Efficient Data Transmission Using Energy Efficient Clustering Scheme for Wireless Ad-Hoc Sensor Network
Savitha.M , Dr. R.Manavalan. "Efficient Data Transmission Using Energy Efficient Clustering Scheme for Wireless Ad-Hoc Sensor Network". International Journal of Computer Trends and Technology (IJCTT) V17(2):69-77, Nov 2014. ISSN:2231-2803. www.ijcttjournal.org. Published by Seventh Sense Research Group.
Abstract -
Wireless Ad-hoc Sensor Network is characterized with low power, low computational capabilities and limited memory nodes. In WASN, secure routing protocols are used to protect against attacks. Partitioning the nodes into different cluster is one of the most effective methods to solve the problem of energy in Wireless Ad hoc Sensor Network. PLGP schemes with path attestations, increase the size of each packet, incur penalties in terms of bandwidth use, and radio power. The Energy Efficient Clustering Schemes (EECS) is introduced for reducing the energy consumption of the Ad hoc wireless sensor network as well as prolong the lifetime of the networks and preserve a balanced energy expenditure of nodes network. Clustering is a technique which selects the number of cluster head depends upon cluster nodes energy and the same is used to transfer the data. The proposed model is evaluated on Ad hoc on demand Distance Vector routing protocol and also compared with PLGP in terms of the parameters such as Throughput, Packet Delivery Ratio and Packet Delay Time.
References
[1] Xiang Ji, HongyuanZha“Sensor Positioning in Wireless Ad-hoc SensorNetworks Using Multidimensional Scaling“In Proceedings of the 12th International Conference onComputer Communications and Networks, pp.527-532,2003
[2] Eugene Y. Vassermann and Nicholas Hopper “Vampire Attacks: Draining Life from Wireless Ad Hoc Sensor Networks” IEEE Trans. Mobile Computing, vol. 12, no. 2, pp. 318-332 Feb-2013.
[3] T. Aura, “Dos-Resistant Authentication with Client Puzzles,” Proc. Int’l Workshop Security Protocols, 2001.
[4]. L.M. Feeney, “An Energy Consumption Model for Performance Analysis of Routing Protocols for Mobile Ad Hoc Networks,”
[5] Y.-C. Hu, D.B. Johnson, and A. Perrig, “SEAD: Secure Efficient Distance Vector Routing for Mobile Wireless Ad Hoc Networks,”Proc. Fourth IEEE Workshop Mobile Computing Systems and Applications, 2003
[6] S.Sivanantham, K.Kirankumar, G.Saravanagokul,” Identifying Malicious Nodes in Wireless Sensor Networks using Node Classification” International Journal of Innovative Research in Computer and Communication Engineering Vol. 1, Issue 9, 2013
[7]Haibin Sun John C.S. Lui”Distributed Mechanism in Detecting and Defending against the Low-rate TCP Attack”International Conference of Network Protocols (ICNP) 2006, Berlin, Germany
[8] Vahid Shah-Mansouri and Vincent W.S. Wong” Distributed Maximum Lifetime Routing in Wireless Sensor Networks Based on Regularization”Proc. IEEE Transactions on, Ad-hoc and Sensor Networking Symposium, 2007
[9] Mohammad Saiful Islam Mamun” Hierarchical Design Based IntrusionDetectionsystem for Wireless Ad Hoc Sensor Network” International Journal of Network Security & Its Applications (IJNSA), Vol.2, No.3, July 2010
[10] Vidya.MReshmi.S “Contending Against Energy Debilitating Attacks in Wireless Ad Hoc Sensor Networks” International Journal of Innovative Research in Advanced Engineering (IJIRAE) Volume 1, Issue 1 2014
[11] Monica Palle, SeelamSaiSatyanarayana Reddy “Detection Elimination and Overcoming of Vampire Attacks in Wireless Ad hoc Networks ” IJRIT International Journal of Research in Information Technology, Volume 2, Issue 6, 2014, Pg: 224-237
[12] Gergely A´ cs, LeventeButtya´n, and Istva´nVajda “Provably Secure On-demand Source Routing in Mobile Ad Hoc Networks” IEEE journal March 2010 [7] H. Chan and A. Perrig, “Security and Privacy in Sensor Networks,” Computer, vol. 36, no. 10, pp. 103-105, Oct. 2003.
[13] Ray-Guang Cheng, Shin-Ming Cheng, and Phone Lin, “Power-Efficient Routing Mechanism for ODMA Systems” IEEE transactions on vehicular technology, vol. 55, no. 4, July 2006
[14] David R. Raymond, Randy C. Marchany, Michael I. Brownfield, and Scott F. Midkiff, Effects of denial-of-sleep attacks on wireless sensor network MAC protocols, IEEE Transactions on Vehicular Technology 58 (2009), no. 1.
[15] G. Acs, L. Buttyan, and I. Vajda, “Provably Secure On-Demand Source Routing in Mobile Ad Hoc Networks,” IEEE Trans. Mobile Computing, vol. 5, no. 11, pp. 1533-1546, Nov. 2006.
[16] A.J. Goldsmith and S.B. Wicker, “Design Challenges for Energy-Constrained Ad Hoc Wireless Networks,” IEEE Wireless Comm., vol. 9, no. 4, pp. 8-27, Aug. 2002.
[17] Shalini Jain, Dr.Satbir Jain, “Detection and prevention of wormhole attack in mobile adhoc networks”, vol. Jan 5, 2010.
[18] SoramRakesh Singh, NarendraBabu C R “ improving the performance of energy attack detection in wireless sensor network by secure forwarding mechanism ” International Journal of Scientific and Research Publications, Volume 4, Issue 7, 2014
[19] Monica Palle, SeelamSaiSatyanarayana Reddy “Detection Elimination and Overcoming of Vampire Attacks in Wireless Ad hoc Networks ” IJRIT International Journal of Research in Information Technology, Volume 2, Issue 6, 2014, Pg: 224-237
[20] SoramRakesh Singh, NarendraBabu C R “ improving the performance of energy attack detection in wireless sensor network by secure forwarding mechanism ” International Journal of Scientific and Research Publications, Volume 4, Issue 7, 2014
[21]S.BlessyVedhaP.Petchimuthu “A Captivating Approach for Disclosing Vampire Intrusion in WSN” International Journal of Advanced Research in Computer Science and Software Engineering Volume 4, Issue 3, 2014
[22] Jose Anand, K. Sivachanda “Vampire Attack Detection in Wireless Sensor Network” International Journal of Engineering Science and Innovative Technology (IJESIT) Volume 3, Issue 4, 2014
Keywords
AODV, BS, PLGP, EECS, OTCL