A Swarm Based Approach to Detect Hole In Wireless Sensor Network

Abstract

A Sensor network is a network with large number of sensors in it. The broadcasting and the  multicasting are the major communication approaches used in such network to distribute some information over the network or the network part. Because of this the congestion over the network increases. A congested network is the reason of different securities flaws over the network. One of such flaw is the hole over the network; the hole can be because of low energy node or because of some selfish node or black hole attack. In this present work we have defined a Swarm Based Intelligent approach to perform the reliable packet delivery over the network. Here we have defined an intelligent decision approach to select the next node based on load and response time. The work is about to improve the network throughput as some bad node or the hole occur over the network. The swarm based approach will do the analysis based on the neighboring nodes and will select the effective path for the communication.

Authors and Affiliations

Nidhi , Mrs. Pooja Mittal

Keywords

Related Articles

FUZZY NEURAL NETWORKS

This paper comparator networks - a well-known model of parallel computation. This model is used extensively for keys arrangement tasks such as sorting and selection. This work investigates several aspects of comparator n...

 AN ADAPTIVE FUZZY SYSTEM IN LARGE SCALE MOBILE AD HOC NETWORKS

 Multicast protocols in MANETs must consider control overhead for maintenance, energy efficiency of nodes and routing trees managements to frequent changes of network topology. Now-adays Multicast protocols exte...

SECURITY THREATS IN WIRELESS SENSOR NETWORKS

Wireless Sensor Network (WSN) is an emerging technology that shows great promise for various futuristic applications both for mass public and military. The sensing technology combined with processing power and wireless...

The comparison of Virtual Machine Migration Performance between XEN-HVM, XEN-PV, Open-VZ, KVM-FV, KVMPV

Based on our previous experience we want to compare the performance between five hypervisors: XEN-PV, XENHVM,Open-VZ,KVM-FV,KVM-PV We have simulated the migration of a virtual machine by using a warning failure approach....

DISASTER RECOVERY OF DATA BY USING DATA GUARD

Oracle Data Guard is the management, monitoring, and automation software infrastructure that creates, maintains, and monitors one or more standby databases to protect enterprise data from failures, disasters, errors, and...

Download PDF file
  • EP ID EP119865
  • DOI -
  • Views 109
  • Downloads 0

How To Cite

Nidhi, Mrs. Pooja Mittal (2012). A Swarm Based Approach to Detect Hole In Wireless Sensor Network. International Journal of Computer Science and Management Studies (IJCSMS) www.ijcsms.com, 12(3), 65-70. https://europub.co.uk/articles/-A-119865