Performance Analysis of Cluster Based Dual Tired Network Model with INTK Security Scheme in a Wireless Sensor Network
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 32769
Performance Analysis of Cluster Based Dual Tired Network Model with INTK Security Scheme in a Wireless Sensor Network

Authors: D. Satish Kumar, S. Karthik

Abstract:

A dual tiered network model is designed to overcome the problem of energy alert and fault tolerance. This model minimizes the delay time and overcome failure of links. Performance analysis of the dual tiered network model is studied in this paper where the CA and LS schemes are compared with DEO optimal. We then evaluate  the Integrated Network Topological Control and Key Management (INTK) Schemes, which was proposed to add security features of the wireless sensor networks. Clustering efficiency, level of protections, the time complexity is some of the parameters of INTK scheme that were analyzed. We then evaluate the Cluster based Energy Competent n-coverage scheme (CEC n-coverage scheme) to ensure area coverage for wireless sensor networks.

Keywords: CEC n-coverage scheme, Clustering efficiency, Dual tired network, Wireless sensor networks.

Digital Object Identifier (DOI): doi.org/10.5281/zenodo.1337405

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1623

References:


[1] D. Satish Kumar & N. Nagarajan "Relay technologies and Technical Issues in IEEE 802.16j Mobile Multi-Hop Relay (MMR) Networks " Journal of Network and Computer Applications, Vol. 36, No. -, pp. 91–102, 2013.
[2] D. Satish Kumar & N. Nagarajan, "Energy Conserved Fault Tolerance Relay Nodes In Wireless Network”, International Journal of Ambient Computing and Intelligence.
[3] D. Satish Kumar & N. Nagarajan, "Integrated Network Topological Control and Key Management for Secured Wireless Sensor Network ”, International Journal of Ambient Computing and Intelligence.
[4] D. Satish Kumar & N. Nagarajan, "Cluster Based Energy Efficient and Fault Tolerant N-Coverage in Wireless Sensor Network”, World Academy of Science, Engineering and Technology International Journal of Computer, Information Science and Engineering Vol. 7 No. 11, pp 643-649, 2013
[5] Suat Ozdemir., Yang Xiao., "Secure data aggregation in wireless sensor networks: A comprehensive overview,” Computer Networks Elsevier Journal., 2009
[6] Xue Wang., Junjie Ma., Sheng Wang, and Daowei Bi., "Distributed Energy Optimization for Target Tracking in Wireless Sensor Networks,” IEEE Transactions on Mobile Computing, Vol. 9, No. 1, January 2009
[7] Gaurav S. Kasbekar., Yigal Bejerano., and Saswati Sarkar., "Lifetime and Coverage Guarantees through Distributed Coordinate-Free Sensor Activation,” IEEE/ACM Transactions on Networking, Vol. 19, No. 2, April 2011
[8] Cunqing Hua. And Tak-Shing Peter Yum. "Optimal Routing and Data Aggregation for Maximizing Lifetime of Wireless Sensor Networks,” IEEE/ACM Transactions on Networking, Vol. 16, No. 4, August 2008
[9] Srikanth Hariharan., Ness B. Shroff., Saurabh Bagchi., "Secure neighbor discovery through overhearing in static multihop wireless networks,” Computer Networks., Elsevier journal. 2011
[10] Wei Wang, Xin Liu, and Dilip Krishnaswamy, "Robust Routing and Scheduling in Wireless Mesh Networks under Dynamic Traffic Conditions” IEEE Transaction on Mobile Computing, Vol. 8, No. 12, December 2009.
[11] Musab Ahmad AL-Tarawni Dr. Mohd. Yusoff Jamaluddin "Trusted Route of Spatial Disjoint Multipath Routing Over MANET” International Journal of Applied Science and Technology Vol. 3 No. 4; April 2013.
[12] Lei Ying, Sanjay Shakkottai, Aneesh Reddy, and Shihuan Liu, "On Combining Shortest-Path and Back-Pressure Routing Over Multihop Wireless Networks, ” IEEE/ACM Transactions on Networking, Vol. 19, No. 3, June 2011
[13] Kanika pasrija, Ashok, Seema rani " Shortest Path Routing Over Scalable Mobile Ad Hoc Networks” International Journal of Advanced Research in Computer Science and Software Engineering, Volume 3, Issue 9, September 2013
[14] Stella Kafetzoglou, Symeon Papavassiliou "Energy-efficient framework for data gathering in wireless sensor networks via the combination of sleeping MAC and data aggregation strategies”, International Journal of Sensor Networks, Vol.10, No.1/2, pp. 3 - 13 2011
[15] Sai Ji, Liping Huang and Jin Wang "A Novel Key Management Scheme Supporting Network Dynamic Update in Wireless Sensor Network” International Journal of Grid and Distributed Computing Vol. 6, No. 1, February, 2013
[16] S. Ganesh, R. Amutha "Efficient and Secure Routing Protocol for Wireless Sensor Networks through SNR based Dynamic Clustering Mechanisms” IEEE transaction on Communications and Networks (Volume: 15, Issue: 4) Aug. 2013
[17] Khan, E. ; Gabidulin, E. ; Honary, B. ; Ahmed, H. "Matrix-based memory efficient symmetric key generation and pre-distribution scheme for wireless sensor networks, ” IEEE Transaction on Wireless Sensor Systems, (Volume:2, Issue: 2 ) June 2012
[18] J. Dhananandhini, C.M. Niranjana, K. Rajeshwari. H, R. Karthick"Detecting Sensor Node Failure and Node Scheduling Scheme for WSN” International Journal of Engineering Research and Development, Volume 9, Issue 2 (November 2013), PP. 53-56
[19] Jelicic, V., Magno, M. ; Brunelli, D. ; Paci, G. "Context-Adaptive Multimodal Wireless Sensor Network for Energy-Efficient Gas Monitoring” IEEE Transaction journal on sensor (Volume:13, Issue: 1) Jan. 2013
[20] Lee, J. -W. ; Daejeon, Korea; Ju-Jang Lee "Ant-Colony-Based Scheduling Algorithm for Energy-Efficient Coverage of WSN” IEEE Transaction on sensor journal Volume: 12, Issue: 10) Oct. 2012
[21] S. Bharath Kumar and C. Mayilsamy "Ant-Colony-based Algorithm for Multi-Target Tracking in Mobile Sensor Networks” International Journal of Computer Applications (0975 – 8887) Volume 64– No.2, February 2013
[22] Adamu Murtala Zungeru, n, Li-MinnAng, KahPhooiSeng "Classical and swarm intelligence based routing protocols for wireless sensor networks: A survey and comparison” Journal of Network and Computer Applications, Elsevier Journal, 2012.
[23] M. Umlauft and P. Reichl, "Experiences with the NS-2 Network Simulator- Explicitly Setting Seeds Considered Harmful,” in the Wireless Telecommunications Symposium, WTS 2007, April 2007, pp. 1–5.