A Distributed Algorithm for identifying failures in WSN
Journal Title: International Journal of Research in Computer and Communication Technology - Year 2013, Vol 2, Issue 11
Abstract
A wireless sensor network is a technology for monitoring physical or environmental conditions such as temperature, pressure, sound etc. A WSN can get separated into multiple connected sensors. But some nodes may fail because of mechanical, electrical problems, environmental degradation, battery depletion, or hostile tampering, which is called a “CUT”. The problem of detecting cuts by the neighboring nodes of a wireless sensor network. The proposed algorithm will achieve (i) every node to detect when the connectivity to a specially designated node has been lost (ii) one or more nodes to detect the occurrence of the cut. The algorithm is distributed and asynchronous: every node needs to communicate with only those that are within its communication range. The algorithm is based on iterative computation of a fictitious “electrical potential” of the nodes. The convergence rate of the underlying iterative scheme is independent of the size and structure of the network.
Authors and Affiliations
V. U. V. Ratna Mala, B. Sowjanya Rani
An Efficient and Effective Ranking On Spatial Data By Quality Preferences
A spatial database is database that is optimized to gather and query the information that is linked to objects in space and a spatial preference query objects are based on the qualities of their spatial area. A huge...
HFRECCA : A New Sentence Clustering Technique For Text Mining
Clustering is the process of grouping or aggregating of data items. Sentence clustering mainly used in variety of applications such as classify and categorization of documents, automatic summary generation, organizing...
Elimination Of Repeated Data Copies With Enhanced Security In Hcloud
Intending at economically solving the trouble of deduplication with discrepancy privileges in cloud computing we regard as a hybrid cloud structural design consisting of a public cloud and a private cloud. Dissimilar...
Effective Keyword Search on XML data- Using FMADM
Efficient state of the art query retrieval systems are implemented over RDBMS databases but not for XML based storages. Fuzzy type-ahead search, though not a new concept for RDBMS based systems, it is a new informati...
A Protective Scheme To Prevent The Attacker From Forging Acknowledgment Packets In Manets’s Using Eaack
Amongst all the modern wireless networks Mobile Ad hoc network (MANET) is one of the most significant and exclusive applications. MANET does not necessitate a fixed network infrastructure every single node works as b...