1,702 Hits in 9.7 sec

Tour Planning Mechanism Using CLR Method to Achieve Reliability Control in WSN

2017 International Journal of Science and Research (IJSR)  
In this proposed research, by introducing mobility into the network, a new data-gathering mechanism for large-scale wireless sensor networks is proposed.  ...  Later MDCN collects the data from the sensor node directly in a single-hope communications and finally transports all the collected data to static sink node.  ...  Introduction A new data-gathering mechanism is introduced in large scale wireless sensor network. M-collector which means a mobile data collector could be a robot.  ... 
doi:10.21275/art20175378 fatcat:yz64rmhbzfa35kopepjuygwz34

Energy Efficient Trust Node Based Routing Protocol (EETRP) to Maximize the Lifetime of Wireless Sensor Networks in Plateaus

Nandoori Srikanth, Muktyala Sivaganga Prasad
2019 International Journal of Online and Biomedical Engineering (iJOE)  
Introducing of mobile nodes in clusters is a traditional approach, to assemble the data from sensor nodes and forward to the Base station.  ...  The energy of mobile nodes, and sensor nodes can save up to a great extent by collecting data from trusted nodes based on their trustworthiness and energy efficiency.  ...  A secure mobile data collector is introduced in clusters to collect the data from cluster head, and forward to the base station.  ... 
doi:10.3991/ijoe.v15i06.10340 fatcat:an7ie4y265clfmk7g7ukefjulm

Edge Computing through Virtual Force for Detecting Trustworthy Values

Dr. Dhaya R., Dr. Kanthavel R.
2020 IRO Journal on Sustainable Wireless Systems  
This data is gathered from the sensors with the help of mobile edge data collector.  ...  However, due to advancement in cybercrimes, there is a possibility that the data collected through the sensor networks are vulnerable to attacks which may result in serious consequences.  ...  In general, the data that is gathered by the wireless sensor networks are the base for IoT applications and system.  ... 
doi:10.36548/jsws.2020.2.004 fatcat:4r2w4qraljg3ppopmeffxflal4


2013 Graduate Research in Engineering and Technology  
A special node called mobile data collector (MDC) is used to collect the data from the CH and transfer it to the base station (BS) By using proposed method MDC authenticated to CH by computing shared secret  ...  To improve the lifetime of the network, nodes are organized into clusters, in which the cluster head (CH) collects and aggregates the data.  ...  Realizing the inadequacy of existing time synchronization solutions, we develop schemes for achieving secure time synchronization using mobile data collectors in clustered wireless sensor network.  ... 
doi:10.47893/gret.2013.1023 fatcat:iapsqpx4bvetre3odcolzspjfe

Data Gathering Mechanisms with Multiple Mobile Collectors in Wireless Sensor Network

Ramarajan C, Ajitha P
2014 IOSR Journal of Computer Engineering  
Introduced a new data-gathering mechanism for largescale wireless sensor network by introducing mobility into the network.  ...  It directly collects data from the sensor in single-hop communications, and finally transports the data to the static sink.  ...  CONCLUSION & FUTURE WORK In this paper, we studied mobile data collection in wireless sensor networks by researching the tradeoff between the relay hop count of sensors for local data aggregation and the  ... 
doi:10.9790/0661-16190105 fatcat:riqjrnvesjfzxf24vsvuxastwm

Wireless Sensor Networks for Big Data Systems

Beom-Su Kim, Ki-Il Kim, Babar Shah, Francis Chow, Kyong Kim
2019 Sensors  
Among many feasible data sources, wireless sensor networks (WSNs) are rich big data sources: a large amount of data is generated by various sensor nodes in large-scale networks.  ...  However, unlike typical wireless networks, WSNs have serious deficiencies in terms of data reliability and communication owing to the limited capabilities of the nodes.  ...  [20] classified big data challenges in wireless sensor networks into clustering, securing, processing, and energy saving.  ... 
doi:10.3390/s19071565 fatcat:punchof2rjbbva3s6ngil6dd6i

Energy Efficient Mobile Data Collection in Three Layered Wireless Sensor Networks

Riyadh Rahef Nuiaa
2018 Journal of Education College Wasit University  
In this paper we proposed a three-layered approach that is used to collect data in wireless sensor network.  ...  The three layers include sensor layer which is made up of collection of sensors, cluster head layer which is made up of all cluster heads, and the mobile collector layer.  ...  The CH is responsible to get data from sensors. The mobile collector is used to collect data from CH and send the data to sink of the network.  ... 
doi:10.31185/eduj.vol1.iss25.131 fatcat:kvcr7cw4ovgafar5tx4xwubfey

Efficient Algorithms to Improve the Performance of Wireless Sensors Network using Multi-sink and Mobile Sink

Alga Baby, Jeyalakshmi. I
2014 International Journal of Computer Applications  
Wireless sensors are the emerging area in networking. Wireless sensors consist of numerous sensors deployed in network.  ...  Multiple sinks are used in the network will help to reduce the energy consumption of sensors.  ...  Security is a main issue facing in wireless sensor networks. Sensors are collecting data which may get away by the intruders. So sensors must need security.  ... 
doi:10.5120/15309-3961 fatcat:j65tzhoz4beptfhxe4q3nqg6xi

Enhanced Security for Wireless Sensor Networks Using Smart Mobile Agents

A. Vijayalakshmi, T. G. Palanivelu
2016 Indian Journal of Science and Technology  
Objectives: To enhance wireless sensor network security by selecting secure nodes for transmission and eliminating threat nodes from the routing path using Mobile Agent (MA) deployment.  ...  Methods: Smart Mobile Agents (SMAs) executes three different functionalities such as data gathering, transmission, and behavior monitoring, each of which is incorporated to Mobile Collector, Dispatcher  ...  Enhanced Security for Wireless Sensor Networks Using Smart Mobile Agents Conclusion The proposed wireless sensor network with smart mobile agents such as Mobile Collector Agent, Dispatcher and scrutinizing  ... 
doi:10.17485/ijst/2016/v9i35/101813 fatcat:fcmp3x5kxjb2bhnzldnsigfp3u


C.Siddaiah .
2015 International Journal of Research in Engineering and Technology  
This new data gathering apparatus for great scale wireless sensor networks by putting into use for first time readiness to move into the network.  ...  Wireless Sensor Network is a group of sensors it will collect the information from the environment and it will forward through relay communication.  ...  Fig. 1 : 1 Fig.1: Integrate wireless sensor network as one of application into mobile network.  ... 
doi:10.15623/ijret.2015.0414006 fatcat:sasvaxj76zbqtmavv2kgnfodpa

Swift and Energy Efficient Big Data Gathering Approaches in Wireless Sensor Networks

T. Sujithra, R. Venkatesan
2016 International Journal of Computer Applications  
As a mobile element collects the data from every sensor node, the length of the mobile element tour will be increased. It results in increased data gathering latency.  ...  It directly collects the data from the sensors in the sensing environment via single-hop communication when traversing its transmission range and eventually delivers the collected data to the remote central  ...  Energy efficiency plays a pivotal role in wireless sensor network as it affects the lifetime of the sensor networks.  ... 
doi:10.5120/ijca2016908947 fatcat:dmzh6afimre4pizhlu6tuauvf4

Intelligent mobile agents collaboration for the performance enhancement in wireless sensor networks

A. Vijayalakshmi, T.G. Palanivelu
2017 International Journal of Signal and Imaging Systems Engineering  
As the network is open to all other devices, incorporating security becomes a challenging task for the resource-constrained wireless sensor networks.  ...  We define an intelligent mobile agent (IMA)-based security optimisation in which different agents govern the network performance such as routing, security check and transmission.  ...  Intelligent mobile agents in wireless sensor networks Our methodology aimed to provide security against cloning and sink hole attacks using mobile agents.  ... 
doi:10.1504/ijsise.2017.084573 fatcat:2tlkji5lazgjxhppw3e6vnbgqa

Clone Attack Detection in MWSN Using Neighbor Node Information

2016 International Journal of Science and Research (IJSR)  
This problem has also been arising in clusters in which clusters replicate and the main problem arises when cluster head replicate.  ...  Various types of attacks occurred in WSN network. Attack occur in WSN is clone attack which is also known as replica attack.  ...  in Mobile Data Collector Based Routing Protocol" describes Mobile Wireless Sensor Network device to a destination node.  ... 
doi:10.21275/v5i2.nov161428 fatcat:jmaidmbxifeodfcp2j77gcsmka

Enhance QoS of Lossy Wireless Sensor Network by In-Network Data Aggregation

2015 International Journal of Science and Research (IJSR)  
In lossy wireless sensor network, packet loss due to buffer overflow of sensor nodes and the delay caused due to retransmission of that lost packet is a major problem.  ...  Also congestion at collector node due to duplicate sensed data in network is reduced by data aggregation, for this we compute a function at the collector node from the information gathered by spatially  ...  And effect of all these is overall improved QoS of wireless sensor network. In future we will try to check security of the network and data.  ... 
doi:10.21275/v4i11.nov151378 fatcat:5hp3q3fuojb47nrr6tlap5py6i

Detection and Avoidance of Clone Attack in WSN Using Neighbor Witness Node

2016 International Journal of Science and Research (IJSR)  
Wireless sensor networks are of main two types, which are static wireless sensor nodes and mobility wireless sensor networks. In MWSNs the main threat in the network is security.  ...  Wireless sensor nodes has been used for the sensing the information from harsh environment.  ...  Wireless sensor networks are of main two types, which are static wireless sensor nodes and mobility wireless sensor networks. In MWSNs t5he main threat in the network is security.  ... 
doi:10.21275/v5i1.nov152684 fatcat:ltby2sjoujfsfnftrkkmfnd52a
« Previous Showing results 1 — 15 out of 1,702 results