Packet Hiding Methods for Preventing Selective Jamming Attacks

Abstract

 Coverage and energy conservation are two major issues in wireless sensor networks (WSNs), especially when sensors are randomly deployed in large areas. In such WSNs, sensors are equipped with limited lifetime batteries and redundantly cover the target area. To face the short lifetime of the WSN, the objective is to optimize energy consumption while maintaining the full sensing coverage. A major technique to save the energy is to use a wake-up scheduling protocol through which some nodes stay active whereas the others enter sleep state so as to conserve their energy. This study presents an original algorithm for node Self scheduling to decide which ones have to switch to the sleep state. The novelty is to take into account the remaining energy at every node in the decision of turning off redundant nodes. Hence, the node with a low remaining energy has priority over its neighbors to enter sleep state. The decision is based on a local neighborhood knowledge that minimizes the algorithm overhead. To verify and evaluate the proposed algorithm, simulations have been conducted and have shown that it can contribute to extend the network lifetime. A comparison with existing works is also presented and the performance gains are highlighted.

Authors and Affiliations

Vani. S

Keywords

Related Articles

PERFORMANCE ANALYSIS OFADAPTIVE MULTIPLE QUEUING DISCIPLINES (AMQD) FORVOIPROUTING IN RANDOM WAY POINT MOBILITY MODEL OVER MANET SCENARIO

In Mobile Ad hoc Network (MANET), QOS (Quality of Services) in VOIP application plays anextremelysignificantresponsibility. Queuing disciplinesis anissue of concentratedconversation and research in the wireless network...

 MECHANICAL PROPERTIES OF ULTRHIGH PERFORMANCE FIBER REINFORCED CONCRETE

 Ultrahigh performance fiber reinforced concrete (UHPFRC), as a new class of concrete, has attracted a lot of attention in recent years. This type of concrete with a compressive strength of more than 150 MPa, h...

EFFECTS OF SORGHUM ADDITION ON THE PROPERTIES OF WATER BASED DRILLING FLUIDS

This research paper covers the effect of powder corn stalks (“Sorghum”) in improving theproperties of the drilling fluid (apparentviscosity, Plasticviscosity , yield point, Gel Strength and Filtration loss) wi...

 Human Identification Using Palm-Vein Images Using Gabor Filter and Lalplacian Palm

 Palm vein authentication is one of the modern biometric techniques, which employs the vein pattern in the human palm to verify the person. The merits of palm vein on classical biometric (e.g. fingerprint, iris, fa...

 Efficient iris Recognition System to Improve Performance Measure for live videos

 Iris recognition is regarded as the most reliable and accurate biometric identification system available. Iris substantiation is one of the most successful applications in video analysis and image processing. In t...

Download PDF file
  • EP ID EP117410
  • DOI -
  • Views 86
  • Downloads 0

How To Cite

Vani. S (30).  Packet Hiding Methods for Preventing Selective Jamming Attacks. International Journal of Engineering Sciences & Research Technology, 2(4), 1013-1021. https://europub.co.uk/articles/-A-117410