated scenarios.The results categorized in
terms of the average amount of packet received and power conservation rate. The Hybrid Routing-
Clustering (HRC) model was determined, showed enhanced results regarding both parameters. In
the end, they are comparing these results with well-known routing and well-known clustering
algorithms.

KEYWORDS
Wireless Sensor Networks, Clustering, Routing, Power conservation, Network lifetime, AODV, K-
Mean, LEACH

Read Full article : http://aircconline.com/ijwmn/V12N1/12120ijwmn02.pdf


REFERENCES:
[1] Al Basset Almamou, A., Wrede, R., Kumar, P., Labiod, H., & Schiller, J. (2009). Performance
evaluation of routing protocols in a Real-World WSN. Information Infrastructure Symposium,
2009. GIIS'09.Global, 1-
5.Retrievedfrom
http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=5307052&isnumber=5307032
[2] Baroudi, U., Al-Roubaiey, A., Mekid, S., &Bouhraoua, A. (2012). The Impact of Sensor Node
Distribution on Routing Protocols Performance: A Comparitive Study. IEEE 11th International
Conference on Trust, Security and Privacy in Computing and Communications
(TrustCom),1714- 1720.
[3] Chen, H., Wu, C., Chu, Y., Cheng, C., & Tsai, L. (2007). Energy Residue Aware (ERA)
Clustering Algorithm for Leach-based Wireless Sensor Networks. Conference: Systems and
Networks Communications.
[4] Gajjar, S., Dasgupta, K., Pradhan, S., &Vala, K. (2012). Lifetime improvement of LEACH
protocol for Wireless Sensor Network. 2012 Nirma University International Conference on
Engineering (NUiCONE),1-6.Retrievedfrom
http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=6493233&isnumber=6493172
[5] Gambhir, S., & Fatima, N. (2014). Op-LEACH: An Optimized LEACH Method for Busty Traffic
in WSNs. Fourth International Conference in Advanced Computing & Communication
Technologies (ACCT), 222-229.
[6] Gnanambigai, J., Rengarajan, N., &Prarthana, R. (2014). An analytical approach for quadrant
based leach: An energy efficient routing protocol for WSNs. 2nd International Conference on
Devices, Circuits and Systems (ICDCS), 1-6.
Retrieved from
http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=6926117&isnumber=6926115
[7] Guo, L., Xie, Y., Yang, C., & Jing, Z. (2010). Improvement on LEACH by combining Adaptive
Cluster Head Election and Two-hop transmission.2010 International Conference on Machine
Learning and Cybernetics (ICMLC), 4, 1678-1683.
[8] Halperin, D., Greenstein, B., Sheth, A., &Wetherall, D. (2010). Demystifying 802.11n Power
Consumption. Proceeding HotPower'10 Proceedings of the 2010 International Conference on
Power Aware Computing and Systems, 1(1).
[9] Haiming, Y., &Sikdar, B. (2007). Optimal Cluster Head Selection in the LEACH Architecture.
IEEE International in Performance, Computing, and Communications Conference, 93-100.
[10] Heinzelman, W., Chandrakasan, A., &Balakrishnan, H. (2000). Energy-Efficient
Communication Protocol for Wireless MicrosensorNetworks.Proceedings of the 33rd Hawaii
International Conference on System Sciences.
[11] Huang, J., & Yen, P. (2009). CB-DHRP: A Cluster-Based Directed Hierarchical Routing
Protocol for wireless sensor networks.International Symposium in Autonomous Decentralized
Systems, 1-6.
[12] Javaid, N., Waseem, M., Khan, Z., Qasim, U., Latif, K., &Javaid, A. (2013). ACH: Away cluster
heads scheme for Energy Efficient Clustering Protocols in WSNs. Saudi International in
Electronics, Communications and Photonics Conference (SIECPC), 1-4. Retrieved from
http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=6550972&isnumber=6550724
[13] Kang, S., & Nguyen, T. (2012). Distance Based Thresholds for Cluster Head Selection in
Wireless Sensor Networks. IEEE COMMUNICATIONS LETTERS, 16(9), 1396-1399.
[14] Kumar, G., Mehra, H., Seth, A., Radhakrishnan, P., Hemavathi, N., &Sudha, S. (2014). An
hybrid clustering algorithm for optimal clusters in Wireless sensor networks. IEEE Students'
Conference on Electrical, Electronics and Computer Science (SCEECS), 1-6. Retrieved from
http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=6804442&isnumber=6804412
[15] Li, Y., Yu, N., Zhang, W., & Zhao, W. (2011). Enhancing the performance of LEACH protocol
in wireless sensor networks. IEEE Conference: Computer Communications Workshops.
[16] Liao, Q., & Zhu, H. (2013). An Energy Balanced Clustering Algorithm Based on LEACH
Protocol. Proceedings of the 2nd International Conference On Systems Engineering and
Modeling.
[17] Maurya, P., Kaur, A., &Choudhary, R. (2014). Behavior analysis of LEACH protocol.
International Conference on Parallel, Distributed and Grid Computing (PDGC), 68-71.
Retrieved from
http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=7030717&isnumber=7030698
[18] Ramesh, K., &Somasundaram, K. (2011). A COMPARATIVE STUDY OF
CLUSTERHEAD SELECTION ALGORITHMS IN WIRELESS SENSOR NETWORKS.
International Journal of Computer Science & Engineering Survey, 2(4), 153-164.
[19] Ran, G., Zhang, H., & Gong, S. (2010). Improving on LEACH Protocol of Wireless Sensor
Networks Using Fuzzy Logic. Journal of Information & Computational Science, 7(3), 767-
775.
[20] Sharma, I., Singh, R., &Khurana, M. (2015). Comparative study of LEACH, LEACH-C and
PEGASIS routing protocols for wireless sensor network. International Conference on
Advances in Computer Engineering and Applications (ICACEA), 842-846. Retrieved from
http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=7164821&isnumber=7164643
[21] Sharma, S., &Choudhary, S. (2014). Heterogeneous multi-hop LEACH routing protocol.
International Conference on Green Computing Communication and Electrical Engineering
(ICGCCEE), 1-6. Retrieved
from
http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=6922249&isnumber=6920919
[22] Schmidt-Eisenlohr, F. (2010). Interference in Vehicle-to-vehicle Communication
Networks: Analysis,
Modelling, Simulation and Assessment (p. 149). KIT Scientific Publishing. ISBN:
9783866445710
[23] Tillapart, P., Thammarojsakul, S., Thumthawatworn, T., &Santiprabhob, P. (2005). An
Approach to Hybrid Clustering and Routing in Wireless Sensor Networks. 2005 IEEE in
Aerospace Conference, 1- 8.
[24] Tran, S., & Yang, T. (2007). OCO: Optimized Communication & Organization for Target
Tracking in Wireless Sensor Networks. University of Houston.
[25] Tsai, M., & Chen, Y. (2015). A Virtual Cluster Head Election Scheme for Energy-Efficient
Routing in Wireless Sensor Networks. 3rd International Conference in Future Internet of
Things and Cloud (FiCloud), 341-348.
[26] Tyagi, S., Gupta, S., Tanwar, S., & Kumar, N. (2013). EHE-LEACH: Enhanced
heterogeneous LEACH protocol for lifetime enhancement of wireless SNs. International
Conference on Advances in Computing, Communications and Informatics (ICACCI), 1485-
1490. Retrieved from
http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=6637399&isnumber=6637135
[27] Yan, L., Pan, W., Luo, B., Liu, J., &Xu, M. (2009). Communication protocol based on
optical low- energy-adaptive-clustering-hierarchy (O-LEACH) for hybrid optical wireless
sensor networks. Communications and Photonics Conference and Exhibition (ACP), 1-6.
Retrieved from
http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=5405443&isnumber=5405166
[28] Zhang, J., Mao, Z., &Jia, R. (2013). Study on hybrid modelling approach for gold
cyanidation leaching process. 25th Chinese in Control and Decision Conference (CCDC),
1557-1561. Retrieved from
http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=6561176&isnumber=6560882
[29] Zhao, F., Xu, Y., & Li, R. (2012). Improved LEACH Routing Communication Protocol for
a Wireless Sensor Network. International Journal of Distributed Sensor Networks, 1, 1-6.
[30] Zhao, W., & Zhang, L. (2014). Analysis and research of improved LEACH routing protocol
for pressure sensor based on WSN. Cyberspace Technology (CCT 2014), International
Conference, 1-6.
[31] Sukhchandan Randhawa & Sushma Jain (2019). MLBC: Multi-objective Load Balancing
Clustering technique in Wireless Sensor Networks. Journal of Applied Soft Computing.
ELSEVIER. Volume 74, January 2019, Pages 66-89.
[32] Kaswan A., Singh V., Jana P.K. (2018). A multi-objective and PSO based energy efficient
path design for mobile sink in wireless sensor networks. Pervasive Mob. Comput., 46 , pp.
122-136
[33] Amit Sarkar1 & T. Senthil Murugan. (2019). Cluster head selection for energy efficient and
delay-less routing in wireless sensor network. Wireless Netw (2019) 25:303–320. Springer.
A REVIEW OF SECURITY ATTACKS
AND INTRUSION DETECTION SCHEMES IN
WIRELESS SENSOR NETWORK

Yassine MALEH1 and Abdellah Ezzati2

Emerging Technologies Laboratory (VETE), Faculty of Sciences and Technology Hassan


1stUniversity, Settat, MOROCCO

ABSTRACT
Wireless sensor networks are currently the greatest innovation in the field of
telecommunications. WSNs have a wide range of potential applications, including security
and surveillance, control, actuation and maintenance of complex systems and fine-grain
monitoring of indoor and outdoor environments. However security is one of the major
aspects of Wireless sensor networks due to the resource limitations of sensor nodes. Those
networks are facing several threats that affect their functioning and their life. In this paper we
present security attacks in wireless sensor networks, and we focus on comparison and
analysis of recent Intrusion Detection schemes in WSNs.

KEYWORDS

Wireless sensor Networks, Security, attack, Denial of Service (DoS), Intrusion Detection
Systems (IDS), IDS Architectures, Cluster-based IDS, Anomaly-based IDS, Signature based
IDS&Hybrid IDS

Read Full Article : http://airccse.org/journal/jwmn/5613ijwmn06.pdf


REFERENCES

[1] Gang Zhao, “Wireless Sensor Networks for Industrial Process Monitoring and
Control: A Survey”, Network Protocols and Algorithms, ISSN 1943-358, Vol. 3, No. 1,
2011.
[2] G. Padmavath, D. Shanmugapriya, “A Survey of Attacks, Security Mechanisms and
Challenges in Wireless Sensor Networks”, (IJCSIS) International Journal of Computer
Science and Information Security, Vol. 4, No. 1 & 2, 2009.
[3] QusayIdreesSarhana, “Security Attacks and Countermeasures for Wireless Sensor
Networks: Survey”, International Journal of Current Engineering and Technology ISSN
2277 – 4106, June 2013.
[4] Z. BENENSON, M. CHOLEWINSKI, C. FREILING, “Vulnerabilities and Attacks
in Wireless Sensor Networks”, Laboratory for Dependable Distributed Systems, University
of Mannheim, 68131 Mannheim, Germany, 2010
[5] E.Çayırcı and C.Rong ,“Security in Wireless Ad Hoc and Sensor Networks”, ISBN:
978-0-470- 02748-6, 2009.
[6] P. Mohanty, S. Panigrahi, N. Sarma and S. Satapathy, “Security issues in wireless
sensor network data gathering protocols: a survey”, Department of Computer Science and
Engineering Tezpur University, Tezpur, India 2010.
[7] Q. IdreesSarhan, “Security Attacks and Countermeasures for Wireless Sensor
Networks: Survey”, International Journal of Current Engineering and Technology, 2013.
[8] A.Singla, R. Sachdeva, “Review on Security Issues and Attacks in Wireless Sensor
Networks”, International Journal of Advanced Research in Computer Science and Software
Engineering, Volume 3, Issue 4, April 2013.
[9] V. Soni1, P.Modi, V.Chaudhri, “Detecting Sinkhole Attack in Wireless Sensor
Network”, International Journal of Application or Innovation in Engineering & Management,
Volume 2, Issue 2, February 2013.
[10] K. Sharma, M.Ghose, “Wireless Sensor Networks: An Overview on its
Security Threats”, IJCA Special Issue on “Mobile Ad-hoc Networks” MANETs, 2010.
[11] K. Sun, P. Peng, P. Ning, and C. Wang, “Secure Distributed Cluster
Formation in Wireless SensorNetworks”,in Proceedings of the 22nd AnnualComputer
Security Applications Conference (AC-SAC’06), Pages: 131-140, December 2006.
[12] A. Wood and J. Stankovic, “Denial of service insensornetworks”,IEEE Computer,
pages 5462,October 2002.
[13] Ullah, Fasee, “Analysis of security protocols for Wireless Sensor Networks”, Dept.
of Comput. Sci., City Univ. of Sci. & Inf. Technol., Peshawar, Pakistan, Computer Research
and Development (ICCRD), 2011.
[14] A. Perrig, R. Szewczyk, J.D Tygar, V. Wen abd D. Culler, “SPINS:Security
Protocols f or Sensor Networks”, Departement of electrical engineering and Computer
Scinces, University of California, Berkley, USA 2002.
[15] J. Deng, R. Han, S. Mishra, “INSENS: Intrusion-Tolerant Routing in Wireless
Sensor Networks”, University of Colorado, Department of Computer Science, 2002.

[16] S. Zhu, S. Setia, and S. Jajodia, “LEAP+Efficient security mechanisms for


large- scaledistributed sensor networks”,ACMTransactionson Sensor Networks (TOSN),
Volume 2, Issue 4, November 2006.
[17] S. Saha, Md. Safiqul Islam, Md. SakhawatHossen, “A New OHD Based Intrusion
Detection System for Wireless Sensor Network”, IK2206: Internet security and privacy,
2010.
[18] F. Amini, “Simulation and Evaluation of Security and Intrusion detection in IEEE
802.15.4 Network”,university of Manitob 2008.
[19] Nabil Ali Alrajeh, S. Khan, and Bilal Shams, “Intrusion Detection Systems in
Wireless Sensor Networks: A Review”, International Journal of Distributed Sensor
Networks, Volume 2013.
[20] Hassen Mohammed AbduallahAlsafi, 2 Saeed Salem Basamh, “A Review of
Intrusion Detection System Schemes in Wireless Sensor Network”, Journal of Emerging
Trends in Computing and Information Sciences, 2013.
[21] Murad A. Rassam, M.A. Maarof and AnazidaZainal, “A Survey of
IntrusionDetection Schemes in Wireless Sensor Networks”, American Journal of Applied
Sciences 9 (10): 1636-1652, 2012.
[22] Andreas A. Strikos, “A full approach for Intrusion Detection in Wireless Sensor
Networks”, School of Information and Communication Technology , Stockholm, Sweden
,March 1, 2007.
[23] R. Roman, J. Zhou, J. Lopez, “Applying Intrusion Detection Systems to Wireless
Sensor Networks”, Proceeding of the 3rd IEEE Consumer Communications and Networking
Conference, 2006.
[24] Roosta, Tanya, Sameer Pai, Phoebus Chen, Shankar Sastry, and Stephen Wicker.
"Inherent security of routing protocols in ad-hoc and sensor networks." In Global
TelecommunicationsConference, 2007. GLOBECOM'07. IEEE, pp. 1273-1278. IEEE,
2007.
[25] A. da Silva, M. Martins, B. Rocha, A. Loureiro, L. Ruiz, and H. Wong,
“Decentralized intrusion detection in wireless sensor networks”, international workshop on
Quality of service & security in wireless and mobile networks, 2005.
[26] C.-C. Su, K.-M.Chang, Y.-H.Kuo, and M.- F. Horng, “The new intrusion prevention
and detection approaches for clustering-based sensor networks”, in 2005 IEEE Wireless
Communications and Networking Conference, WCNC 2005: Broadband Wirelss for the
Masses - Ready for Take-off, 2005.
[27] A.Abduvaliyev, A.KPathan, J. Zhou, R. Roman and W. Wong, “On the Vital Areas
of Intrusion Detection Systems in Wireless Sensor Networks”, Communications Surveys &
Tutorials, IEEE Volume15 , Issue 3, 2013.
[28] Mr. Ansar I SheikhMr.PankajKewadkar, “Approach towards Intrusion Detection
System for Wireless Sensor Network”, International Journal of Advanced Research in
Computer and Communication Engineering Vol. 2, 2013.
Authors

YassineMALEHreceived the B.Sc. degree in networks and Information


Systems, from Hassan 1st University, Faculty of Sciences and Technology of
Settat, Morocco, in 2009,and M.Sc. degree in Network and Computer
engineering from the Hassan 1st University, Faculty of Sciences and Techniques
(FSTS), Settat, Morocco, in 2012. Currently pursuing his PhD in Networks and Security
Engineeringat the Laboratory of
Emerging Technologies (VETE), from Hassan 1st University, Faculty of Sciences and
Technology of Settat, Morocco.Hismain research areas arehow to use wireless sensor
networks to secure and monitor mobile laboratories networks.

Abdellah EZZATIresearch Scientist in Faculty of Science and Technology in


Morocco. He obtained his PHD in 1997 in Faculty of science in Rabat and member
of the Computer commission in the same Faculty. Now is an associate professor
in Hassan First University in Morocco and he is the Head of Bachelor of Computer
Science.He participate to several project as the project Palmes which elaborate a
Moroccan Education Certification.
ENERGY EFFICIENT CLUSTERING AND ROUTING
IN MOBILE WIRELESS SENSOR NETWORK

Getsy S Sara1 Kalaiarasi.R2, Neelavathy Pari.S3 and Sridharan .D4

Department of Electronics & Communication Engineering, College of Engineering, Anna


University Chennai, India, 600 025.

ABSTRACT
A critical need in Mobile Wireless Sensor Network (MWSN) is to achieve energy efficiency
during routing as the sensor nodes have scarce energy resource. The nodes’ mobility in
MWSN poses a challenge to design an energy efficient routing protocol. Clustering helps to
achieve energy efficiency by reducing the organization complexity overhead of the network
which is proportional to the number of nodes in the network. This paper proposes a novel
hybrid multipath routing algorithm with an efficient clustering technique. A node is selected
as cluster head if it has high surplus energy, better transmission range and least mobility.
The Energy Aware (EA) selection mechanism and the Maximal Nodal Surplus Energy
estimation technique incorporated in this algorithm improves the energy performance during
routing. Simulation results can show that the proposed clustering and routing algorithm can
scale well in dynamic and energy deficient mobile sensor network.

KEYWORDS
Mobile Wireless Sensor Network, Energy Efficiency, Surplus Energy, Clustering.

Read Full Article :http://airccse.org/journal/jwmn/1110ijwmn09.pdf


REFERENCES
[1] Wireless Sensor Network, http://en.wikipedia.org/wiki/Wireless_sensor_network
[2] Andrea Munari, Wolfgang Schott, Sukanya Krishnan (2009).: Energy Efficient
Routing in Mobile Wireless Sensor Networks using Mobility Prediction. In: 34 th
IEEE conference in Local Computer Networks, pp.514-521, Zurich, Switzerland.
[3] Xiuoxia Huang, Hongqiang Zhai, Yuguang Fang. (2006): Lightweight Robust
[4] Routing in Mobile Wireless Sensor Network. In : IEEE Military Communications
Conference (MILCOM ’06) Washington DC.
[5] Getsy S Sara, R. Kalaiarasi, S. Neelavathi Pari, D. Sridharan, “ Energy Efficient
Mobile Wireless Sensor Network Routing Protocol” in the Communications in
Computer and Information Science, Recent Trends in Networks and
Communications, Springer-Verlag Berlin Heidelberg , 2010, pp: 642 – 650.
[6] Kisuk Kweon, Hojin Ghim, Jaeyoung Hong, Hyunsoo Yoon. (2009): Grid-Based
Energy-Efficient Routing from Multiple Sources to Multiple Mobile Sinks in
Wireless Sensor Networks. In : 4th International Conference on Wireless Pervasive
Computing, pp.185-189, Melbourne, Australia.
[7] Zhi- feng Duan, FanGuo, Ming-xing Deng, Min Yu. (2009): Shortest Path Routing
Protocol for Multi-layer Mobile Wireless Sensor Networks. In: International
Conference on Network Security, Wireless Communication and Trusted Computing,
pp.106-110.
[8] Xiuoxia Huang, Hongqiang Zhai, Yuguang Fang. (2008): Robust Cooperative
Routing Protocol in Mobile Wireless Sensor Networks. In: IEEE Transactions on
Wireless Communication, Vol 7, No. 12, pp.5278-5285.
[9] Nicklas Beijar.: Zone Routing Protocol (ZRP), Nrtworking Laboratory, Helsinki
University of Technology, Finland, Nicklas, [email protected].
[10] Mahesh K Marina, Samir R Das. (2002).: On –demand Multipath Distance Vector
Routing in Ad hoc Networks. In: ACM SIGMOBILE Mobile Computing and
Communications Review, Vol.6, Issue 3, pp. 92-93.
[11] Liliana M Arboleda C, Nidal Nasser. (2006): Cluster- based Routing Protocol for
Mobile Sensor Networks. In: 3 rd International Conference on Quality of Service in
Heterogeneous Wired/ Wireless Networks, Waterloo, Canada.
[12] Cunqing Hua, Tak-Shing Peter Yum (2008): Optimal Routing and Data Aggregation
for Maximizing lifetime of Wireless Sensor Networks. In: IEEE/ACM Transactions
on Networking, Vol.16, No.4, pp.892-902.
[13] Ratish Agarwal, Mahesh Motwani. (2009): Survey of Clustering Algorithm for
MANET. In: International Journal on Computer Science and Engineering, Vol.12,
pp.98-104.
[14] Charles E. Perkins, Elizabeth M. Royer. (1999): Ad-hoc On Demand Distance
Vector Routing. In: Mobile Computing Systems and Applications (WMCSA),
pp.90-100.
[15] OMNET++ Simulator: http:// www.omnetpp.org.
[16] Floriano De Rango, Marco Folina, Salvatore Marano(2008).: EE-OLSR: Energy
Efficient OLSR routing protocol for mobile ad- hoc network. In: IEEE- International
Conference on Military Communications (MILCOM 2008), pp.1-7.
[17] GiuseppeAnastasi, Marco Conti, Mario Di Francesco, Andrea Passarella, (2009) “
Energy Conservation in Wireless Sensor Networks: A Survey” In the Ad Hoc
Networks 7; pp- 537-568.
[18] Yinying Yang, Mirela I.Fonoage, Mihaela Cardei,(2009) “ Improving network
lifetime with mobile wireless sensor networks” In the Computer communications,
dot:10.1016/j.comcom.2009.11.010.
[19] S. Chellappan, X. Bai, B. Ma, D. Xuan, C. Xu, Mobility limited flip-based sensor
networks deployment, IEEE Transactions of Parallel and Distributed Systems 18 (2)
(2007) 199–211.

[20] U.Lee, E.O. Magistretti, B.O. Zhou, M. Gerla, P. Bellavista, A. Corradi, Efficient
data harvesting in mobile sensor platforms, PerCom Workshops, pp. 352–356, 2006.

[21] Lynn Choi, Jae Kyun jung, Byong –Ha Cho and Hyohyun Choi, “ M- Geocast :
Robust And Energy Efficient Geometric Routing For Mobile Sensor Networks” in
the proceedings of IFIP International Federation for information Processing 2008;
SEUS 2008, LNCS 5287, pp. 304-316.

[22] Chuan-Ming Liu, Chuan-Hsiu Lee, Li-Chun Wang (2007),: Distributed Clustering
algorithms for data gathering in mobile wireless sensor networks” in the Journal of
parallel and Distributed Computing, 67(2007), pp- 1187-1200.
[23] F.D Tolba, D.Magoni and P. Lorenz, :Connectivity, Energy and mobility driven
Weighted Clustering Algorithm, in the proceedings of IEEE GLOBECOM 2007.
[24] www.mwrf.com/Article/ArticleID/19915/19915.html

[25] Byung-Jae, Nah-Oak SONG, Leonard E. MILLER,: Standard Measure of Mobility for
Evaluating Mobile Adhoc Network performance, in the IEICE Trans. Commun, Vol.
E86-B, No. 11, November 2003, pp. 3236-3243.

[26] CL Liu, DP Mohapatra,: Elements of Discrete Mathematics, Third Edition, The


McGraw- Hill Companies, pp: 89-92.

[27] Dongkyun Kim, J.J. Garcia Luna Aceves, Katia Obraczka, Juan Carlos Cano and
Pietro Manzoni. : Routing Mechanism for Mobile Ad Hoc Networks Based on the
Energy Drain Rate, in the IEEE transactions on Mobile Computing, Vol.2, No.2, April-
June 2003, pp: 161-173.

Authors

Getsy S Sara is currently a Ph.D candidate Anna University Chennai, India. She
received her B.E degree with distinction in Electronics & Communication from
Bharathiar University, India in 2004 and M.E degree with distinction in Digital
Communication Engineering from Anna University, India in 2006. Her research
interests include wireless ad hoc networking, sensor networks, energy efficient
routing protocols and communication systems.

Kalaiarasi R is currently doing her Ph.D degree at Anna University Chennai, India.
She received her MCA degree from Madras University, Chennai. Her research
interests include MANET, sensor network, mobile computing and network security.

Neelavathy Pari S Neelavathy Pari S received her B.E degree in Computer


Science and Engineering from Kuvempu University, Shimoga in the year 1994 and
M.Tech (Honors) Computer Science Engineering From Dr. M.G.R. Educational
and Research Insititute , India. She is currently working as Lecturer in the
Department of Information Technology MIT Campus, Anna University, Chennai,
India. Her present research interest include, MANET, sensor network, mobile computing and
network security.

Dr.D.Sridharan received his B.Tech. degree and M.E.degree in Electronics


Engineering from Madras Institute of Technology, Anna University in the years
1991 and 1993 respectively. He got his Ph.D degree in the Faculty of Information
and Communication Engineering, Anna University in 2005. He is currently
working as Assistant Professor in the Department of Electronics and
Communication Engineering, CEG Campus, Anna University, Chennai, India. He
was awarded the Young Scientist Research Fellowship by SERC of Department of Science
and Technology, Government of India. His present research interests include Internet
Technology, Network Security, Distributed Computing and Wireless Sensor Networks.

You might also like