By-Passing Infected Areas in Wireless Sensor Networks using Voting Based Routing Protocol
Journal Title: International Journal for Research in Applied Science and Engineering Technology (IJRASET) - Year 2015, Vol 3, Issue 6
Abstract
Wireless Sensor Network have been the front line innovation in different remote occasion observing applications, particularly in unsafe zones , threatening situations, battlefields and commercial applications such as building, traffic surveillance, habitat monitoring and smart homes and many more scenarios. Security is One of the major challenges wireless sensor networks facing today.The sensed data in Wireless Sensor Network is abnormalised due to to several attacks, hardware failure and software corruption would cause infected node . these infected nodes will reduce the whole functionality of the network operation and also produce the faulty data consequently this leads to misleading of the packets ,incorrect decision making and false analysis in real time applications. Although several existing methods BOUNDHOLE ,GAR, TWIN ROLLING BALL algorithms are used to avoid these problems but their performance are bounded by their limitations. While transmitting the packet the void problem can also occur that makes the packet unreachable towards the destination. This becomes challenge to avoid routing problem in Greedy routing protocol. Especially the active attacks would decrease the Qos parameters of the System , this paper mainly focuses on the identification of the malicious node using WTE method and avoiding them. Hence this paper will give give solution by adapting Voting based Routing protocol that identifies the malicious node and bypasses the incoming traffic to uninfected region which is also a reliable path . Thus the Performance of the System enhances than the exisiting method , We are also concerned about the packets on the fly that may affect when problem occurs. Besides solving these problems , the proposed method has greatly improved the studied Qos parameters and decrease the energy consumption of the whole system.
Authors and Affiliations
Srinidhi Priyanka T G, Kushalatha M R
Design and Development of Tuned Vibration Absorber to Control Vibrations of Stirrer Machine
Stirrer machines are found large applications in the chemical / paint industries for the homogeneous mixing of chemicals. The vertical spindle of the stirrer on which the cutter mounted is used to stirrer the highly vis...
Analysis of Self Supported Steel Chimney
From the last few decades the construction of tall stacks increases due to increase in air pollution. Here in this paper, the “Self supporting steel chimney” of height 60m was considered and analysed for the prevailing...
Implementation Issues in Bluetooth Based Smart Sensor Network
In this paper we focus on wireless sensor networks and Bluetooth issues related to its use in sensor networks. An implementation platform for a Bluetooth based sensor network is presented and functionalities are describ...
Recent Trends in Face Recognition
With the advances in information technology coupled with the need for high security, the application of biometric as identification and recognition process has received special attention. The biometric authentication sy...
A New Approach to Detect and Recognize Face Using MSCR and Skin Color and Comparison with Knowledge, Text, and Edge based Techniques
The Important role in various biometrics applications is face detection in face processing system. Various colors, brightness and pose they used in face detection are illuminization condition is very chhallanging task....