- Home
- NS2/Ns3/MatlabProjects
- NS2 Simulation Projects
- Wireless Sensor Network
Wireless Sensor Network
Wireless Sensor Network
IEEE 2018 wireless sensor network project list on NS2 based for mtech / MS / be / btech / mca / M.sc students in bangalore
-
A Global Approach for the Improvement of UHF RFID Safety and Security×
A Global Approach for the Improvement of UHF RFID Safety and Security
Related Courses:Radio Frequency Identification (RFID) gadgets are generally utilized as a part of numerous areas, for example, following, checking and administration of products, savvy houses (IoT), supply chains, and so on. In any case, there is a major number of difficulties which should in any case be overcome to guarantee RFID security and protection. Likewise, because of the minimal effort and low utilization energy of UHF RFID labels, correspondences amongst labels and perusers are not powerful. In this paper, we exhibit our way to deal with assess at the same time the security and the wellbeing of UHF RFID frameworks with a specific end goal to enhance them. To begin with, this approach permits approving UHF RFID frameworks by reenactment of the framework conduct in nearness of shortcomings in a genuine situation. Furthermore, assessing the framework vigor what's more, the security of the utilized conventions, this approach will empower us to propose the advancement of new more dependable and secure conventions. At last, it drives us to create and approve extraordinary failure cost and secure label equipment models.
System Architecture
Project Overview :
We propose to direct the strength assessment with the NS2 test system. The NS2 test system is a discrete occasion test system focused at systems administration look into. Between the applications accessible for arrange recreation, the Network Simulator NS2 is a standout amongst the most well known test systems in the look into group. We will then look at the productivity of the usage with and without this validation convention. Besides, we will propose to assess with NS2 the execution of the validation convention within the sight of transmission mistakes. The exhibitions with the validation convention should diminish (because of the extra traded information for confirmation), at that point we will propose power instruments (quickly displayed in segment II) to enhance the framework execution. At long last, we will hypothetically assess the security of this new vigorous execution and we will endeavor to reproduce a few assaults with NS2.
System Requirements
Hardware Requirement
Main processor : Pentium IV processor 1.13 GHz
Hard disk capacity : 40GB
Cache memory : 512 MB
Monitor : LG Digital Color Monitor
Keyboard : Samsung
Mouse : Logitech
Software Requirement
Operating system : Fedora 8 (linux)
Scripting language : Network Simulator 2.33
Protocol developed : C++
Scripting : Tool Command Language
Sample Code
int RfidRAgent::command(int argc,const char* const* argv){
if (argc==2){
if (strcmp(argv[1],"test")==0){
Packet *pkt=mkPacket(RFID_QUERY,"QUERY_TEXT\0");
//send(pkt,(Handler *)0);
mac->recv(pkt,(Handler*)this);
return (TCL_OK);
}
if (strcmp(argv[1],"query")==0){
Tcl& tcl=Tcl::instance();
Packet *pkt=mkPacket(RFID_QUERY,"start_query");
mac->recv(pkt,(Handler*)this);
listener->sched(LST_INTV);
return TCL_OK;
}
In this project we are using NS-2.35 RFID patch. In above coding is full of how we are sending and receiving data packet. Strcmp function to compare string and mac function. -
Detecting and Avoiding of Worm Hole Attack and Collaborative Blackhole attack on MANET using Trusted AODV Routing Algorithm×
Detecting and Avoiding of Worm Hole Attack and Collaborative Blackhole attack on MANET using Trusted AODV Routing Algorithm
Related Courses:A mobile ad-hoc network is a wireless network such that nodes are move dynamically in network. In OSI network layer there is lot of attack but introduce only collaborative black hole and worm hole attack. A group of black hole node easily employed against routing in mobile ad-hock networks called collaborative black hole attack. When two malicious node is create a tunnel is called worm hole attack. This paper instigate to detect and avoided of worm hole attack and collaborative black hole attack using trusted AODV routing algorithm.
System Architecture
Project Overview This paper works as, When two malicious node is create a tunnel is called worm hole attack cognizing and Avoiding of Worm Hole Attack and CollaborativeBlackhole assault on MANET utilizing Trusted AODV Routing Algorithm.
System Requirements
Hardware Requirement
Main processor : Pentium IV processor 1.13 GHz
Hard disk capacity : 40GB
Cache memory : 512 MB
Monitor : LG Digital Color Monitor
Keyboard : Samsung
Mouse : Logitech
Software Requirement
Operating system : Fedora 8 (linux)
Scripting language : Network Simulator 2.33
Protocol developed : C++
Scripting : Tool Command Language
Sample Code
{set i 0} {$i < $val(nn) } { incr i } { set node_($i) [$ns node] } set udp [new Agent/UDP] $ns attach-agent $node_(0) $udp set cbr [new Application/Traffic/CBR] $cbr set packetSize_ 1024 $cbr set interval_ 0.1 $cbr attach-agent $udp set null [new Agent/Null] $ns attach-agent $node_(1) $null $ns connect $udp $null $ns at 2.0 "$cbr start" $ns at 10.0 "$cbr stop" $ns at 2.0 "$ns trace-annotate \"Sender sends the data to the receiver through the selected router which is attacker\"" $ns at 2.1 "$ns trace-annotate \"Attacker 3 and 8 forms wormhole\"" set udp [new Agent/UDP] $ns attach-agent $node_(1) $udp set cbr [new Application/Traffic/CBR] $cbr set packetSize_ 1024 $cbr set interval_ 0.1 $cbr attach-agent $udp set null [new Agent/Null] $ns attach-agent $node_(3) $null $ns connect $udp $null $ns at 3.0 "$cbr start" $ns at 10.0 "$cbr stop" $ns at 3.0 "$ns trace-annotate \"Attacker forwards the data to Attacker 8 which does not forward the data to receiver\""
Above code explains how warm hole attack will occur,while sending data from source to destination,sender choose a alternative path(wormhole tunnel) to send data to destination instead of actual path this time packet loss will occur. -
Performance analysis of Zigbee WDSN using clustering protocol and STR algorithm×
Performance analysis of Zigbee WDSN using clustering protocol and STR algorithm
Related Courses:In recent years, wireless networking plays a prominent role because of its easy installation and flexibility. Among the various wireless domains, Zigbee based Wireless Dynamic Sensor Networks (WDSN) pose a good support to the dynamics that arise when the nodes are induced with mobility. In the Zigbee based Wireless Dynamic Sensor Network (WDSN), major consideration is on utilizing the energy efficiently among the mobile nodes. Various techniques are used to attain energy efficiency in Zigbee WDSN. Among them, clustering the nodes is one of the best methods, since they aim at reducing the energy dissipation and increasing the life span of the network. Hence, in this paper, the performance of Zigbee WDSN using clustering scheme is done by considering the nodes with mobility and compared with performance of Zigbee WDSN using non clustering technique. The proposed work is summarized as follows: the network is deployed as clusters and the remaining energy of the node is determined by utilizing clustering protocol. In each cluster, the clustering protocol opts for the node with the maximum remaining energy as the head of that cluster. Then STR algorithm is utilized to route the sensed data from the member nodes to the cluster head.
>
System Architecture
Project Overview : The proposed work aims at enhancing the performance of existing work by introducing the clustering technique. Among the various protocols proposed for WSNs, hierarchical protocols outperform other protocols since they augment the network lifetime, reduce the energy dissipated by the sensor nodes and cut down the number of communication messages among the sensor nodes.
System Requirements
Hardware Requirement
Main processor : Pentium IV processor 1.13 GHz
Hard disk capacity : 40GB
Cache memory : 512 MB
Monitor : LG Digital Color Monitor
Keyboard : Samsung
Mouse : Logitech
Software Requirement
Operating system : Fedora 8 (linux)
Scripting language : Network Simulator 2.33
Protocol developed : C++
Scripting : Tool Command Language
Sample Code
for(ii=0;ii<10;ii++) {
if(NR < 51 && ($1==ii)) {
a1[ii++]=$1
a1[i1++]=$1
a11[ii++]=$2
sum1=sum1+$2
}
}
avgsum1=sum1/10
for (xx=0;xx<10;xx++){
if (NR < 51 && ($1==xx)){
if (avgsum1>a11[xx]){
b1[j1++] = $1
print $1 "\t" $2 > "clusterhead1.tr"
print "$ns at 14.0 \"$n"$1 "\t" "label Sn \"" > "cmsimu"1".tr"
}
else {
print $1 "\t" $2 > "clusterhead10.tr"
print "$ns at 14.0 \"$n"$1 "\t" "label Rn \"" > "cmsimu"1".tr"
}
}
}
This code helps us to find th total energy of the cluster and average energy of the cluster, using this energy we are finding clusterhead(which node is havig high energy) and clustermember(remaining nodes except clusterhead) -
A Novel Resource Scheduling Approach to Improve the Reliability of Shuffle-Exchange Networks×
A Novel Resource Scheduling Approach to Improve the Reliability of Shuffle-Exchange Networks
Related Courses:Approaches such as increasing the number of intermediate stages are introduced to increase the reliability and throughput of Multistage Interconnection Networks (MINs). However, they mainly try to change the network architecture to achieve the goal of having more reliable network. When multiple sources in such a network try to send data, collision of packets and blocking problems are inevitable. Using existing networks, they cant be prevented completely and a multiple access protocol must be used to that end. Time division multiple access (TDMA) protocol can be used to overcome these problems. To improve the performance of this protocol, we propose an adaptive slot allocation approach using Monte Carlo random sampling method. This approach is applied to Shuffle-exchange network (SEN) and Shuffle-exchange network with one additional stage (SEN+).
System ArchitectureProject Overview : Monte Carlo method is able to predict almost exact numbers for time slot lengths needed for each of the source nodes. Exact prediction values are updated to the confidence interval. Every source node has its own confidence interval that shows the range of time slot length for that specific node. If the predicted time slot length is not enough, or the source node does not have packets to be sent, they send an acknowledgement to the network controller informing this. So we can say that after every cycle that these confidence intervals are updated
System Requirements
Hardware Requirement
Main processor : Pentium IV processor 1.13 GHz
Hard disk capacity : 40GB
Cache memory : 512 MB
Monitor : LG Digital Color Monitor
Keyboard : Samsung
Mouse : Logitech
Software Requirement
Operating system : Fedora 8 (linux)
Scripting language : Network Simulator 2.33
Protocol developed : C++
Scripting : Tool Command Language
Sample Code
using simplex link we are connecting the nodes of two megabit,here we are using drop tail queue and we are providing a link positions like orient right,orient right-down etc..we can also use duplex link for wired connection.
$ns_ simplex-link $n0 $n8 2Mb 10ms DropTail orient right
$ns_ simplex-link $n0 $n9 2Mb 10ms DropTail orient left-up
$ns_ simplex-link $n1 $n10 2Mb 10ms DropTail orient right-down
$ns_ simplex-link $n1 $n11 2Mb 10ms DropTail orient right-down
$ns_ simplex-link $n2 $n12 2Mb 10ms DropTail orient right-down
$ns_ simplex-link $n2 $n13 2Mb 10ms DropTail orient right-down
$ns_ simplex-link $n3 $n14 2Mb 10ms DropTail orient right-down
$ns_ simplex-link $n3 $n15 2Mb 10ms DropTail orient right-down
-
Issues and Attacks – A Security Threat to Wsn: An Analogy×
Issues and Attacks – A Security Threat to Wsn: An Analogy
Related Courses:PC arrange is a gathering of figuring gadgets like PCs which are associated together and these gadgets impart or trade the data through connections. One such kind of system is remote sensor systems. Remote sensor systems comprise of sensor hubs associated in some form. These hubs recognize different natural conditions, for example, temperature, sound et cetera. Assaults have turned out to be not kidding security dangers that remote sensor systems need to overcome. These assaults prompt vitality wastefulness. There are different kinds of security assaults that a remote sensor organize needs to overcome. Blackhole assault and power utilization assault are additionally among the sorts of security assaults. This paper is an overview paper which comprises of a review on evasion of the assaults said above and a push to diminish the power utilization and increment the vitality productivity.
System Architecture
Project Overview :Concentrates on solving only power exhaustion attacks, and doesn’t take any measures to check whether the chief or head of the cluster is compromised and is sending the data to the base station.Some of these attacks lead to power exhaustion which leads to power drainage and also leads to death of sensor nodes. This survey paper mainly concentrates or goes through the research of avoiding the power exhaustion and also avoidance and prevention of blackhole attack and denial of sleep attack.
System Requirements
Hardware Requirement
Main processor : Pentium IV processor 1.13 GHz
Hard disk capacity : 40GB
Cache memory : 512 MB
Monitor : LG Digital Color Monitor
Keyboard : Samsung
Mouse : Logitech
Software Requirement
Operating system : Fedora 8 (linux)
Scripting language : Network Simulator 2.33
Protocol developed : C++
Scripting : Tool Command Language
-
Achieving High-Performance Cellular Data Services with Multi-Network Access×
Achieving High-Performance Cellular Data Services with Multi-Network Access
Related Courses:This paper introduces the plan and assessment of a portable information benefit which misuses parallel multi-way transmission over numerous cell systems to accomplish critical execution picks up. Multi-arrange get to is roused by the actuality that multi-radio cell phones are quick turning into a genuineity, making it workable for end-clients to build their administration speed and accessibility by means of system decent variety. Rather than beforehand proposed procedures at the application or transport layers, we propose a novel system helped engineering for multi-homed (NAMH) cell get to. In the proposed framework, arrange components, for example, switches and base stations give the important multihoming usefulness including distinguishing proof of a bifurcation switch and dynamic part of the information stream relating to as of now achievable piece rates on the cell base stations. A point by point assessment is accommodated the multi arrange benefit with LTE base stations, utilizing both ns3 reenactment also, follow driven copies. The outcomes demonstrate that huge picks up are accomplished with multi-organize access with bit-rates of 1.9x utilizing two LTE organizes in parallel. Examination with the surely understood MPTCP strategy is given, indicating additions of about 40% with NAMH for the follow driven two-organize situation
System Architecture
Project Overview : In this paper, we propose a system helped multi-homed information conveyance benefit System Assisted MultiHoming, which bolsters concurrent multi-arrange availability. The key building pieces of this administration are portrayed. As the design depends on multi-radio customers each with at least two cell interfaces as well as a WiFi interface. The errand of part the information stream towards numerous interfaces is taken care of by arrange components for example, base stations and switches, expelling the requirement for multi-way coordination at end-focuses. Further, the expanding switch and base stations use cross-layer data on flag quality to decide the correct proportion of movement to be sent along each way. The idea of system helped multi-way conveyance in our work has many points of interest contrasted and approaches which designate the errand of booking and part the streams to the end has.
System Requirements
Hardware Requirement
Main processor : Pentium IV processor 1.13 GHz
Hard disk capacity : 40GB
Cache memory : 512 MB
Monitor : LG Digital Color Monitor
Keyboard : Samsung
Mouse : Logitech
Software Requirement
Operating system : Fedora 8 (linux)
Scripting language : Network Simulator 2.33
Protocol developed : C++
Scripting : Tool Command Language
-
Hierarchical Adaptive Trust Establishment Solution for Vehicular Networks×
Hierarchical Adaptive Trust Establishment Solution for Vehicular Networks
Related Courses:Cooperative intelligent transportation systems (C- ITS), mainly represented by Vehicular Ad Hoc Networks (VANETs), were developed to enhance safety on roads before being generalized to support other comfort and efficiency applications. Most VANET applications, including safety ones, are based on multi-hop communications. Hence, a certain trustworthiness should exist among vehicles to ensure a reliable and trusted communication excluding dishonest peers from all network operations. In this paper we propose an hierarchical trust establishment solution able to cope with VANET applications and their requirements. Our solution is based on a three-level architecture, which enables it to adapt to the communication scenario and the required security level.
System Architecture
Project Overview : we propose a new hybrid trust establishment solution excluding both dishonest nodes and their generated messages. Our solution can be adopted to all kinds of ex- changed traffics thanks to the use of the standardized traffic classification.
System Requirements
Hardware Requirement
Main processor : Pentium IV processor 1.13 GHz
Hard disk capacity : 40GB
Cache memory : 512 MB
Monitor : LG Digital Color Monitor
Keyboard : Samsung
Mouse : Logitech
Software Requirement
Operating system : Fedora 8 (linux)
Scripting language : Network Simulator 2.33
Protocol developed : C++
Scripting : Tool Command Language
-
An Innovative Approach of HDS2 Routing Protocol In MANET×
An Innovative Approach of HDS2 Routing Protocol In MANET
Related Courses:As of late, the Mobile Adhoc Network (MANET) assumes a crucial part in systems administration inquire about condition for sharing data from one to others. MANET is a versatile, which is shaped by radio waves with no attractive base stations. The primary issue of Goal Sequenced Distance Vector Routing Protocol (DSDV) is steering overhead ceaselessly, on the grounds that it keeps up the breakthrough data amid information transmission. The fundamental hindrance of Dynamic Source Steering Protocol (DSR) is course creation delay amid course development and end-to-end defer amid transmission. To settle the above issue, this paper proposed an imaginative approach called Hybrid of Goal Sequenced and Dynamic Source steering convention (HDS2) in MANET. The new approach of HDS2 enhances the bundle conveyance proportion and throughput and limits end-to-end postpone and course creation. The proposed approach has been executed and tried in NS2 test system lastly it is contrasted and existing DSDV steering convention.
System Architecture
Project Overview
In HDS2 approach, the directing conventions are hybridized based on proactive and in addition receptive directing. In this approach, the courses are made in proactive way and the Course Request (RReq) is spread in receptive way. Along these lines, this paper chose two distinct classes of directing conventions those are DSDV and DSR which were hybridized on the type of HDS2. While recreation, the quantity of hubs can be effectively associated with the system by utilizing DSDV and furthermore the quantity of hubs can without much of a stretch send the RReq and get the Route Reply (RRep) by utilizing DSR. The proposed HDS2 can be utilized to lessen the End-to-End Deferral, Route development Delay, enhances Packet Conveyance Ratio and enhances Throughput in MANET.
System Requirements
Hardware Requirement
Main processor : Pentium IV processor 1.13 GHz
Hard disk capacity : 40GB
Cache memory : 512 MB
Monitor : LG Digital Color Monitor
Keyboard : Samsung
Mouse : Logitech
Software Requirement
Operating system : Fedora 8 (linux) -
Efficient Data Center Flow Scheduling without Starvation using Expansion Ratio×
Efficient Data Center Flow Scheduling without Starvation using Expansion Ratio
Related Courses:Existing data center transport protocols are usually based on the Processor Sharing (PS) policy and/or the Shortest Remaining Processing Time (SRPT) policy. PS divides link bandwidth equally between competing flows, thus it fails to achieve optimal average flow completion time (FCT). SRPT prioritizes flows that have the shortest remaining processing time and provides near-optimal average FCT, but it may cause long flows to suffer unfair delays, or even starve them. In fact, these two types of policies represent two directions in the design space: PS prefers fairness (in terms of starvation freedom) while SRPT favors efficiency (in terms of average FCT). In this paper, we propose a novel metric, expansion ratio, which enables us to strike a balance between SRPT and PS. We design MERP that achieves efficient flow scheduling without starvation. MERP takes care of both average and tail FCTs by minimizing the expansion ratio of competing flows in a lexicographically manner. MERP controls the sending rate of competing flows via synchronized virtual deadlines and routes flows in a downstream-aware manner that reacts quickly to link failures. We evaluate MERP using extensive NS2-based simulations.
System Architecture
Project Overview
we propose a novel metric, extension proportion, which empowers us to strike a harmony amongst SRPT and PS. We outline MERP that accomplishes proficient stream planning without starvation. MERP deals with both normal and tail FCTs by limiting the extension proportion of contending streams in a lexicographically way. MERP controls the sending rate of contending streams through synchronized virtual due dates and courses streams in a downstream-mindful way that responds rapidly to connect disappointments.
System Requirements
Hardware Requirement
Main processor : Pentium IV processor 1.13 GHz
Hard disk capacity : 40GB
Cache memory : 512 MB
Monitor : LG Digital Color Monitor
Keyboard : Samsung
Mouse : Logitech
Software Requirement
Operating system : Fedora 8 (linux)
Scripting language : Network Simulator 2.33
-
Congestion Control Scheme Performance Analysis Based on Nonlinear RED×
Congestion Control Scheme Performance Analysis Based on Nonlinear RED
Related Courses:Congestion control has become a research focus with the development of network communication technology. Random early detection (RED) for queue management techniques is the most effective method. However, RED is particularly sensitive to the traffic load and the parameters of the scheme itself. When the traffic load is low, the bandwidth is underutilized, whereas when the traffic load is high, the delay is large. This paper presents a minimal adjustment to RED called three-section random early detection (TRED) based on nonlinear RED, in which the packet dropping probability function is divided into three sections to distinguish between light, moderate, and high loads to achieve a tradeoff in the delay and the throughput between low and high traffic loads. The NS2 simulation results show that TRED effectively improves the insufficiencies of RED to achieve better congestion control.
System Architecture
Project Overview : This paper presents a minimal adjustment to RED called three-section random early detection (TRED) based on nonlinear RED, in which the packet dropping probability function is divided into three sections to distinguish between light, moderate, and high loads to achieve a tradeoff in the delay and the throughput between low and high traffic loads.
System Requirements
Hardware Requirement
Main processor : Pentium IV processor 1.13 GHz
Hard disk capacity : 40GB
Cache memory : 512 MB
Monitor : LG Digital Color Monitor
Keyboard : Samsung
Mouse : Logitech
Software Requirement
Operating system : Fedora 8 (linux)
Scripting language : Network Simulator 2.33
Protocol developed : C++
Scripting : Tool Command Language
-
Collision-Free Anycast Transmission Scheduling in UWSNs×
Collision-Free Anycast Transmission Scheduling in UWSNs
Related Courses:Under Water Wireless Sensor Network (UWSNs) have been proposed to screen submerged districts, for example, oceans what's more, seas. A normal case of a UWSN comprises of a set of submerged sensor hubs and an arrangement of sink hubs that are sent at the ocean surface. Utilizing acoustic transmission, the sensors send their gathered information to no less than one of the sinks in what is known as the anycast transmission issue. One of the significant issues with submerged hubs is their restricted control, which implies that transmission crashes are expensive. In this paper, we propose a crash free anycast transmission planning calculation for UWSNs. The proposed calculation is an area based directing calculation that timetables transmissions between sensor hubs and sink hubs so as to limit the vitality utilization and conceivable crashes. We play out an arrangement of tests utilizing the NS2 Aqua-Sim test system.Underwater channel and Propagation we are using here In terrestrial network, air is the communication medium, whereas, in underwater network, water is the communication medium.
System Architecture
Project Overview : In this project we are using underwater propagation and underwater channel,here we need to find a distance from sender to sink node and based on distance and plce the sink nodes in descending order and sender nodes in ascending order.
System Requirements
Hardware Requirement
Main processor : Pentium IV processor 1.13 GHz
Hard disk capacity : 40GB
Cache memory : 512 MB
Monitor : LG Digital Color Monitor
Keyboard : Samsung
Mouse : Logitech
Software Requirement Operating system : Fedora 8 (linux)
Scripting language : Network Simulator 2.33
Protocol developed : C++
Scripting : Tool Command Language
-
Dynamic Channel Access to Improve Energy Efficiency in Cognitive Radio Sensor Networks×
Dynamic Channel Access to Improve Energy Efficiency in Cognitive Radio Sensor Networks
Related Courses:Wireless sensor systems working in the permit free range experience the ill effects of uncontrolled obstruction as those range groups turn out to be progressively swarmed. The rising cognitive radio sensor systems (CRSNs) give a promising answer for address this test by empowering sensor hubs to craftily get to authorized channels. Be that as it may, since sensor hubs need to expend extensive vitality to help CR functionalities, for example, channel detecting and exchanging, the artful channel getting to ought to be precisely contrived for enhancing the vitality effectiveness in CRSN. To this end, we examine the dynamic channel getting to issue to enhance the vitality effectiveness for a grouped CRSN. Under the essential clients' security necessity, we examine the asset portion issues to expand the vitality effectiveness of using an authorized channel for intragroup and between bunch information transmission, individually. In addition, with the thought of the vitality utilization in channel detecting and exchanging, we additionally decide the condition when sensor hubs should detect and change to an authorized channel for enhancing the vitality proficiency, as per the parcel misfortune rate of the permit free channel. What's more, two dynamic channel getting to plans are proposed to distinguish the channel detecting and exchanging successions for intra-group and between bunch information transmission, individually. Broad reenactment comes about exhibit that the proposed channel getting to plans can altogether diminish the vitality utilization in CRSNs.
System Architecture
Project overview
In this paper, we examine the crafty channel getting to issue to enhance vitality effectiveness in bunched CRSNs. Sensor hubs frame various groups and intermittently transmit their detected information to the sink by means of progressive directing. They deal with a permit free channel but at the same time are capable to get to sit without moving authorized channels when the parcel misfortune rate over the permit free channel increments. To ensure the PUs adequately, the channel accessible span (CAD) is restricted for each authorized channel when it is recognized as sit still. At that point, we investigate the normal vitality utilization to decide whether sensor hubs can lessen their vitality utilization by getting to an authorized channel, thinking about the vitality utilization in channel detecting and exchanging. Moreover, to handle the artful accessibility of authorized channels, two consecutive channel detecting and getting to plans with the asset allotment of a got to channel are misused for limiting the vitality utilization in both intra and entomb group information transmission. System Requirements
Hardware Requirement
Main processor : Pentium IV processor 1.13 GHz
Hard disk capacity : 40GB
Cache memory : 512 MB
Monitor : LG Digital Color Monitor
Keyboard : Samsung
Mouse : Logitech
Software Requirement
Operating system : Fedora 8 (linux)
Scripting language : Network Simulator 2.33
Protocol developed : C++
Scripting : Tool Command Language
-
Extending Wireless Sensor Network Lifetime With Global Energy Balance.×
Extending Wireless Sensor Network Lifetime With Global Energy Balance.
Related Courses:In this paper, a decentralized routing algorithm,called game theoretic energy balance routing protocol,is proposed to extend the network lifetime by balancing energyconsumption in a larger network area using geographical routingprotocols. The objective of the proposed protocol is to makesensor nodes deplete their energy at approximately the sametime, which is achieved by addressing the load balance problem atboth the region and node levels. In the region level, evolutionarygame theory (EGT) is used to balance the traffic load to availablesubregions. At the node level, classical game theory (CGT) isused to select the best node to balance the load in the selectedsubregion. This two-level approach is shown to be an effectivesolution for load balancing and extending network lifetime.This paper shows the use of EGT and CGT in designing arobust protocol that offers significant improvement over existingprotocols in extending network lifetime.
-
Opportunistic Routing Algorithm for Relay Node Selection in Wireless Sensor Networks×
Opportunistic Routing Algorithm for Relay Node Selection in Wireless Sensor Networks
Related Courses:Energy savings optimization becomes one of the major concerns in the wireless sensor network (WSN) routing protocol design,due to the fact that most sensor nodes are equipped with the limited nonrechargeable battery power. In this paper, we focus on minimizing energy consumption and maximizing network lifetime for data relay in one-dimensional (1-D) queue network. Following the principle of opportunistic routing theory, multihop relay decision to optimize the network energy efficiency is made based on the differences among sensor nodes, in terms of both the irdistance to sink and the residual energy of each other. Specifically,an Energy Saving via Opportunistic Routing (ENS_OR) algorithmis designed to ensure minimum power cost during data relay andprotect the nodes with relatively low residual energy. Extensivesimulations and real testbed results show that the proposed solutionENS_OR can significantly improve the network performanceon energy saving and wireless connectivity in comparison withother existingWSN routing schemes.
-
Random-Walk Based Approach to Detect Clone Attacks in Wireless Sensor Networks×
Random-Walk Based Approach to Detect Clone Attacks in Wireless Sensor Networks
Related Courses:Wireless sensor networks (WSNs) deployed in hostileenvironments are vulnerable to clone attacks. In such attack,an adversary compromises a few nodes, replicates them, andinserts arbitrary number of replicas into the network. Consequently,the adversary can carry out many internal attacks. Previoussolutions on detecting clone attacks have several drawbacks.First, some of them require a central control, which introducesseveral inherent limits. Second, some of them are deterministicand vulnerable to simple witness compromising attacks. Third,in some solutions the adversary can easily learn the criticalwitness nodes to start smart attacks and protect replicas frombeing detected. In this paper, we first show that in order toavoid existing drawbacks, replica-detection protocols must benon-deterministic and fully distributed (NDFD), and fulfill threesecurity requirements on witness selection. To our knowledge,only one existing protocol, Randomized Multicast, is NDFD andfulfills the requirements, but it has very high communicationoverhead. Then, based on random walk, we propose two newNDFD protocols, RAndomWaLk (RAWL) and Table-assistedRAndomWaLk (TRAWL), which fulfill the requirements whilehaving only moderate communication and memory overheads.The random walk strategy outperforms previous strategies becauseit distributes a core step, the witness selection, to everypassed node of random walks, and then the adversary cannoteasily find out the critical witness nodes. We theoretically analyzethe required number of walk steps for ensuring detection.Our simulation results show that our protocols outperform anexisting NDFD protocol with the lowest overheads in witnessselection, and TRAWL even has lower memory overhead thanthat protocol. The communication overheads of our protocols arehigher but are affordable considering their security benefits.
-
Data Aggregation Techniques to Remove Redundancy in Wireless Sensor Networks×
Data Aggregation Techniques to Remove Redundancy in Wireless Sensor Networks
Related Courses:In Wireless Sensor Networks (WSN), some sensor nodes are mobile in nature. Due to mobility ofnodes, there is no guarantee of reliable delivery of information. To ensure reliability, manysensor nodes are deployed in the monitoring environment. These sensor nodes sense the samekind of data and forward it to the sink node. This redundant information sustains the reliability;but at the same time, sink node wastes its energy in processing the redundant data. So there is aneed to eliminate the redundancy in sensed data up to adequate level in order to maintain thetradeoff between energy conservation and reliability. There exist many data aggregationtechniques that perform data redundancy removal in order to improve life time of sensor nodes.Data aggregation is a technique in which each intermediate node in the routing path receivesmultiple input packets, process them and transmits a single packet. In this paper we have studieddifferent data aggregation strategies and focused on some data aggregation techniques based onthese strategies. Further we havediscussed advantages and limitations of these techniques.
-
QoS Aware Geographic Opportunistic Routing in Wireless Sensor Networks×
QoS Aware Geographic Opportunistic Routing in Wireless Sensor Networks
Related Courses:QoS routing is an important research issue in wireless sensor networks (WSNs), especially for mission-critical monitoring and surveillance systems which requires timely and reliable data delivery. Existing work exploits multipath routing to guarantee both reliability and delay QoS constraints inWSNs. However, the multipath routing approach suffers from a significant energy cost. Inthis work, we exploit the geographic opportunistic routing (GOR) for QoS provisioning with both end-to-end reliability and delayconstraints in WSNs. Existing GOR protocols are not efficient for QoS provisioning in WSNs, in terms of the energy efficiency andcomputation delay at each hop. To improve the efficiency of QoS routing in WSNs, we define the problem of efficient GOR formulticonstrained QoS provisioning in WSNs, which can be formulated as a multiobjective multiconstraint optimization problem.Based on the analysis and observations of different routing metrics in GOR, we then propose an Efficient QoS-aware GOR (EQGOR)protocol for QoS provisioning in WSNs. EQGOR selects and prioritizes the forwarding candidate set in an efficient manner, whichis suitable for WSNs in respect of energy efficiency, latency, and time complexity. We comprehensively evaluate EQGOR bycomparing it with the multipath routing approach and other baseline protocols through ns-2 simulation and evaluate its timecomplexity through measurement on the MicaZ node. Evaluation results demonstrate the effectiveness of the GOR approach for QoSprovisioning in WSNs. EQGOR significantly improves both the end-to-end energy efficiency and latency, and it is characterized bythe low time complexity.
-
Energy-Efficient Reliable Routing Considering Residual Energy in Wireless Ad Hoc Networks×
Energy-Efficient Reliable Routing Considering Residual Energy in Wireless Ad Hoc Networks
Related Courses:We propose two novel energy-aware routing algorithms for wireless ad hoc networks, called reliable minimum energy cost routing (RMECR) and reliable minimum energy routing (RMER). RMECR addresses three important requirements of ad hoc networks:energy-efficiency, reliability, and prolonging network lifetime. It considers the energy consumption and the remaining battery energy ofnodes as well as quality of links to find energy-efficient and reliable routes that increase the operational lifetime of the network. RMER,on the other hand, is an energy-efficient routing algorithm which finds routes minimizing the total energy required for end-to-end packettraversal. RMER and RMECR are proposed for networks in which either hop-by-hop or end-to-end retransmissions ensure reliability.Simulation studies show that RMECR is able to find energy-efficient and reliable routes similar to RMER, while also extending theoperational lifetime of the network. This makes RMECR an elegant solution to increase energy-efficiency, reliability, and lifetime ofwireless ad hoc networks. In the design of RMECR, we consider minute details such as energy consumed by processing elements oftransceivers, limited number of retransmissions allowed per packet, packet sizes, and the impact of acknowledgment packets. Thisadds to the novelty of this work compared to the existing studies.
-
Using Mobile Sensors to Enhance Coverage in Linear Wireless Sensor Networks×
Using Mobile Sensors to Enhance Coverage in Linear Wireless Sensor Networks
Related Courses:One of the main challenges of using Linear WirelessSensor Networks (LSN) is the reliability of the connections among the nodes. Faults in a few contiguous nodes may causethe creation of holes which will result in dividing the networkinto multiple disconnected segments. As a result, sensor nodesthat are located between holes may not be able to deliver theirsensed information which negativity affects the networksensing coverage. This paper develops two models to utilizemobile sensors to help recover from these faults and enhancecoverage. The first model utilizes mobile sensors to cover theholes while the second model has the feature of reallocatingpreviously deployed mobile sensors for best possible coverage.In both models, the added mobile nodes can provide additionalsensing coverage as well as enable connectivity amongdisconnected segments in the LSN. Evaluations andcomparisons between both models are provided. In addition, ananalytical model for finding the expected number of mobilesensors needed for maintaining high coverage in a LSN withspecific configurations is developed and validated.
-
An Efficient Cluster-Tree Based Data Collection Scheme for Large Mobile Wireless Sensor Networks×
An Efficient Cluster-Tree Based Data Collection Scheme for Large Mobile Wireless Sensor Networks
Related Courses:Wireless Sensor Networks (WSNs) play a vital role in today’s real world applications. The effectiveness of WSNs purely depends on the data collection scheme. Numerous data collection schemes such as multipath, chain, tree, cluster and hybrid topologies are available in literature for collecting data in WSNs. However, the existing data collection schemes fail to provide a guaranteed reliable network in terms of mobility, traffic, and end-to-end connection. In this paper, a Velocity Energy-efficient and Link-aware Cluster-Tree (VELCT) scheme for data collection in WSNs is proposed which would effectively
mitigate the problems of coverage distance, mobility, delay, traffic, tree intensity, and end-to-end connection. The proposed VELCT constructs the Data Collection Tree (DCT) based on the cluster head location. The data collection node in the DCT does not participate in sensing on this particular round, however, it simply collects the data packet from the cluster head and delivers it to the sink. The designed VELCT scheme minimizes the energy exploitation, reduces the end-to-end delay and traffic in cluster head in WSNs by effective usage of the DCT. The strength of the VELCT algorithm is to construct a simple tree
structure, thereby reducing the energy consumption of the cluster head and avoids frequent cluster formation. It also maintains the cluster for a considerable amount of time. Simulation results have demonstrated that VELCT provides better QoS in terms of energy consumption, throughput, end-to-end delay, and network lifetime for mobility-based WSNs. -
A Lightweight Secure Scheme for Detecting Provenance Forgery and Packet Drop Attacks×
A Lightweight Secure Scheme for Detecting Provenance Forgery and Packet Drop Attacks
Related Courses:Large-scale sensor networks are deployed in numerous application domains, and the data they collect are used in decisionmaking for critical infrastructures. Data are streamed from multiple sources through intermediate processing nodes that aggregate information. A malicious adversary may introduce additional nodes in the network or compromise existing ones. Therefore, assuring high data trustworthiness is crucial for correct decision-making. Data provenance represents a key factor in evaluating the trustworthiness of sensor data. Provenance management for sensor networks introduces several challenging requirements, such as low energy and bandwidth consumption, efficient storage and secure transmission. In this paper, we propose a novel lightweight scheme to securely transmit provenance for sensor data. The proposed technique relies on in-packet Bloom filters to encode provenance. We introduce efficient mechanisms for provenance verification and reconstruction at the base station. In addition, we extend the secure provenance scheme with functionality to detect packet drop attacks staged by malicious data forwarding nodes. We evaluate the proposed technique both analytically and empirically, and the results prove the effectiveness and efficiency of the lightweight secure provenance scheme in detecting packet forgery and loss attacks.
-
New Hierarchical Stable Election Protocol for Wireless Sensor Networks×
New Hierarchical Stable Election Protocol for Wireless Sensor Networks
Related Courses:In wireless sensor networks energy is limited source. We must manage accurate use of energy for growing sensor lifetime. The hierarchy networks like Low-energy Adaptive Clustering Hierarchy (LEACH) choosing of cluster heads probability in some part of network haven't cluster head and other parts have cluster head with amount of density is high. Choosing of cluster heads in this algorithm done randomlyand it is probability low energy nodes was selected as cluster head. Thus fault has a high probability. This problem was solving by Stable Election Protocol (SEP). The New Hierarchical Stable Election Protocol (NHSEP) clustering is done symmetrically and the best node with respect to remained energy and distance of other nodes in comparing with each that selected as a cluster head. In this paper performance of the LEACH, SEP and NHSEP protocols have to evaluate and simulation results were carry out using NS2 simulator and compare with parameters Energy Consumed, Energy Remaining, Packet Delivery Fraction, End to End Delay and Dead Nodes.
-
Energy Efficient Detection of Malicious Nodes Using Secure Clustering With Load Balance and Reliable Node Disjoint Multipath Routing in Wireless Sensor Networks×
Energy Efficient Detection of Malicious Nodes Using Secure Clustering With Load Balance and Reliable Node Disjoint Multipath Routing in Wireless Sensor Networks
Related Courses:In order to increase the network latency and resolve the security bottlenecks induced by the camouflaged malicious nodes in Wireless Sensor Networks, the residual energy and trust values are used to form a secured clustering, the network lifetime is increased by using the backup nodes in order to distribute theload among the secured clusters and reliable multipath node disjoint route discovery algorithm is proposed. The simulated experimental results in NS2 platform show that the proposed method can minimize the effect of malicious nodes and improve the network lifetime for the sensor network by balancing the trust values and residual energy of sensor nodes.
-
Constructing A Shortest Path Overhearing Tree With Maximum Lifetime In WSNs×
Constructing A Shortest Path Overhearing Tree With Maximum Lifetime In WSNs
Related Courses:Secure data collection is an important problem in wireless sensor networks. Different approaches have been proposed. One of them is overhearing. We investigate the problem of constructing a shortest path overhearing tree with the maximum lifetime. We propose three approaches. The first one is a polynomial-time heuristic. The second one uses ILP (Integer Linear Programming) to iteratively find a monitoring node and a parent for each sensor node. The last one optimally solves the problem by using MINLP (Mixed- Integer Non-Linear Programming). We have implemented the three approaches using MIDACO solver and MATLAB Intlinprog, and performed extensive simulations using NS2.35. The simulation results show that the average lifetime of all the network instances achieved by the heuristic approach is 85.69% of that achieved by the ILP-based approach and 81.05% of that obtained by the MINLP-based approach, and the performance of the ILP-based approach is almost equivalent to that of the MINLP-based approach.
-
Efficient Route Update and Maintenance for Reliable Routing in Large-Scale Sensor Networks×
Efficient Route Update and Maintenance for Reliable Routing in Large-Scale Sensor Networks
Related Courses:Reliable data transmissions are challenging in industrial wireless sensor networks (WSNs) as channel conditions change over time. Rapid changes in channel conditions require accurate estimation of the routing path performance and timely update of the routing information. However, this is not well fulfilled in existing routing approaches. Addressing this problem, this paper presents combined global and local update processes for efficient route update and maintenance and incorporates them with a hierarchical proactive routing framework. While the global process updates the routing path with a relatively long period, the local process with a shorter period checks potential routing path problems. A theoretical modelling is developed to describe the processes. Through simulations, the presented approach is shown to reduce end-to-end delay up to 30 times for large networks while improving packet reception ratio (PRR) in comparison with hierarchical and proactive routing protocols ROL/NDC, DSDV and DSDV with RPL’s Trickle algorithm. Compared with reactive routing protocols AODV and AOMDV, it provides similar PRR while reducing end-to-end delay over 15 times.
-
Implementing Energy Efficient Technique for Defens against Gray-Hole and Black-Hole Attacks in Wireless Sensor Networks.×
Implementing Energy Efficient Technique for Defens against Gray-Hole and Black-Hole Attacks in Wireless Sensor Networks.
Related Courses:In a Wireless Sensor Networks (WSNs), energy consumption is a key challenge due to its dynamic topology, highly decentralized infrastructure and resource constraint sensors. These entities make WSNs easily compromised by various denials of service attacks resulting in disastrous consequences. In the development of various cluster basedenergy efficient protocols to improve the lifetime of WSNs compromised with some malicious nodes, a challenging problem is how to adopt the most effective energy efficient cluster head selection approach to extend lifetime of WSNs. Gray-Hole and Black-Hole attack are those denial of service attacks that reduces the performance of WSNs. In order to achieve energy efficiency in WSNs, an efficient and trust based secure protocol is proposed to defend against single and cooperative Gray-Hole and Black Hole attacks. A proposed protocol incorporates efficient estimation to determine honest nodes during packets transmission phase. A proposed energy efficient technique is builds to evaluate in detecting and preventing compromised node to become cluster head. Besides, NS2 simulation result compare proposed protocol with LEACH proves that proposed system is efficiently reduces possibility of compromised node to be a part of network communication process and achieves better packet delivery ratio, throughput , less end-to-end delay and extend the lifetime of network significantly.
-
A Trust Based Secured Coordination Mechanism for WSAN.×
A Trust Based Secured Coordination Mechanism for WSAN.
Related Courses:Wireless sensor-actor networks (WSAN) consist of a vast number of sensors and few actors. Generally, these networks are deployed in an unprotected environment to sense the physical world, and perform reliable actions on it. Hence, these networks are always susceptible to various kinds of passive and active attacks by malicious nodes. The back hole and gray hole attacks are part of active attacks. These attacks degrade the network efficiency and performance. In this paper, an efficient trust based secured coordination mechanism is proposed to counter the black hole and gray hole attacks on the delay and energy efficient routing protocol in sensor-actor networks. In the proposed mechanism, each sensor analyzes the trust level of its 1 − hop sensors based on the experience, recommendation, and knowledge. The analyzed trust value is transferred to the actor. The actor analyzes these values to identify the malicious nodes in its cluster region. The proposed trust based secured coordination mechanism (TBSC) is simulated using NS2. The performance is analyzed with respect to packet delivery
ratio, average energy dissipation in the network, and average end-to-end delay. The simulation results reveal that TBSC mechanism performs well for the delay and energy efficient routing protocol compared to the existing security mechanisms. -
An Improvement On LEACH Protocol.×
An Improvement On LEACH Protocol.
Related Courses:Wireless sensor network (Wsn) refers to a group of spatially dispersed and dedicated sensors for monitoring and recording the physical conditions of the environment and orginizing the collected data at a central location.WSNs measure environmental conditions like temperature sound,pollution levels humidity,wind peed,direction,pressure..etc. Sensors are usually attached to microcontrollers and are powered by battery. Energy consideration is a critical issue for designing the routing protocols. Routig protocols are most important for the network while resources are limited. LEACH is one of the first heirerachical approaches for sensor networks. Most of the clustering algorithms are derived from this algorithm. In this paper we propose on the improvement on LEACH protocol. In our proposed algorithm ,network is logically divided into 4 zone. In first select the CH the node that close to center of every zone forward its location to BS. Then BS select node that are very closer than other node to center of regions. In addition
residual energy of each node is also considered. We have evaluate LEACH ,PR-LEACH and Energy-zone LEACH (EZ-LEACH) through simulation using ns2 simulator which shows that LR-LEACH performs better than LEACH and PR-LEACH protocols. -
An Autonomic in-Network Query Processing for Urban Sensor Networks×
An Autonomic in-Network Query Processing for Urban Sensor Networks
Related Courses:The sensing of urban environments usually takes into account the deployment of a large number of devices to measure their environmental attributes, such as temperature, pressure, humidity, luminosity and pollution. In such applications, nearby sensors usually produce similar readings due to their spatial and temporal correlation. In the era of big data, management of collected data requires autonomous and scalable Wireless Sensor Network (WSN) structures. In this paper, we propose an in-network data storage model, called AQPM, that provides efficient processing of both spatial and value-based queries. AQPM is autonomous and scalable. That is, it does not rely on any central entity for neither managing data storage on sensor devices nor for processing queries. Scalability is achieved by grouping sensors with similar readings into clusters, while efficient query processing relies on the concept of repositories. Repositories are sensors that store readings of a set of clusters, and are the only ones that have to be contacted for answering queries. AQPM has been implemented on NS2 simulator and experimental results show that it is more effective than existing approaches.
-
A Fault Tolerant Approach to Extend Network Life Time of Wireless Sensor Network×
A Fault Tolerant Approach to Extend Network Life Time of Wireless Sensor Network
Related Courses:In a wireless sensor network the delivery of the data packet from source to destination may be failed for various reasons and major due to failure-prone environment of networks. This may happen due to the topology changes, node failure due to battery, exhaust or breakdown of the communication module in the wireless node and results in the link failure. This paper addressed the major problem of link failure due to the failure of the nodes in the WSN and with the aim of providing robust solutions to satisfy the QoS-based stern end-to-end requirements of communication networks. In this paper, we propose the new solution by modifying the existing extended fully distributed cluster-based routing algorithm (EFDCB). In this proposed algorithm the faulty nodes or nodes that are more prone to failure in the every cluster of the network get identified by exchanging data and mutually testing among neighbor nodes. When we established the path between source and destination these faulty nodes get excluded in the path selection process and more stable, less prone to failure path will be formed. The performance of this new modified fault-tolerant fully distributed cluster-based routing algorithm is evaluated by simulating it in NS2 environment. Simulation results show that it performs better than the existing algorithm and provide novel solution for fault detection and fault management along the QoS paths and achieves a high degree of fault tolerance.
-
Leveraging SDN to Conserve Energy in WSN-An Analysis×
Leveraging SDN to Conserve Energy in WSN-An Analysis
Related Courses:Energy conservation is one of the serious problems faced by WSN as the sensor nodes have limited battery power and are expected to perform data aggregation and actuation functions in addition to sensing data. Literature has plenty of solutions proposed to reduce energy consumption and usage .With the recent upcoming technology of introducing network programmability that centralizes network management tasks using software defined architecture (SDN), network trafficking is a prominent domain for applicability of SDN. Inherent traffic issues in WSN like data forwarding, aggregation of the data, path break and energy consumption can be efficiently handled by SDN, which provides a platform in which the data plane and the control plane are separated . By integrating SDN in WSN, the sensor nodes perform only forwarding and don't take any routing decision, due to which energy usage will be reduced. We propose a general framework for a software-defined wireless sensor network where the controller will be implemented at the base station, centre nodes in the cluster acts as switches and communication between the switch and the controller is via OpenFlow protocol. We realize the energy saving in the proposed architecture with the results obtained using NS2 and mininet emulator environments.
-
Effects of mobility on latency in a WSN that accommodates mobile nodes×
Effects of mobility on latency in a WSN that accommodates mobile nodes
Related Courses:Several applications have been proposed for mobile
wireless sensor networks. Some of these applications require the
transfer of a large amount of data in a short period of time. This
is challenging, since mobility can lead to a deterioration in the
quality of an established link. Frequent link disconnection may in
turn require a mobile node to repeatedly establish new links with
the surrounding relay nodes to proceed with the data transfer.
The new link establishment may cause extra data communication
latency and make most of the applications delay sensitive. To
evaluate the effect of mobility on latency, this paper first sets
up a mathematical model based on a hybrid medium access
control (MAC) protocol in mobile scenarios. It then uses NS2
simulation to further analyze the latency associated with mobility.
Both results show that the latency increases with an increment
in the network density and the duty cycle. -
Intrusion Detection System for Power-Aware OLSR×
Intrusion Detection System for Power-Aware OLSR
Related Courses:Optimized Link State Routing (OLSR) is a standard proactive routing protocol for Wireless Sensor Network (WSN). OLSR uses two kinds of the control messages: Hello and Topology Control (TC). As these messages are un-authenticated, OLSR is prone to several attacks namely, blackhole, wormhole, grayhole etc. This paper is focused at Sleep Deprivation Torture Attack on OLSR. Sleep deprivation attack is one of the most interesting attack in layer 2 where the attacker tries to use a low energy node until all its energy is exhausted and the node goes into permanent sleep. This attack is also possible in routing level. In OLSR low energy node declare their status through willingness property of HELLO message. Using this information an attacker node can choose that low energy node deliberately and forward all traffic through that node. This leads to low energy node in a permanent sleep mode. In this paper we propose a specification based Intrusion Detection System (IDS) for that type of attack. The performance of the propose algorithm is studied by Network Simulator (NS2) and effectiveness of the propose scheme, along with a comparison with existing techniques is demonstrated.
-
SPIN With Cluster for Data Centric Wireless×
SPIN With Cluster for Data Centric Wireless
Related Courses:Routing Algorithms are driving the growth of the data transmission in wireless sensor networks. Contextually, many algorithms considered the data gathering and data aggregation. This paper uses the scenario of clustering and its impact over the SPIN protocol and also finds out the effect over the energy consumption in SPIN after uses of clustering. The proposed scheme is implemented using TCL/C++ programming language and evaluated using Ns2.34 simulator and compare with LEACH. Simulation shows proposed protocol exhibits significant performance gains over the LEACH for lifetime of network and guaranteed data transmission India
-
Secure-SPIN with cluster for Data Centric Wireless sensor network×
Secure-SPIN with cluster for Data Centric Wireless sensor network
Related Courses:Routing Algorithms are driving the growth of the data transmission in wireless sensor network. Contextually, many algorithms proposed for efficient data transferring. This paper uses the scenario and node distribution across the Battle field in India. This Paper uses clustering algorithms to send the data over different geographic region. During the Battle, data gathering and data aggregation to base station is important and critical task. Based onevent,clustering algorithm used. This paper assumes that sensor node uniformly distributed and coordinates of the base station and nodes are known. This paper is essential to enable the cluster head based selection scheme used in battle field and the performance of proposed protocol compute intensive and can significantly benefit over the others scheme. Proposed scheme having better data gathering, stability period and lifetime than the LECH scheme. The proposed scheme is implemented and simulated with LEACH in NS2.34. Simulation shows proposed protocol performance gains is better over the LEACH for lifetime of network and guaranteed data transmission.
-
Section of node density with cluster in SPIN for data centric wireless sensor network×
Section of node density with cluster in SPIN for data centric wireless sensor network
Related Courses:Routing algorithm are driving the growth of the data transmission in wireless sensor networks. Contextually many algorithm considered the data gathering and data aggregation scenario like battle field, it is important and critical task in data transmission. Therefore through this paper handles the event generated by sensor nodes and provide the guaranteed transmission to sink using clustering process and node density with SPIN. Proposed scheme having better data gathering stability period and lifetie than the LEACH scheme. The proposed scheme is implemented usng TCL / C++ programming language and evaluated using Ns2.34 simulator with LEACH. Simulation shows proposed protocol exhibits significant performance gains over the LEACH for lifetime of network and guaranteed data transmissions.
-
Low-Latency Asynchronous Duty-Cycle MAC Protocol for Burst Traffic in Wireless Sensor Networks×
Low-Latency Asynchronous Duty-Cycle MAC Protocol for Burst Traffic in Wireless Sensor Networks
Related Courses:Many energy-efficient asynchronous duty-cycle media access control (MAC) protocols for wireless sensor networks
(WSNs) have been proposed in recent years. However, for burst traffic, most of them suffer from significant performance degradation due to randomly waking up to communicate with each other. In this paper, we propose a new asynchronous duty-cycle receiver-initiated MAC protocol called HKMAC. In proposed HKMAC, by adaptively adjusting beacon time of the receiver and scheduling the sender’s listening time during scheduled period, it can achieve low end-to-end packet delivery latency and high energy efficiency under burst traffic. We have evaluated the performance of HKMAC through detailed ns-2 simulation. The simulation results show that HKMAC can always reduce end-to-end packet delivery latency and energy consumption under various data rates in different topologies
compared with RI-MAC - a state-of-the-art MAC protocol in WSNs. -
Breath: An Adaptive Protocol for Industrial Control Applications Using Wireless Sensor Networks×
Breath: An Adaptive Protocol for Industrial Control Applications Using Wireless Sensor Networks
Related Courses:Opportunistic data forwarding has drawn much attention in the research community of multihop wireless networking, with most research conducted for stationary wireless networks. One of the reasons why opportunistic data forwarding has not been widely utilized in mobile ad hoc networks (MANETs) is the lack of an efficient lightweight proactive routing scheme with strong source routing capability. In this paper, we propose a lightweight proactive source routing (PSR) protocol. PSR can maintain more network topology information than distance vector (DV) routing to facilitate source routing, although it has much smaller overhead than traditional DV-based protocols [e.g., destination-sequenced DV (DSDV)], link state (LS)-based routing [e.g., optimized link state routing (OLSR)], and reactive source routing [e.g., dynamic source routing (DSR)]. Our tests using computer simulation in Network Simulator 2 (ns-2) indicate that the overhead in PSR is only a fraction of the overhead of these baseline protocols, and PSR yields similar or better data transportation performance than these baseline protocols.
-
Grouping of Clusters for Efficient Data Aggregation (GCEDA) in Wireless Sensor Network×
Grouping of Clusters for Efficient Data Aggregation (GCEDA) in Wireless Sensor Network
Related Courses:In the application based WSN environment, energy and bandwidth of the sensor are valuable resources and need to utilize efficiently. Data aggregation at the sink by individual node causes flooding of the data which results in maximum energy consumption. To minimize this problem we propose and evaluate the group based data aggregation method, where grouping of nodes based on available data and correlation in the intra-cluster and grouping of cluster heads at the network level help to reduce the energy consumption. In addition, proposed method uses additive and divisible data aggregation function at cluster head (CH) as in-network processing to reduce energy consumption. Cluster head transmits aggregated information to remote sink
and cluster head nodes transmit data to CH. Simulation result shows, proposed algorithm provides an improvement of 14.94% in energy consumption as compared with primary cluster based protocol LEACH which uses only one CH, it also improves the network stability. -
By-Passing Infected Areas in Wireless Sensor Networks using BPR×
By-Passing Infected Areas in Wireless Sensor Networks using BPR
Related Courses:Abnormalities in sensed data streams indicate the spread of malicious attacks, hardware failure and software corruption among the different nodes in a Wireless Sensor Network. These factors of node infection can affect generated and incoming data streams resulting in high chances of inaccurate data, misleading packet translation, wrong decision making and severe communication disruption. This problem is detrimental to real-time applications having stringent Quality-of-Service (QoS) requirements. The sensed data from other uninfected regions might also get stuck in an infected region should no prior alternative arrangements are made. Although several existing methods (BOUNDHOLE and GAR) can be used to mitigate these issues, their performance is bounded by some limitations, mainly due to the high risk of falling into routing loops and involvement in unnecessary transmissions. This paper provides a solution to by-pass the infected nodes dynamically using twin rolling balls technique and also divert the packets that are trapped inside the identified area. The identification of infected nodes is done by adapting a Fuzzy data clustering approach which classifies the nodes based on the fraction of anomalous data that is detected in individual data streams. This information is then used in the proposed By-Passed Routing (BPR) which rotates the balls in two directions simultaneously: clockwise and counter-clockwise. The first node that hits any ball in any direction and is uninfected, is selected as the next hop. We are also concerned with the incoming packets or the packets-on-the-fly that may be affected when this problem occurs. Besides solving both of the problems in the existing methods, the proposed BPR technique has greatly improved the studied QoS parameters as shown by almost 40% increase in the overall performance.
-
A Novel Cluster-based Energy Efficient Routing in Wireless Sensor Networks×
A Novel Cluster-based Energy Efficient Routing in Wireless Sensor Networks
Related Courses:Recent development in electronics and wireless communications has enabled the improvement of low-power and lowcost wireless sensors networks. Wireless Sensor Networks(WSNs) are a combination of autonomous devices transmitting locally gathered information to a so-called sink node by using multihop wireless routing. One of the most important challenges in WSNs is to design energy efficient routing mechanism to increase the network lifetime due to the limited energy capacity of the network nodes. Furthermore, hot spots in a WSNs emerge as locations under heavy traffic load. Nodes in such areas quickly drain energy resources, leading to disconnection in network services. Cluster based routing algorithms in WSNs have recently
gained increased interest, and energy efficiency is of particular interest. A cluster head (CH) represents all nodes in the cluster and collects data values from them. To balance the energy consumption and the traffic load in the network, the CH should be rotated among all nodes and the cluster size should be carefully determined at different parts of the WSNs. In this paper, we proposed an cluster based energy efficient routing algorithm (CBER), CBER elects CH based on nodes near to the optimal cluster head distance and residual energy of the nodes. In WSNs energy is mostly consumed for transmission and reception, it is a non linear function of transmission range.In this paper, the optimal cluster head distance which links to optimal energy consumption is derived. In addition, residual energy is considered in the CH election in order to increase the network lifetime. Furthermore, the energy consumption of being a CH is equally spread among the cluster members. Performance results show CBER scheme reduces the end to end energy consumption and prolong the network lifetime of multi hop network compared to the well-known clustering algorithms LEACH and HEED. -
EgyHet: An Energy-Saving Routing Protocol for Wireless Heterogeneous Sensor Networks×
EgyHet: An Energy-Saving Routing Protocol for Wireless Heterogeneous Sensor Networks
Related Courses:Due to different requirements in application environment, wireless heterogeneous sensor networks (WHSNs) formed by sensors with various capacities are built. Data routing in WHSNs poses special challenges: First, it should be redesigned because the existing ones may not be directly used due to asymmetric links caused by diverse sensor transmission ranges. Second, it should guarantee an assured delivery rate because data is routed through lossy links. Third, it should be energyefficient due to the limitation of sensor batteries and the difficulty
of replacing them after deployment. To address these issues, we propose EgyHet: an Energy-saving routing protocol for Heterogeneous sensor networks. EgyHat deals with asymmetric links by establishing reverse paths. It saves energy by taking the shortest path, considering the remaining energy in sensors and reducing the number of forwarding nodes while guarantees an assured delivery rate. Simulation results show that EgyHat can save more energy yet keep the similar delivery ratio and latency to those of the existing routing protocol for WHSNs. -
Overlapped Schedules with Centralized Clustering for Wireless Sensor Networks×
Overlapped Schedules with Centralized Clustering for Wireless Sensor Networks
Related Courses:The main attributes that have been used to conserve the energy in wireless sensor networks (WSNs) are clustering, synchronization and low-duty-cycle operation. Clustering is an energy efficient mechanism that divides sensor nodes into many clusters. Clustering is a standard approach for achieving energy efficient and hence extending the network lifetime. Synchronize the schedules of these clusters is one of the
primary challenges in WSNs. Several factors cause the synchronization errors. Among them, clock drift that is accommodated at each hop over the time. Synchronization by means of scheduling allows the nodes to cooperate and transmit data in a scheduled manner under the duty cycle mechanism. Duty cycle is the approach to efficiently utilize the limited energy supplies for the sensors. This concept is used to reduce idle listening. Duty cycle, nodes clustering and schedules synchronization are the main attributes we have considered for designing a new medium access control (MAC) protocol. The proposed OLS-MAC protocol designed with the target of making the schedules of the clusters to be overlapped with introducing a small shift time between the adjacent clusters schedules to compensate the clock drift. The OLSMAC algorithm is simulated in NS-2 and compared to some SMAC derived protocols. We verified that our proposed algorithm outperform these protocols in number of performance matrix. -
Sensor Node Failure Detection Based on Round Trip Delay and Paths in WSNs×
Sensor Node Failure Detection Based on Round Trip Delay and Paths in WSNs
Related Courses:In recent years, applications of wireless sensor networks (WSNs) have been increased due to its vast potential to connect the physical world to the virtual world. Also, an advance in microelectronic fabrication technology reduces the cost of manufacturing portable wireless sensor nodes. It becomes a trend to deploy the large numbers of portable wireless sensors in WSNs to increase the quality of service (QoS). The QoS of such WSNs is mainly affected by the failure of sensor nodes. Probability of sensor node failure increases with increase in number of sensors. In order to maintain the better QoS under failure conditions, identifying and detaching such faults are essential. In the proposed method, faulty sensor node is detected by measuring the round trip delay (RTD) time of discrete round trip paths and comparing them with threshold value. Initially, the suggested method is experimented on WSNs with six sensor nodes designed using microcontroller and ZigBee. Scalability of proposed method is verified by simulating the WSNs with large numbers of sensor nodes in NS2. The RTD time results derived in hardware and software implementations are almost equal, justifying the real time applicability of the investigated method. Necessity of received signal strength measurement in cluster head variation and assigning separate wavelength for each link in other fault detection techniques are overcome here.
-
An Efficient Reactive Routing Security Scheme Based on RSA Algorithm for Preventing False Data Injection Attack in WSN×
An Efficient Reactive Routing Security Scheme Based on RSA Algorithm for Preventing False Data Injection Attack in WSN
Related Courses:Wireless sensor networks are vulnerable to various attacks. Injecting false data attack is one of the serious threats to wireless sensor network. In this attack adversary reports bogus information to the sink which causes error decision at upper level and energy waste in en-route nodes. Several authentication techniques using enroute filtering and cryptographic techniques are used for preventing such attacks. This paper focuses on the design of RSA based security scheme with on demand routing. On- demand routing protocol is used in this scheme to lower the energy consumption. This work evaluates and compares the performance of the network system using RSA algorithm and authentication algorithm. Study and implementation of these security schemes are been carried out using network simulator (ns2) and metrics such as Packet Delivery Ratio, Energy, Throughput. Results are presented as a function of these metrics and the graphs generated show that RSA based security scheme with on-demand routing performs better than the security schemes using authentication algorithms.
-
Impact of Multipath Routing on WSN Security Attacks×
Impact of Multipath Routing on WSN Security Attacks
Related Courses:Multipath routing does not minimize the consequences of security attacks. Due to this many WSNs are still in danger of most security attacks even when multipath routing is used. In critical situations, for example, in military and health applications this may lead to undesired, harmful and disastrous effects. These applications need to get their data communicated efficiently and in a secure manner. In this paper, we show the results of a series of security attacks on a multipath extension to the ad hoc on-demand distance vector AODV protocol, AOMDV. It is proved that many security parameters are negatively affected by security attacks on AOMDV, which is contradictory to research claims. This means that alternative refinements have to be made to present multipath routing protocols in order to make them more effective against network security attacks.
-
DEFENDING AGAINST VAMPIRE ATTACKS IN WIRELESS SENSOR NETWORKS×
DEFENDING AGAINST VAMPIRE ATTACKS IN WIRELESS SENSOR NETWORKS
Related Courses:Wireless Sensor Networks in today’s world are the basic means of communication. The limitations of system are resources like battery power, communication range and processing capabilities. One of the major challenges in Wireless Sensor Networks is the security concerns. The attacks affecting these systems are increasing as they progress. One of the resource depletion attacks called vampire attacks are the major concern. They not only affect a single node but they bring down the entire system draining the power i.e. Battery power. In this paper, the system proposed overcomes this challenge by using the Energy Weight Monitoring Algorithm (EWMA) and the energy consumption is reduced to a great-extend.
-
Efficient Cluster Head Election For Detection And Prevention Of Misdirection Attack In Wireless Sensor Network×
Efficient Cluster Head Election For Detection And Prevention Of Misdirection Attack In Wireless Sensor Network
Related Courses:Wireless sensor networks are gaining their popularity in application like consumer, defense, industrial sectors monitoring and collecting environmental data. Wireless Sensor networks are in areas which are not having any human monitoring. Being unmonitored, wireless sensor networks are vulnerable to different kinds of the attack. Misdirection attack in one the Denial of Service Attack, which causes the nodes to route information on long paths and ultimately creates situations of network jam. Misdirection attack that reduces throughput, network life time and increases the delay. There is only one solution to misdirection attack is third party monitoring. The work here in this dissertation proposes third party monitoring by cluster head and also monitoring of cluster head by source and destination transmission. Furthermore the work also improves the cluster head election procedure for security, so that initially intruder should not be selected as a cluster head.
-
Energy Efficient Data Aggregation Techniques in Wireless Sensor Networks×
Energy Efficient Data Aggregation Techniques in Wireless Sensor Networks
Related Courses:The data in wireless sensor networks is organized in an efficient manner using data aggregation and data dissemination protocols. Due to the energy constraints in sensor nodes, energy-efficient data aggregation protocols are used to save the node energy and enhance the network life cycle. Deploying additional sensor nodes in the network reduce the resource constraints but increase the rate of data redundancy. This limitation is addressed by the data aggregation protocols in sensor networks. Data aggregation protocols use cluster head node to collect the data, aggregate the data and forward the data to the base station. The primary attributes considered in the design of data aggregation protocols are energy, latency, cluster size and data rate. In this article, we present a novel approach to classify the energy-efficient data aggregation protocols based on structure, search-based and time-based approaches. Analysis for structure-free, structure-based, distance and time-based data aggregation protocols are given in detail. Simulation results indicate that the energy and throughput rate are improved in the cluster-based data aggregation protocols as compared to the structure-free, time-based or search-based data aggregation protocols.
-
Efficient Multilevel Data Aggregation Technique for Wireless Sensor Networks×
Efficient Multilevel Data Aggregation Technique for Wireless Sensor Networks
Related Courses:Wireless sensor network (WSN) is one of the most emerging technology which consists of large number of sensor nodes with each having the capacity to sense, compute and communicate the data. WSN has great deal of applications in various fields like military, agriculture, industry healthcare etc. Sensor nodes are randomly and densely deployed. This kind of deployment creates large number of redundant sensor data. Routing of such redundant data not only saturates network resources, but also consumes more energy. Data aggregation is the effective technique which reduces the number of transmissions to sink node by aggregating the similar packets in an energy efficient manner to enhance the lifetime of network. There exists different data aggregation techniques which perform aggregation in single level or two levels. In this paper we are proposing multilevel hierarchical data aggregation technique which handles the redundancy in sensor data very efficiently.
-
Secured Clustering and Multipath Routing in Wireless Sensor Networks×
Secured Clustering and Multipath Routing in Wireless Sensor Networks
Related Courses:Secure data transmission is a critical issue for wireless sensor networks (WSNs).Clustering is an effective and practical way to enhance the system performance of WSNs. In this paper, we study a secure data transmission for cluster-based WSNs (CWSNs), where the clusters are formed dynamically and periodically. We propose two Secure and Efficient data Transmission (SET) protocols for CWSNs, called SET-IBS and SET-IBOOS, by using the Identity-Based digital Signature (IBS) scheme and the Identity-Based Online/Offline digital Signature (IBOOS) scheme, respectively. In SET-IBS, security relies on the hardness of the Diffie-Hellman problem in the pairing domain. SET-IBOOS further reduces the computational overhead for protocol security, which is crucial for WSNs, while its security relies on the hardness of the discrete logarithm problem. We show the feasibility of the SET-IBS and SET-IBOOS protocols with respect to the security requirements and security analysis against various attacks. The calculations and simulations are provided to ] illustrate the efficiency of the proposed protocols. The results show that, the proposed protocols have better performance than the existing secure protocols for CWSNs, in terms of security overhead and energy consumption.
-
Achieving Efficient Flooding by Utilizing Link Correlation in WSN×
Achieving Efficient Flooding by Utilizing Link Correlation in WSN
Related Courses:Although existing flooding protocols can provideefficient and reliable communication in wireless sensor networkson some level, further performance improvement has been hampered by the assumption of link independence, which requires costly acknowledgments (ACKs) from every receiver. In this paper, we present collective flooding (CF), which exploits the link correlation to achieve flooding reliability using the concept of collective ACKs. CF requires only 1-hop information at each node, making the design highly distributed and scalable with low complexity. We evaluate CF extensively in real-world settings, using three different types of testbeds: a single-hop network with 20 MICAz nodes, a multihop network with 37 nodes, and a linear outdoor network with 48 nodes along a 326-m-long bridge. System evaluation and extensive simulation show that CF achieves the same reliability as state-of-the-art solutions while reducing the total number of packet transmission and the dissemination delay by 30%–50% and 35%–50%, respectively
-
Efficient multicast QOS Approach for localized clustered based wireless sensor network×
Efficient multicast QOS Approach for localized clustered based wireless sensor network
Related Courses:Limited resources in Wireless Sensor Networks (WSNs) are the key concern that needs to be given a careful
consideration when studying virtually any aspect of a sensor network. Therefore, energy demands and radio bandwidth utilization should be addressed, especially in one-to-many communication.To define the problem, this article presents and categorizes he most common WSN multicast procedures depending on the way a target group is identified by the means of geographic position. It is evident that a need for centralized network-wide topology knowledge can jeopardize scarce energy resources of a sensor network. The term multicasting means “Point-to-multipoint" or “one to many”. In multicasting there is one source and multiple receivers, means copy of same data can be transmit to multiple receivers at a same time Multicasting is one of the major communication technologies primarily designed for bandwidth conservation and an efficient way of transferring data to a group of receivers in wireless sensor networks. Providing QoS support in wireless sensor networks is an emerging area of research.Due to resource constraints like processing power, memory, bandwidth and power sources in sensor networks, QoS support in WSNs is a challenging task. In this paper, we discuss the QoS requirements in WSNs and present a survey of some of the QoS aware routing techniques in WSNs. -
Energy efficient reliable routing approach considering residual energy in Mobile WSN×
Energy efficient reliable routing approach considering residual energy in Mobile WSN
Related Courses:We propose two novel energy-aware routing algorithms for wireless ad hoc networks, called reliable minimum energy cost routing and reliable minimum energy routing .Reliable minimum energy cost routing addresses three important requirements of ad hoc networks: energy-efficiency, reliability, and prolonging network lifetime. It considers the energy consumption and the remaining battery energy of nodes as well as quality of links to find energy-efficient and reliable routes that increase the operational lifetime of the network. Reliable minimum energy routing, on the other hand, is an energy-efficient routing algorithm which finds routes minimizing the total energy required for end-to-end packet traversal. Reliable minimum energy routing and RELIABLE MINIMUM ENERGY COST ROUTING are proposed for networks in which either hop-by-hop or end-to-end retransmissions ensure reliability. Simulation studies show that RELIABLE MINIMUM ENERGY COST ROUTING is able to find energy-efficient and reliable routes similar to Reliable minimum energy routing, while also extending the operational lifetime of the network. This makes RELIABLE MINIMUM ENERGY COST ROUTING an elegant solution to increase energy-efficiency, reliability, and lifetime of wireless ad hoc networks. In the design of RELIABLE MINIMUM ENERGY COST ROUTING, we consider minute details such as energy consumed by processing elements of transceivers, limited number of retransmissions allowed per packet, packet sizes, and the impact of acknowledgment packets. This adds to the novelty of this work compared to the existing studies.
-
ALBA-R: Load-Balancing Geographic Routing Around Connectivity Holes in Wireless Sensor Networks×
ALBA-R: Load-Balancing Geographic Routing Around Connectivity Holes in Wireless Sensor Networks
Related Courses:This paper presents ALBA-R, a protocol for convergecasting in wireless sensor networks. ALBA-R features the cross-layer integration of geographic routing with contention-based MAC for relay selection and load balancing (ALBA), as well as a mechanism to detect and route around connectivity holes (Rainbow). ALBA and Rainbow (ALBA-R) together solve the problem of routing around a dead end without overhead-intensive techniques such as graph planarization and face routing. The protocol is localized and distributed, and adapts efficiently to varying traffic and node deployments. Through extensive ns2-based simulations, we show that ALBA-R significantly outperforms other convergecasting protocols and solutions for dealing with connectivity holes, especially in critical traffic conditions and low-density networks. The performance of ALBA-R is also evaluated through experiments in an outdoor testbed of TinyOS motes. Our results show that ALBA-R is an energy-efficient protocol that achieves remarkable performance in terms of packet delivery ratio and end-to-end latency in different scenarios, thus being suitable for real network deployments.
-
PEPPDA: Power Efficient Privacy Preserving Data Aggregation for Wireless Sensor Networks×
PEPPDA: Power Efficient Privacy Preserving Data Aggregation for Wireless Sensor Networks
Related Courses:Energy efficient privacy preserving data aggregation is important in power constrained wireless sensor etworks. Existing hop by hop encrypted privacy preserving data aggregation protocols does not provide efficient solutions for energy constrained and security required WSNs due to the overhead of performing power consuming decryption and encryption at the aggregator node for the data aggregation and the increased number of transmissions for achieving data privacy. The decryption of data at the aggregator node will increase the frequency of node compromise attack. Thereby aggregator node reveals large amounts of data to adversaries. The proposed privacy homomorphism based privacy preservation protocol achieves non delayed data aggregation by performing aggregation on encrypted data. Thereby decreases the node compromise attack frequency. So high chance to get accurate aggregated results at the sink with reduced communication and computation overhead. The PEPPDA technique is best suited for time critical, secure applications such as military application, since it achieves privacy, authenticity, accuracy, end to end confidentiality, data freshness and energy efficiency during data aggregation. Our main aim is to provide a secure data aggregation scheme which guarantees the privacy, authenticity and freshness of individual sensed data as well as the accuracy and confidentiality of the aggregated data without introducing a significant overhead on the battery limited sensors
-
R3E: Reliable Reactive Routing Enhancement for Wireless Sensor Networks×
R3E: Reliable Reactive Routing Enhancement for Wireless Sensor Networks
Related Courses:Providing reliable and efficient communication under fading channels is one of the major technical challenges in wireless sensor networks (WSNs), especially in industrial WSNs (IWSNs) with dynamic and harsh environments. In this work,we present the Reliable Reactive Routing Enhancement (R3E) to increase the resilience to link dynamics for WSNs/IWSNs. R3E is designed to enhance existing reactive routing protocols to provide reliable and energy- efficient packet delivery against the unreliable wireless links by utilizing the local path diversity. Specifically, we introduce a biased backoff scheme during the route-discovery phase to find a robust guide path, which can provide more cooperative forwarding opportunities. Along this guide path, data packets are greedily progressed toward the destination through nodes’ cooperationwithout utilizing the location information. Through extensive simulations, we demonstrate that compared to other protocols, R3E remarkably improves the packet delivery ratio, while maintaining high energy efficiency and low delivery latency