Packet Hiding Methods for Preventing Selective Jamming Attacks

Abstract

 Coverage and energy conservation are two major issues in wireless sensor networks (WSNs), especially when sensors are randomly deployed in large areas. In such WSNs, sensors are equipped with limited lifetime batteries and redundantly cover the target area. To face the short lifetime of the WSN, the objective is to optimize energy consumption while maintaining the full sensing coverage. A major technique to save the energy is to use a wake-up scheduling protocol through which some nodes stay active whereas the others enter sleep state so as to conserve their energy. This study presents an original algorithm for node Self scheduling to decide which ones have to switch to the sleep state. The novelty is to take into account the remaining energy at every node in the decision of turning off redundant nodes. Hence, the node with a low remaining energy has priority over its neighbors to enter sleep state. The decision is based on a local neighborhood knowledge that minimizes the algorithm overhead. To verify and evaluate the proposed algorithm, simulations have been conducted and have shown that it can contribute to extend the network lifetime. A comparison with existing works is also presented and the performance gains are highlighted.

Authors and Affiliations

Vani. S

Keywords

Related Articles

 SOLAR PANEL MODELING AN ANALYSIS WITH DIFFERENT TEMPERATURE AND SOLAR IRRADIATION POWER

 Solar panel is becomes an emerging topic foe the renewable energy world. The effective utilization of the solar panel and the constant power for small system to big energy system is required. The simulation and mo...

 Investigation of Structural Properties of Gradient -Porosity Porous Silicon Layer Produced by Laser- Assisted Etching

 Laser-assisted etching process with a step-gradient illumination intensity of 630nm laser wavelength was conducted to produce high porosity and minimum thickness of gradient – porosity porous silicon layer (GPSi)....

 EMBEDDED SYSTEMS FOR IRIS RECOGNITION

 Iris Recognition increasingly used method of biometric authentication that involves pattern-recognition techniques of images of irides to uniquely identify a person. In this paper, IRIS biometrics has been chosen...

 THE STRUCTURAL MODEL FOR EVALUATING THE ROLE OF LOCAL GOVERNMENT IN CULINARY TOURISM

 This paper aimed to study the effects of local government role in developing culinary tourism sustainability. By choosing Kedonganan Beach, one of two famous culinary destination at Bali – Indonesia, two types of...

 Content Protection through Reversible Watermarking Technique

 This paper proposes a steganalysis scheme for detecting reversible contrast mapping (RCM) watermarking. Lossless data hiding is a technique that used to embed secret message into media for generating the stego ima...

Download PDF file
  • EP ID EP117410
  • DOI -
  • Views 65
  • Downloads 0

How To Cite

Vani. S (30).  Packet Hiding Methods for Preventing Selective Jamming Attacks. International Journal of Engineering Sciences & Research Technology, 2(4), 1013-1021. https://europub.co.uk/articles/-A-117410