You are on page 1of 9

Int. J. Engg. Res. & Sci. & Tech. 2015 P Kavin et al.

, 2015

ISSN 2319-5991 www.ijerst.com


Special Issue, Vol. 1, No. 3, May 2015
‘International Conference on “Advance Research and Innovation in
Engineering, Science, Technology and Management” ICARSM’ 15
Research Paper © 2015 IJERST. All Rights Reserved

ENERGY EFFICIENT RELIABLE WIRELESS


NETWORKING WITH HIGH LIFETIME AND SECURITY
P Kavin1*, Ra. Kukhapprabu1, N Manikandan1, N Ram kumar1

*Corresponding Author: P Kavin  cavinpalanisamy@gmail.com

The sensing capabilities of networked sensors are affected by environmental factors in real
deployment and it is imperative to have practical considerations at the design stage in order to
anticipate this sensing behaviour. We propose a new metric, the drain rate, to forecast the
lifetime of nodes according to current traffic conditions. This metric is combined with the value
of the remaining battery capacity to determine which nodes can be part of an active route. The
existent security threats an adhoc network faces, the security services required to be achieved
and the countermeasures for attacks in routing protocols. The authorized nodes keep sending
Request-to- Send (RTS) frames to the access point node in order to access to shared medium
and start data transfer. We develop energy consumption models that take into account energy
consumption due to data packets, control packets and retransmission.

Keywords: STDFF, D Flip Flop, Negative Edge trigger, Conventional Transistor

INTRODUCTION choose arbitrarily among their different paths of


A Mobile Ad hoc Network (MANET) is an same minimum length, regardless of their often
autonomous system it consists of a variety of large differences in throughput among those
mobile hosts forming a temporary network paths and ignoring the possibility the longest path
without any fixed infrastructures. The problem is might offer higher throughput. Transmission
enlarge by the fact of that routing usually it needs power control is used to improve the throughput
to really on their trustworthiness all the nodes are capacity in a wireless packet network. Such
participating in their routing process. Since it is studies motivate the definition of a link cost that
mainly difficult to dedicate routers and other is a function of both the energy required for a
infrastructures in such a network, all these nodes single transmission attempt across the link and
are self-organized and collaborated to each other. the link error rate. This cost function captures the
All their nodes as well as the routers it can move cumulative energy expended in reliable data
about it freely and thus this network topology is transfer, for both reliable and unreliable link layers.
highly dynamic. The minimum hop count metrics MDR extends nodal battery life and the duration

1
Sasurie College of Engineering, Tamil Nadu.

This article can be downloaded from http://www.ijerst.com/International-Conference-on-ICARSM-2015.php#1


108
Int. J. Engg. Res. & Sci. & Tech. 2015 P Kavin et al., 2015

of paths, while CMDR also minimizes the total adversary to accurately discover the traffic pattern
transmission energy consumed per packet. despite the use of these elegant schemes. One
Combined with the value of the remaining battery assumes constant rates and the other assumes
capacity, this metric is used to establish whether an arbitrary process. A shortest cost path routing
or not a node can be part of an active route. algorithm is proposed which uses link costs that
reflect both the communication energy
RELATED WORKS consumption rates and the residual energy levels
The probabilistic approach is a deviation from the at the two end nodes. To estimate unicast link
idealistic assumption of uniform circular disc for quality based on that of broadcast. It is, however,
sensing coverage used in the binary detection difficult to precisely estimate unicast link quality
model. Along this guide path, data packets are via that of broadcast, because temporal
greedily progressed toward the destination correlations of link quality assume complex
through nodes’ cooperation without utilizing the patterns and are hard to model.
location information. The proposed flip flop has
small area, power and delay overheads and good TRAFFIC ANALYSIS
radiation hardening capabilities. A multiplexer is Traffic analysis is the process of intercepting and
used to select the correct value as final output collecting messages on the way to track important
according to the fault indication signal. The information from patterns in communication. That
shortcut tree routing(STR) protocol that provides information is not leaking or not modified just do
the near optimal routing path as well as maintains monitoring and analysis activities. It can get
the advantages of the ZigBee tree routing such information from the monitor frequency and timing
as no route discovery overhead and low memory packets. In evidence-based statistical traffic
consumption. The Independent basic service set analysis model, every captured packet is treated
is used in this research that has no backbone as evidence supporting a point-to-point (one-hop)
infrastructure and consists of at least two wireless transmission between the sender and the
stations. Theoretical analysis shows that HS can receiver. A sequence of point-to-point traffic
spread a given number of message copies in an matrices is created, and then they are used to
optimal way when the inter-meeting time between derive end- to-end (multihop) relations. This
any two nodes and between a node and a approach provides a practical attacking
community home follows independent and framework against Mobile Wireless Network but
identical exponential distributions, respectively. still leaves substantial information about the
Data delivery source routing by multilayer communication patterns undiscovered. Statistical
encryptions or end-to-end re-encryptions by a traffic analysis attacks have attracted broad
virtual circuit. Regardless of their implementation interests due to their passive nature, i.e., attackers
details, these schemes all aim to hide real packet only need to collect information and perform
sources and destinations in both route discovery analysis quietly without changing the network
and packet forwarding from a limited number of behaviour. The predecessor attacks and
local and internal attackers. In this paper, we disclosure attacks are two representatives.
show that it is feasible for a passive global However, all these previous approaches do not

This article can be downloaded from http://www.ijerst.com/International-Conference-on-ICARSM-2015.php#1


109
Int. J. Engg. Res. & Sci. & Tech. 2015 P Kavin et al., 2015

work well to analyse traffic because of the Figure 1: Data Transmission using Gateways
following three natures of Mobile Wireless
Network:

A. The broadcasting nature


In wired networks, a point-to-point message
transmission usually has only one possible
receiver. While in wireless networks, a message
is broadcasted, which can have multiple possible
receivers and so in curs additional uncertainty.

B. The ad hoc nature


Mobile Wireless Network lack network A heuristic for Sensor Deployment
infrastructure and each mobile node can serve 1: Place sensor nodes randomly
as both a host and a router. Thus, it is difficult to 2: for i =1 to m do
determine the role of a mobile node to be a source, 3:if Xi does not monitor any target then
a destination, or just a relay. 4: Move Si to the least monitored target

C. The mobile nature 5:Recompute sensor-target coverage matrix

Most of existing traffic analysis models does not 6:end if

take into consideration the mobility of 7: end for

communication peers, which make the 8: X = Sensor nodes sorted in ascending order of number
of targets it covers
communication relations among mobile nodes
9: for i =1 to m do
more complex.
10: repeat
Sensor Deployment 11: Place Xi at the center of all targets it covers

First we use a heuristic to compute the 12: Move Xi to the center of all targets it covers and its next
nearest target
deployment locations. A heuristic is then used to
13: if Xi can cover a new target then
schedule the sensor nodes such that the network
14: Recompute sensor-target matrix
lifetime is maximum.
15:else
Sensor Deployment Approach 16: Discard move

1: Set Input: X , t 17:end if

18:until Xi can cover another target


2: Output: Optimal location of X and sensor schedule
19: end for
3: Deploy X randomly
20: Compute upper bound of network lifetime
4: Compute upper bound of network lifetime

5: Recompute sensor node such that the upper bound of PROTOCOL TECHNIQUES
network lifetime is maximum
A. Sleep Protocol
6: Design sensor schedule using the proposed heuristic for
sensor scheduling such that the network lifetime upper Sleep protocol mainly helps to getting the node
bound is achieved
energy value has becomes too compared to

This article can be downloaded from http://www.ijerst.com/International-Conference-on-ICARSM-2015.php#1


110
Int. J. Engg. Res. & Sci. & Tech. 2015 P Kavin et al., 2015

threshold value. The sleep protocol having two EXPERIMENTED RESULTS


different type of modes.
The traffic files are generated such that the source
(1)As soon as you notice you are awake, observe and destination pairs are randomly spread over
the urge and back to sleep immediately. the entire network. The scenario files determine
(2)To move at all, at only once, and it’s gently so the mobility of the nodes.
as not to wake up.
Figure 2: Average Delay of Transmission
B. Leach Protocol
Leach protocol helps in selecting the weightiest
node as the forward node as soon as the sleep
protocol makes the previous node to sleep. For
selecting the best one, the protocol follows a rapid
analysis of nodes on its weighage.

PROPOSED METHOD DESIGN


A. Energy Efficiency
To this end, reliability and energy cost of routes
must be considered in route selection. The key
point is that energy cost of a route is related to its The above graph symbolizes the average delay
reliability. If routes are less reliable, the probability of transmission of packets within the total group
of packet retransmission increases. Thus, a of nodes. A Typical Transmission and Projected
larger amount of energy will be consumed per Transmission are compared here. From the
packet due to retransmissions of the packet. simulation results it is clear that the delay is
When a node transmits the packets from source reduced in the proposed approach than that of
to destination, the energy value decreases in step the prevailing system.
by step process. When a source node has
reached the threshold value and the distance is Figure 3: Energy Consumption Graph

very high then the data packets didn’t reach the


destination; it takes a long time to reach the
destination. So the efficiency has decreases.

B. Path node Selection


When the node energy value becomes low the
data loss will be occurred. For to improve the
efficiency and reduce the delay the path
(intermediate) node has been selected. The
source will be transmits the data to destination
towards the path node. The path node receives
the packets it’s transmits the data to long distance.

This article can be downloaded from http://www.ijerst.com/International-Conference-on-ICARSM-2015.php#1


111
Int. J. Engg. Res. & Sci. & Tech. 2015 P Kavin et al., 2015

The above graph symbolizes the average is increased in the suggested approach than that
energy consumed for packet data transmission of the prevailing systems.
within the total group of nodes. A Typical Throughput value denotes that the efficiency
Transmission and Projected Transmission are has improved as the delay is reduced. The output
compared here. From the simulation results it is signal shows the ratio of source value to the
clear that the energy consumption is reduced in received value. From the simulation results (Fig
the proposed approach than that of the prevailing .5) it is evident that the overall throughput is
system. increased in the proposed approach than that of
the prevailing systems.
Figure 4: Packet Delivery Ratio in Transmission

CONCLUSION
Conversely, the implementation of such
mechanisms does not only mitigate the jamming
attack effects, it also increases the overall
performance above the normal state of the
network constraints. Even adhoc networks have
vast potential, still there are many challenges left
to overcome. From the captured packets,
Network constructs a sequence of traffic matrices
to derive the traffic matrix, and then uses a
heuristic data processing model to reveal the
The above graph symbolizes the Packet hidden traffic patterns from the end-to-end matrix.
Delivery Ratio in transmission of packets within
the total group of nodes. From the simulation
REFERENCES
results it is evident that the Packet Delivery Ratio 1. Bartolini N, Calamoneri T, La Porta T, and
Silvestri S (2010), “Mobile sensor
Figure 5: Average Throughput deployment in unknown ûelds,” in Proc. IEEE
of the Proposed System
INFOCOM, Mar., pp. 1–5.
2. Chakeres I and Perkins C (2008), “Dynamic
MANET On-demand (DYMO) Routing
Rrotocol”, IETF Internet Draft, v.15,
November 2008.
3. Chaum D (1988), “The Dining
Cryptographers Problem: Unconditional
Sender and Recipient Untraceability,” J.
Cryptology, Vol. 1, No. 1, pp. 65-75.
4. Cormen T H and Charles C S, Leiserson E,
and Rivets R L (2001), Introduction to

This article can be downloaded from http://www.ijerst.com/International-Conference-on-ICARSM-2015.php#1


112
Int. J. Engg. Res. & Sci. & Tech. 2015 P Kavin et al., 2015

Algorithms, second ed. MIT Press. 13. Li Y and Gao S (2008), “Designing k-
coverage schedules in wireless sensor
5. Dai W (2013), “Two Attacks against a
networks,” J. Combinat. Opt., Vol. 15, No. 2,
PipeNet-Like Protocol Once Used by the
pp. 127–146.
Freedom Service”, http://weidai.com/freedo
mattacks.txt. 14. Liu Y, Zhang R, Shi J, and Zhang Y (2010),
“Traffic Inference in Anonymous MANETs,”
6. Md. Golam Rashed, Hasnat Kabir M, Shaikh
Proc. IEEE Seventh Ann. Comm. Soc. Conf.
Enayet Ullah (2011), “WEP: An Energy
Sensor Mesh and Ad Hoc Comm. and
Efficient Protocol for Cluster based
Networks (SECON ’10), pp. 1-9.
Heterogeneous Wireless Sensor Networks”,
International Journal of Distributed and 15. Nishu Garg and Mahapatra R P (2009),
Parallel Systems (IJDPS), Vol. 2, No. 2. “MANET Security Issues”, IJCSNS
International Journal of Computer Science
7. Gold S (1997), “A Pspice Macromodel for
and Network Security, Vol. 9 No. 8.
Lithium-Ion Batteries,” Proc. 12th Ann.
Battery Conf. Applications and Advances, pp. 16. Perkins C, Royer E and Das S (2001), “Ad
215-222, Jan. 1997. Hoc On Demand Distance Vector (AODV)
Routing”, draft-manet-ietf-aodv-8.txt, IETF,
8. Habib A, Hefeeda M and Bhargava B (2003),
Work in Progress, March.
“Detecting Service Violations and DoS
Attacks”, In The 10th Annual Network and 17. Ping Yi, Yue Wu and Futai Zou and Ning Liu
Distributed System Security Symposium (2010), “A Survey on Security in Wireless
2003. San Diego, California. pp. 177- 189. Mesh Networks”, Proceedings of IETE
Technical Review, Vol. 27, Issue 1, Jan-Feb.
9. Huang D (2008), “Unlinkability Measure for
IEEE 802.11 Based MANETs”, IEEE Trans. 18. Sai Ji, Liping Huang and Jin Wang (2013),
Wireless Comm., Vol. 7, No. 3, pp. 1025- “A Distributed and Energy-efficient Clustering
1034. Method for Hierarchical Wireless Sensor
Networks”, International Journal of Future
10. Kannhavong B, Nakayama H, Nemoto Y,
Generation Communication and Networking,
Kato N, and Jamalipour A (2007), “A Survey
Vol. 6, No. 2, April.
of routing attacks in mobile ad hoc networks”,
IEEE Wireless Communications, p. 86. 19. Vazifehdan J, Prasad R, and Niemegeers I
(2011), “Minimum Battery Cost Reliable
11. Krause A, Rajagopal R, Gupta A, and
Routing in Ad Hoc Wireless Networks,” Proc.
Guestrin C (2009), “Simultaneous placement
Eighth IEEE Consumer Comm. and
and scheduling of sensors,” in Proc. Int.
Networking Conf., Jan. 2011.
Conf. IPSN, 2009, pp. 181–192.
20. Wang Q, Hempstead M, and Yang W
12. Liaskovitis P and Schurgers C (2009),
(2006), “A Realistic Power Consumption
“Energy Consumption of Multi- Hop Wireless
Model for Wireless Sensor Network
Networks under Throughput Constraints and
Devices,” Proc. Third Ann. IEEE Comm.
Range Scaling,” Mobile Computing and
Soc. Sensor and Ad Hoc Comm. and
Comm. Rev., Vol. 13, No. 3, pp. 1-13.

This article can be downloaded from http://www.ijerst.com/International-Conference-on-ICARSM-2015.php#1


113
Int. J. Engg. Res. & Sci. & Tech. 2015 P Kavin et al., 2015

Networks (SECON ’06), pp. 286-295, Sept. sensor networks,” Mobile Netw. Appl., vol.
10, pp. 837–852, Dec. 2005.
21. Wexler J (2004), “All About Wi-Fi Location
Tracking,” Network World, http:// 23. Wu J and Yang S (2007), “Optimal
features.techworld.com/mobile-wireless/ movement-assisted sensor deployment and
2374/all-about- wi-fi-location-tracking/. its extensions in wireless sensor networks,”
Simul. Model. Pract. Theory, Vol. 15, No. 4,
22. K. Wu, Y. Gao, F. Li, and Y. Xiao, “Lightweight
pp. 383–399.
deployment-aware scheduling for wireless

This article can be downloaded from http://www.ijerst.com/International-Conference-on-ICARSM-2015.php#1


114

You might also like