Professional Documents
Culture Documents
, 2015
The sensing capabilities of networked sensors are affected by environmental factors in real
deployment and it is imperative to have practical considerations at the design stage in order to
anticipate this sensing behaviour. We propose a new metric, the drain rate, to forecast the
lifetime of nodes according to current traffic conditions. This metric is combined with the value
of the remaining battery capacity to determine which nodes can be part of an active route. The
existent security threats an adhoc network faces, the security services required to be achieved
and the countermeasures for attacks in routing protocols. The authorized nodes keep sending
Request-to- Send (RTS) frames to the access point node in order to access to shared medium
and start data transfer. We develop energy consumption models that take into account energy
consumption due to data packets, control packets and retransmission.
1
Sasurie College of Engineering, Tamil Nadu.
of paths, while CMDR also minimizes the total adversary to accurately discover the traffic pattern
transmission energy consumed per packet. despite the use of these elegant schemes. One
Combined with the value of the remaining battery assumes constant rates and the other assumes
capacity, this metric is used to establish whether an arbitrary process. A shortest cost path routing
or not a node can be part of an active route. algorithm is proposed which uses link costs that
reflect both the communication energy
RELATED WORKS consumption rates and the residual energy levels
The probabilistic approach is a deviation from the at the two end nodes. To estimate unicast link
idealistic assumption of uniform circular disc for quality based on that of broadcast. It is, however,
sensing coverage used in the binary detection difficult to precisely estimate unicast link quality
model. Along this guide path, data packets are via that of broadcast, because temporal
greedily progressed toward the destination correlations of link quality assume complex
through nodes’ cooperation without utilizing the patterns and are hard to model.
location information. The proposed flip flop has
small area, power and delay overheads and good TRAFFIC ANALYSIS
radiation hardening capabilities. A multiplexer is Traffic analysis is the process of intercepting and
used to select the correct value as final output collecting messages on the way to track important
according to the fault indication signal. The information from patterns in communication. That
shortcut tree routing(STR) protocol that provides information is not leaking or not modified just do
the near optimal routing path as well as maintains monitoring and analysis activities. It can get
the advantages of the ZigBee tree routing such information from the monitor frequency and timing
as no route discovery overhead and low memory packets. In evidence-based statistical traffic
consumption. The Independent basic service set analysis model, every captured packet is treated
is used in this research that has no backbone as evidence supporting a point-to-point (one-hop)
infrastructure and consists of at least two wireless transmission between the sender and the
stations. Theoretical analysis shows that HS can receiver. A sequence of point-to-point traffic
spread a given number of message copies in an matrices is created, and then they are used to
optimal way when the inter-meeting time between derive end- to-end (multihop) relations. This
any two nodes and between a node and a approach provides a practical attacking
community home follows independent and framework against Mobile Wireless Network but
identical exponential distributions, respectively. still leaves substantial information about the
Data delivery source routing by multilayer communication patterns undiscovered. Statistical
encryptions or end-to-end re-encryptions by a traffic analysis attacks have attracted broad
virtual circuit. Regardless of their implementation interests due to their passive nature, i.e., attackers
details, these schemes all aim to hide real packet only need to collect information and perform
sources and destinations in both route discovery analysis quietly without changing the network
and packet forwarding from a limited number of behaviour. The predecessor attacks and
local and internal attackers. In this paper, we disclosure attacks are two representatives.
show that it is feasible for a passive global However, all these previous approaches do not
work well to analyse traffic because of the Figure 1: Data Transmission using Gateways
following three natures of Mobile Wireless
Network:
communication peers, which make the 8: X = Sensor nodes sorted in ascending order of number
of targets it covers
communication relations among mobile nodes
9: for i =1 to m do
more complex.
10: repeat
Sensor Deployment 11: Place Xi at the center of all targets it covers
First we use a heuristic to compute the 12: Move Xi to the center of all targets it covers and its next
nearest target
deployment locations. A heuristic is then used to
13: if Xi can cover a new target then
schedule the sensor nodes such that the network
14: Recompute sensor-target matrix
lifetime is maximum.
15:else
Sensor Deployment Approach 16: Discard move
5: Recompute sensor node such that the upper bound of PROTOCOL TECHNIQUES
network lifetime is maximum
A. Sleep Protocol
6: Design sensor schedule using the proposed heuristic for
sensor scheduling such that the network lifetime upper Sleep protocol mainly helps to getting the node
bound is achieved
energy value has becomes too compared to
The above graph symbolizes the average is increased in the suggested approach than that
energy consumed for packet data transmission of the prevailing systems.
within the total group of nodes. A Typical Throughput value denotes that the efficiency
Transmission and Projected Transmission are has improved as the delay is reduced. The output
compared here. From the simulation results it is signal shows the ratio of source value to the
clear that the energy consumption is reduced in received value. From the simulation results (Fig
the proposed approach than that of the prevailing .5) it is evident that the overall throughput is
system. increased in the proposed approach than that of
the prevailing systems.
Figure 4: Packet Delivery Ratio in Transmission
CONCLUSION
Conversely, the implementation of such
mechanisms does not only mitigate the jamming
attack effects, it also increases the overall
performance above the normal state of the
network constraints. Even adhoc networks have
vast potential, still there are many challenges left
to overcome. From the captured packets,
Network constructs a sequence of traffic matrices
to derive the traffic matrix, and then uses a
heuristic data processing model to reveal the
The above graph symbolizes the Packet hidden traffic patterns from the end-to-end matrix.
Delivery Ratio in transmission of packets within
the total group of nodes. From the simulation
REFERENCES
results it is evident that the Packet Delivery Ratio 1. Bartolini N, Calamoneri T, La Porta T, and
Silvestri S (2010), “Mobile sensor
Figure 5: Average Throughput deployment in unknown ûelds,” in Proc. IEEE
of the Proposed System
INFOCOM, Mar., pp. 1–5.
2. Chakeres I and Perkins C (2008), “Dynamic
MANET On-demand (DYMO) Routing
Rrotocol”, IETF Internet Draft, v.15,
November 2008.
3. Chaum D (1988), “The Dining
Cryptographers Problem: Unconditional
Sender and Recipient Untraceability,” J.
Cryptology, Vol. 1, No. 1, pp. 65-75.
4. Cormen T H and Charles C S, Leiserson E,
and Rivets R L (2001), Introduction to
Algorithms, second ed. MIT Press. 13. Li Y and Gao S (2008), “Designing k-
coverage schedules in wireless sensor
5. Dai W (2013), “Two Attacks against a
networks,” J. Combinat. Opt., Vol. 15, No. 2,
PipeNet-Like Protocol Once Used by the
pp. 127–146.
Freedom Service”, http://weidai.com/freedo
mattacks.txt. 14. Liu Y, Zhang R, Shi J, and Zhang Y (2010),
“Traffic Inference in Anonymous MANETs,”
6. Md. Golam Rashed, Hasnat Kabir M, Shaikh
Proc. IEEE Seventh Ann. Comm. Soc. Conf.
Enayet Ullah (2011), “WEP: An Energy
Sensor Mesh and Ad Hoc Comm. and
Efficient Protocol for Cluster based
Networks (SECON ’10), pp. 1-9.
Heterogeneous Wireless Sensor Networks”,
International Journal of Distributed and 15. Nishu Garg and Mahapatra R P (2009),
Parallel Systems (IJDPS), Vol. 2, No. 2. “MANET Security Issues”, IJCSNS
International Journal of Computer Science
7. Gold S (1997), “A Pspice Macromodel for
and Network Security, Vol. 9 No. 8.
Lithium-Ion Batteries,” Proc. 12th Ann.
Battery Conf. Applications and Advances, pp. 16. Perkins C, Royer E and Das S (2001), “Ad
215-222, Jan. 1997. Hoc On Demand Distance Vector (AODV)
Routing”, draft-manet-ietf-aodv-8.txt, IETF,
8. Habib A, Hefeeda M and Bhargava B (2003),
Work in Progress, March.
“Detecting Service Violations and DoS
Attacks”, In The 10th Annual Network and 17. Ping Yi, Yue Wu and Futai Zou and Ning Liu
Distributed System Security Symposium (2010), “A Survey on Security in Wireless
2003. San Diego, California. pp. 177- 189. Mesh Networks”, Proceedings of IETE
Technical Review, Vol. 27, Issue 1, Jan-Feb.
9. Huang D (2008), “Unlinkability Measure for
IEEE 802.11 Based MANETs”, IEEE Trans. 18. Sai Ji, Liping Huang and Jin Wang (2013),
Wireless Comm., Vol. 7, No. 3, pp. 1025- “A Distributed and Energy-efficient Clustering
1034. Method for Hierarchical Wireless Sensor
Networks”, International Journal of Future
10. Kannhavong B, Nakayama H, Nemoto Y,
Generation Communication and Networking,
Kato N, and Jamalipour A (2007), “A Survey
Vol. 6, No. 2, April.
of routing attacks in mobile ad hoc networks”,
IEEE Wireless Communications, p. 86. 19. Vazifehdan J, Prasad R, and Niemegeers I
(2011), “Minimum Battery Cost Reliable
11. Krause A, Rajagopal R, Gupta A, and
Routing in Ad Hoc Wireless Networks,” Proc.
Guestrin C (2009), “Simultaneous placement
Eighth IEEE Consumer Comm. and
and scheduling of sensors,” in Proc. Int.
Networking Conf., Jan. 2011.
Conf. IPSN, 2009, pp. 181–192.
20. Wang Q, Hempstead M, and Yang W
12. Liaskovitis P and Schurgers C (2009),
(2006), “A Realistic Power Consumption
“Energy Consumption of Multi- Hop Wireless
Model for Wireless Sensor Network
Networks under Throughput Constraints and
Devices,” Proc. Third Ann. IEEE Comm.
Range Scaling,” Mobile Computing and
Soc. Sensor and Ad Hoc Comm. and
Comm. Rev., Vol. 13, No. 3, pp. 1-13.
Networks (SECON ’06), pp. 286-295, Sept. sensor networks,” Mobile Netw. Appl., vol.
10, pp. 837–852, Dec. 2005.
21. Wexler J (2004), “All About Wi-Fi Location
Tracking,” Network World, http:// 23. Wu J and Yang S (2007), “Optimal
features.techworld.com/mobile-wireless/ movement-assisted sensor deployment and
2374/all-about- wi-fi-location-tracking/. its extensions in wireless sensor networks,”
Simul. Model. Pract. Theory, Vol. 15, No. 4,
22. K. Wu, Y. Gao, F. Li, and Y. Xiao, “Lightweight
pp. 383–399.
deployment-aware scheduling for wireless