Professional Documents
Culture Documents
18, Issue 01
Publishing Month: September 2015
An Indexed and Referred Journal with ISSN (Online): 2231 5268
www.ijcsms.com
Abstract
Wireless sensor network is a collection of ad-hoc
networks and many mobility sensor nodes. Wireless
sensor network has many sensing nodes which provide
facility like, communication, computation. Wireless
sensor network provide facility of finding shortest path.
This paper provides the shortest path between source to
destination for improving performance. In this, bellman
ford distributed approach is used that is distance vector
algorithm. It will help in finding shortest path with
dynamically assigned nodes and it avoids malicious
nodes and intrusion. We use dijkstras algorithm to find
malicious nodes and we generate random graphs and it
will give calculate the distance between the nodes.
1. Introduction
Wireless sensor network is a collection of many adhoc networks which provide facility like
communication,
computation
and
sensing
capability. Wireless sensor node built up from few
to thousand of nodes where each node is connected
to one or several sensors. Wireless sensor has to
produced many tiny nodes and low cost.In this
network cooperatively pass their data through the
network to main location. Wireless sensor connect
the physical world with digital world and provide
understanding of our environment. Wireless sensor
network must be reliable and scalable to support
large applications. They must be accurate in
providing required information while performing in
network to avoid data load. Wireless sensor nodes
provide many applications like. Military, health
monitoring,
entertainment,
smart
building,
industrial, planning etc. In Wireless sensor network
there are many number of small companies that
effect the hardware and software design. There are
2. Problem description
In performance measurement of dijkstras using
wireless sensor network the problem formulation is
based on the time complexity of the different
algorithms thats are used in estimating the
shortest path in various routing algorithm. The
dijkstras algorithm found shortest path with
positive edge weight cycles.
In bellman ford
algorithm and there are negative edge weight
cycles that are not able to give the least time
complexity in wireless sensor network. Both
algorithms have the worst time complexity in
nature. And bellman-ford is slower than dijkstras
for some problem, but more versatile, as it is
capable of handling graph in which some of the
edge weight are negative number. In such a case,
the bellman ford can detect negative cycle and
report there existence. A distributed variant of
IJCSMS
www.ijcsms.com
IJCSMS (International Journal of Computer Science & Management Studies) Vol. 18, Issue 01
Publishing Month: September 2015
An Indexed and Referred Journal with ISSN (Online): 2231 5268
www.ijcsms.com
4. Algorithm
used
Implementation:
3. Objectives
during
6.
7.
8.
9.
10.
11.
12.
13.
Initialize S with the start vertex, s, and VS with the remaining vertices.
For all v in V-S
Set p[v] to s.
If there is an edge(s,v)
Set d[v] to w(s,v).
Else
Set d[v] to .
While V-S is not empty
For all u in V-S, find the smallest d[u].
Remove u from V-S and add u to S.
For all v adjacent to u in V-S
If d[u]+w(u,v)is less than d[v].
Set d[v] to d[u]+w(u,v).
Set p[v] to u.
IJCSMS
www.ijcsms.com
IJCSMS (International Journal of Computer Science & Management Studies) Vol. 18, Issue 01
Publishing Month: September 2015
An Indexed and Referred Journal with ISSN (Online): 2231 5268
www.ijcsms.com
4.3.2.1 Efficiency
o
o
o
IJCSMS
www.ijcsms.com
IJCSMS (International Journal of Computer Science & Management Studies) Vol. 18, Issue 01
Publishing Month: September 2015
An Indexed and Referred Journal with ISSN (Online): 2231 5268
www.ijcsms.com
Fig:1
5. Result
In this paper the complete focus is on performance
measurement. While analysing the result for the
application it consider the performance of
dijkstras, bellman-ford and its distributed approach
distance vector algorithm. It is noted that dijkstras
finds the shortest route between source to
destination and other node also. But here it has to
be analyzed that the performance of dijkstras
while performing for malicious node detection and
random generated graphs in the network. And
bellman-ford is used to find the route with negative
edge weight cycle. Its distributed approach distance
vector algorithm is used here that reduced the time
complexity and give the result with minimum
weight. Following points give the result analysis of
the different algorithm for some application
specific:
Fig: 1.1
IJCSMS (International Journal of Computer Science & Management Studies) Vol. 18, Issue 01
Publishing Month: September 2015
An Indexed and Referred Journal with ISSN (Online): 2231 5268
www.ijcsms.com
Fig:3
Fig: 2
Fig: 2.1
Fig:4
IJCSMS (International Journal of Computer Science & Management Studies) Vol. 18, Issue 01
Publishing Month: September 2015
An Indexed and Referred Journal with ISSN (Online): 2231 5268
www.ijcsms.com
References
[1] Habib, Asif. "Sensor network security issues at
network layer."
Advances in Space
Technologies, 2008.
ICAST 2008. 2nd
International Conference on. IEEE, 2008.
[2] Aschenbruck, Nils, et al. "A security
architecture and modular intrusion detection
system for WSNs." Networked Sensing
Systems (INSS), 2012 Ninth International
Conference on. IEEE, 2012.
[3] Haiyun Luo, Petros Zerfos, Jiejun Kong,
Songwu Lu, Lixia Zhang, Self-securing Ad
Hoc Wireless Networks, IEEE ISCC (IEEE
Symposium
on
Computers
and
Communications) 2002, Italy.
[4] Du, Wenliang, Lei Fang, and Ning Peng. "Lad:
Localization anomaly detection for wireless
sensor networks." Journal of Parallel and
Distributed Computing66.7 (2006): 874-886.
[5] Pires Jr, Waldir Ribeiro, et al. "Malicious node
detection in wireless sensor networks." Parallel
and Distributed Processing Symposium, 2004.
Proceedings. 18th International. IEEE, 2004.
[6] Curiae, D-L., et al. "Malicious node detection
in wireless sensor networks using an
autoregression technique." Networking and
Services, 2007. ICNS. Third International
Conference on. IEEE, 2007.
[7] Panos, Christoforos, Christos Xenakis, and
Ioannis Stavrakakis. "A Novel Intrusion
Detection System for MANETs." Security and
Cryptography (SECRYPT), Proceedings of the
2010
[8] Musznicki, Bartosz, Mikolaj Tomczak, and
Piotr
Zwierzykowski.
"Dijkstra-based
localized multicast routing in Wireless Sensor
Networks."Communication Systems, Networks
& Digital Signal Processing (CSNDSP), 2012
8th International Symposium on. IEEE, 2012.
[9] Abuarqoub, Abdelrahman, et al. "Simulation
Issues in Wireless Sensor Networks: A
Survey." SENSORCOMM 2012, The Sixth
International
Conference
on
Sensor
Technologies and Applications. 2012.
[10] Asmaa shaker Ashoor performance analysis
between distance vector algorithm and link
state
algorithm
for
routing
vector
international journal of scientific and
Fig: 5
Fig: 5.1
6. Conclusion
In the result of the study it found that none of the
algorithm is capable to handle the bottleneck in the
network. Following conclusion are drawn from the
study for each algorithm. As per the algorithmic
analysis performed conclude that dijkstra algorithm
is more efficient if nodes are randomly generated
and it helps in easily detection of malicious nodes.
The application where the network traffic is more
IJCSMS
www.ijcsms.com
IJCSMS (International Journal of Computer Science & Management Studies) Vol. 18, Issue 01
Publishing Month: September 2015
An Indexed and Referred Journal with ISSN (Online): 2231 5268
www.ijcsms.com
IJCSMS
www.ijcsms.com