SlideShare ist ein Scribd-Unternehmen logo
1 von 4
Downloaden Sie, um offline zu lesen
100 International Journal for Modern Trends in Science and Technology
Volume: 2 | Issue: 09 | September 2016 | ISSN: 2455-3778IJMTST
Reliable and Efficient Data Acquisition
in Wireless Sensor Network
Harshada Sonawane1
| Prof. Rachana Satao2
1Department of Computer Engineering Computer Network, Smt.Kashibai Navale College of Engineering,
Pune, Maharashtra, India.
2Assistant Professor, Department of Computer Engineering Computer Network, Smt.Kashibai Navale
College of Engineering, Pune, Maharashtra, India.
The sensors in the WSN sense the surrounding, collects the data and transfers the data to the sink node. It
has been observed that the sensor nodes are deactivated or damaged when exposed to certain radiations or
due to energy problems. This damage leads to the temporary isolation of the nodes from the network which
results in the formation of the holes. These holes are dynamic in nature and can grow and shrink depending
upon the factors causing the damage to the sensor nodes. So a solution has been presented in the base paper
where the dual mode i.e. Radio frequency and the Acoustic mode are considered so that the data can be
transferred easily. Based on this a survey has been done where several factors are studied so that the
performance of the system can be increased.
KEYWORDS: Wireless Sensor Network, Sensor deployment, Energy hole problem.
Copyright © 2016 International Journal for Modern Trends in Science and Technology
All rights reserved.
I. INTRODUCTION
WSN is the collection of several nodes which
transfers the data. There are several factors which
affect the performance of the sensor nodes and may
even damage them.As long as there is no damage to
the sensor nodes, it continues to work in the radio
frequency mode, when there occurs the node
failure, the acoustic mode is activated. The data is
then extracted and transferred further. The
elimination of the faulty nodes from the system
cannot be the solution since all the resources and
the services associated with the sensor node can be
used again when they are recovered. It also helps in
increasing the lifetime of a network. Thus the
working of the model in dual mode proves to be
better, since we switch to the other sleeping nodes
and transfer the data through them. Also the range
of the node plays the equal important role while the
data is transferred from one node to the other. The
motivating factors related to this are increasing the
lifetime of the Wireless sensor network using the
fault tolerance and the fault node detection, also
active cooperative communication has to be there
amongst the nodes so that the change in the
topology can be reflected immediately and data can
be sent with minimum delay. The architecture
diagram of the system shown below helps us to
understand the system.
II. LITERATURE SURVEY
The paper presented by the Pushpendu Kar and
Sudip Misra Jan 2016 provides us with the details
of how the dual mode i.e. radio frequency and the
acoustic mode can be implemented for the effective
and efficient data transfer. Also emphasized on the
data extraction process. Due to the proposed
system the data can be sent more efficiently [1].
In the paper presented by Kealan McCusker, Noel
E. O’Connor May/June 2011 a solution for
ABSTRACT
101 International Journal for Modern Trends in Science and Technology
Reliable and Efficient Data Acquisition in Wireless Sensor Network
distributing symmetric keys and network access
control in a WSN using IBC is proposed. The
proposed scheme was evaluated against
well-known attacks on a WSN and found to
perform well. Several groups implement for Tate
pairing in hardware but are targeting the latency
metric and also Field Programmable Gate Arrays
(FPGAs) rather than energy and an ASIC, therefore
these contributions lack over the suggested theory
which is several magnitudes higher than what is
achieved by implementing the pairing in hardware,
and too high for the limited energy available to a
node. Work is needed in order to implement other
components of the scheme such as the elliptic
curve point multiplication and exponentiation in
the field [2].
Cesare Alippi, Giuseppe Anastasi, Mario Di
Francesco, and Manuel Roveri Feb 2011. In this
paper authors proposed an adaptive sampling
algorithm that estimates online the optimal
samplingfrequencies for sensors. This approach,
which requires the designof adaptive measurement
systems, minimizes the energy consumptionof the
sensors and, incidentally, that of the radio while
maintaininga very high accuracy of collected
data.It can perform similar to a fixed-rate scheme
where the samplingfrequency is known in
advance.This approach resultsin a corresponding
energy saving of both the sensor and
theradio.Conclusion strongly depends on the
specific sensor, whosepower consumption is
significantly larger than that of the radio [3].
Levente Buttya´ n, La´ szlo´ Czap, and Istva´n
Vajda Nov/Dec 2011In a pollution attack, the
adversary maliciously alters some of the stored
encoded packets, which results in the incorrect
decoding of a large part of the original data upon
retrieval. Authors proposed algorithms to detect
and recover from such attacks. This paper can be
applied in any coding-based distributed storage
systems, be it in the domain of P2P file distribution
or in wireless sensor networks. In particular, this
approach does not require the storage nodes to
perform additional coding on or to add additional
information to the encoded packets. Proposed
algorithm is effective and extremely efficient both
in terms of communication and computational
overhead. It does not scale up to very large systems
in terms of computational complexity [4].
Ing-Ray Chen, Anh Phan Speer, and Mohamed
Eltoweissy March/April 2011
Authors developed adaptive fault-tolerant quality
of service (QoS) control algorithms based on
hop-by-hop data delivery utilizing “source” and
“path” redundancy, with the goal to satisfy
application QoS requirements while prolonging the
lifetime of the sensor system. Algorithm which
incorporates path and source redundancy
mechanisms to satisfy query QoS requirements
while maximizing the lifetime of query-based
sensor networks. Future work: provide a more
detailed analysis of the effect of network dynamics
on MTTF, such as more energy may be consumed
by some SNs over others or some SNs may fail
earlier than others [5].
Masanori Miyazawa and Michiaki Hayashi Rolf
Stadler2nd Jan, 2015 The paper proposes a
distributed managementfunction, called
virtualized network management function(vNMF),
to detect failures related to virtualized services.
vNMF detects the failures by monitoring
physical-layer statistics that are processed with a
self-organizing map algorithm. Memory leaks and
network congestion failures can be successfully
detected and that and the accuracy of failure
detection can be significantly improved compared
to common k-means clustering. The proposed
vNMF is expected to facilitate scalable network
management toward more complex network
virtualization environments in the future work [6].
Steven S. McClure, L. D. Edmonds, R.
Mihailovich, A. H. Johnston, P. Alonzo, J.
DeNatale, Member, IEEE, J. Lehman, and C. Yui
Dec 2002 A mechanism for dielectric charge
trapping and its effect on the electrostatic force is
proposed. Of notable significance is the
susceptibility of GaAS MEMS devices to radiation
effects, as found in this work. Such effects, if
present, may be eliminated with proper design
techniques, as demonstrated in the alternate RSC
switch configuration. It is strongly recommended
that devices of this type be thoroughly
characterized for radiation effects prior to use in
systems with a space or nuclear radiation
environments. [7].
Erfan Soltanmohammadi, Mahdi Orooji, Mort
Naraghi-Pour Jan 2013 The problem of
decentralized detection in wireless sensor networks
in the presence of one or more classes of
misbehaving nodes. Binary hypothesis testing is
considered where the honest nodes transmit their
binary decisions to the fusion center (FC), while the
misbehaving nodes transmit fictitious messages
the problem of decentralized detection in wireless
sensor networks in the presence of one or more
classes of misbehaving nodes. Binary hypothesis
testing is considered where the honest nodes
transmit their binary decisions to the fusion center
102 International Journal for Modern Trends in Science and Technology
Volume: 2 | Issue: 09 | September 2016 | ISSN: 2455-3778IJMTST
(FC), while the misbehaving nodes transmit
fictitious messages[8].
Tapas Kanungo, David M. Mount, Nathan S.
Netanyahu, Christine D. Piatko, Ruth Silverman,
and Angela Y. Wu July 2002 Proposed in 2 ways:
First, authors present a data-sensitive analysis of
the algorithm's running time, which shows that the
algorithm runs faster as the separation between
clusters increases. Second, a number of empirical
studies both on synthetically generated data and
on real data sets from applications in colour
quantization, data compression, and image
segmentation.A simple and efficient
implementation of Lloyd's k-means clustering
algorithm, which we call the filtering algorithm.
The advantage of this algorithm is it requires a
kd-tree as the only major data structure.This
algorithm is quite complex and does not provide
significantly faster running time in practice [9].
Vibha Paradkar, Gajendra Singh Chandel,
Kailash Patidar,2015 proposes a new routing
algorithm (Master/Slave) for discovery and
recovery of the routing path efficiently. The primary
path, secondary path and the segmentation
process helps to navigate the data from the
non-faulty nodes [10]. Also multipath routing helps
transfer data simultaneously thus by reducing
delay and congestion in the network [12].
Saad Ahmad Khan, Ladislau Bölöni, Damla
Turgut, 2015 the paper proposes a theory where
the bridge nodes are protected by giving some of
the responsibilities of the sink nodes to the other
nodes. It prevents the apparition of the additional
bridge nodes. The disadvantage is that the
algorithm sacrifices the length of some routes in
order to distribute the routes away from the critical
area [11].
Amit Sharma, Kshitij Shinghal, Neelam
Srivastava, Raghuvir Singh, Mar 2011 in this work
analysis of the energy consumption of a WSN node
is analysed with proposed node. With the help of
this the estimated lifetime of the battery can be
increased significantly [14]. It is observed that
sensors are used for forwarding data to sink
directly so as to reduce energy consumption,
packet loss and delay [13].
III. CONCLUSION
Reliable and efficient WSN is the need of the
today’s communication technology and has been
able to capture the attention of several researchers.
The dual mode working of the sensor nodes in the
WSN has been able to reduce the delay. Also the
lifetime is increased by not eliminating the nodes
directly when then go in the isolation state. Energy
of the node being one of the several important
factors, has to be worked upon by monitoring and
with the help of the knowledge acquired by the
survey. It also motivates to consider the mobile
nodes and not just the stationary nodes and we can
improve the computational power by optimal
sensor deployment in wireless sensor network.
REFERENCES
[1] Pushpendu Kar, Student Member, IEEE and Sudip
Misra, Senior Member, IEEE, “Reliable and Efficient
Data Acquisition in Wireless Sensor Networks in the
Presence of Transfaulty Nodes,” IEEE
TRANSACTIONS ON NETWORK AND SERVICE
MANAGEMENT, 8th Jan, 2016.
[2] Kealan McCusker, Noel E. O’Connor, “Low-energy
symmetric key distribution in wireless sensor
networks,” IEEE Transactions on Dependable and
Secure Computing May/June 2011.
[3] Cesare Alippi, Fellow, IEEE, Giuseppe Anastasi,
Mario Di Francesco, and Manuel Roveri, “Adaptive
Sampling Algorithm for Effective Energy
Management in Wireless Sensor Networks With
Energy-Hungry Sensors,” IEEE TRANSACTIONS ON
INSTRUMENTATION AND MEASUREMENT, VOL.
59, NO. 2, FEBRUARY 2010.
[4] Levente Buttya´ n, La´ szlo´ Czap, and Istva´n Vajda,
“Detection and Recovery from Pollution Attacks in
Coding-Based Distributed Storage Schemes,” IEEE
TRANSACTIONS ON DEPENDABLE AND SECURE
COMPUTING, VOL. 8, NO. 6,
NOVEMBER/DECEMBER 2011.
[5] Ing-Ray Chen, Member, IEEE, Anh Phan Speer, and
Mohamed Eltoweissy, Senior Member, IEEE,
“Adaptive Fault-Tolerant QoS Control Algorithms for
Maximizing System Lifetime of Query-Based
Wireless Sensor Networks,” IEEE TRANSACTIONS
ON DEPENDABLE AND SECURE COMPUTING,
VOL. 8, NO. 2, MARCH-APRIL 2011.
[6] Masanori Miyazawa and Michiaki Hayashi Rolf
Stadler, “vNMF: Distributed Fault Detection using
Clustering Approach for Network Function
Virtualization,” 2nd Jan, 2015.
[7] Steven S. McClure, L. D. Edmonds, R. Mihailovich,
A. H. Johnston, Fellow, IEEE, P. Alonzo, J. DeNatale,
Member, IEEE, J. Lehman, and C. Yui, “Radiation
Effects in Micro-Electromechanical Systems
(MEMS): RF Relays,” IEEE TRANSACTIONS ON
NUCLEAR SCIENCE, VOL. 49, NO. 6, DECEMBER
2002.
[8] Erfan Soltanmohammadi, Student Member, IEEE,
Mahdi Orooji, Student Member, IEEE, and Mort
Naraghi-Pour, Member, IEEE, “Decentralized
Hypothesis Testing in Wireless Sensor Networks in
the Presence of Misbehaving Nodes,” IEEE
TRANSACTIONS ON INFORMATION FORENSICS
AND SECURITY, VOL. 8, NO. 1, Jan 2013.
103 International Journal for Modern Trends in Science and Technology
Reliable and Efficient Data Acquisition in Wireless Sensor Network
[9] Tapas Kanungo, Senior Member, IEEE, David M.
Mount, Member, IEEE, Nathan S. Netanyahu,
Member, IEEE, Christine D. Piatko, Ruth Silverman,
and Angela Y. Wu, Senior Member, IEEE, “An
Efficient k-Means Clustering Algorithm: Analysis
and Implementation,” IEEE TRANSACTIONS ON
PATTERN ANALYSIS AND MACHINE
INTELLIGENCE, VOL. 24, NO. 7, JULY 2002.
[10]Vibha Paradkar, Gajendra Singh Chandel, Kailash
Patidar, “Fault Node Discovery and Efficient Route
Repairing Algorithm for Wireless Sensor Network”
(IJCSIT) International Journal of Computer Science
and Information Technologies, Vol. 6 (2), 2015,
1710-1715.
[11]Saad Ahmad Khan, Ladislau Bölöni, Damla Turgut,
“Bridge protection algorithms – A technique for
fault-tolerance in sensor networks” Ad Hoc Networks
24 (2015) 186–199.
[12]Anasane, Aboli Arun, and Rachana Anil Satao. "A
Survey on Various Multipath Routing Protocols in
Wireless Sensor Networks." Procedia Computer
Science 79 (2016): 610-615.
[13]Kudale, Roma, and Rachana Satao. "STESA: Self
Transmission Energy Saving Algorithm for road
surveillance." 2013 Tenth International Conference
on Wireless and Optical Communications Networks
(WOCN). IEEE, 2013.
[14]Amit Sharma, Kshitij Shinghal , Neelam Srivastava,
Raghuvir Singh, “Energy management for wireless
sensor network nodes” International Journal of
Advances in Engineering & Technology, Vol. 1, Mar
2011.

Weitere ähnliche Inhalte

Was ist angesagt?

Bidirectional data centric routing protocol to improve the energy efficiency ...
Bidirectional data centric routing protocol to improve the energy efficiency ...Bidirectional data centric routing protocol to improve the energy efficiency ...
Bidirectional data centric routing protocol to improve the energy efficiency ...prj_publication
 
An Approach of Mobile Wireless Sensor Network for Target Coverage and Network...
An Approach of Mobile Wireless Sensor Network for Target Coverage and Network...An Approach of Mobile Wireless Sensor Network for Target Coverage and Network...
An Approach of Mobile Wireless Sensor Network for Target Coverage and Network...IRJET Journal
 
Wireless Sensor Network Based Clustering Architecture for Cooperative Communi...
Wireless Sensor Network Based Clustering Architecture for Cooperative Communi...Wireless Sensor Network Based Clustering Architecture for Cooperative Communi...
Wireless Sensor Network Based Clustering Architecture for Cooperative Communi...ijtsrd
 
Characterization of directed diffusion protocol in wireless sensor network
Characterization of directed diffusion protocol in wireless sensor networkCharacterization of directed diffusion protocol in wireless sensor network
Characterization of directed diffusion protocol in wireless sensor networkijwmn
 
1104.0355
1104.03551104.0355
1104.0355sudddd44
 
A Fault tolerant system based on Genetic Algorithm for Target Tracking in Wir...
A Fault tolerant system based on Genetic Algorithm for Target Tracking in Wir...A Fault tolerant system based on Genetic Algorithm for Target Tracking in Wir...
A Fault tolerant system based on Genetic Algorithm for Target Tracking in Wir...Editor IJCATR
 
A NOVEL ROUTING PROTOCOL FOR TARGET TRACKING IN WIRELESS SENSOR NETWORKS
A NOVEL ROUTING PROTOCOL FOR TARGET TRACKING IN WIRELESS SENSOR NETWORKSA NOVEL ROUTING PROTOCOL FOR TARGET TRACKING IN WIRELESS SENSOR NETWORKS
A NOVEL ROUTING PROTOCOL FOR TARGET TRACKING IN WIRELESS SENSOR NETWORKSIJCNCJournal
 
A Review Study on Shortest Path in WSN to detect the Abnormal Packet for savi...
A Review Study on Shortest Path in WSN to detect the Abnormal Packet for savi...A Review Study on Shortest Path in WSN to detect the Abnormal Packet for savi...
A Review Study on Shortest Path in WSN to detect the Abnormal Packet for savi...Editor IJMTER
 
AN ENERGY EFFICIENT DISTRIBUTED PROTOCOL FOR ENSURING COVERAGE AND CONNECTIVI...
AN ENERGY EFFICIENT DISTRIBUTED PROTOCOL FOR ENSURING COVERAGE AND CONNECTIVI...AN ENERGY EFFICIENT DISTRIBUTED PROTOCOL FOR ENSURING COVERAGE AND CONNECTIVI...
AN ENERGY EFFICIENT DISTRIBUTED PROTOCOL FOR ENSURING COVERAGE AND CONNECTIVI...ijasuc
 
Performance evaluation of data filtering approach in wireless sensor networks...
Performance evaluation of data filtering approach in wireless sensor networks...Performance evaluation of data filtering approach in wireless sensor networks...
Performance evaluation of data filtering approach in wireless sensor networks...ijmnct
 
V.KARTHIKEYAN PUBLISHED ARTICLE
V.KARTHIKEYAN PUBLISHED ARTICLEV.KARTHIKEYAN PUBLISHED ARTICLE
V.KARTHIKEYAN PUBLISHED ARTICLEKARTHIKEYAN V
 
Wireless sensor networks, clustering, Energy efficient protocols, Particles S...
Wireless sensor networks, clustering, Energy efficient protocols, Particles S...Wireless sensor networks, clustering, Energy efficient protocols, Particles S...
Wireless sensor networks, clustering, Energy efficient protocols, Particles S...IJMIT JOURNAL
 
A survey on Object Tracking Techniques in Wireless Sensor Network
A survey on Object Tracking Techniques in Wireless Sensor NetworkA survey on Object Tracking Techniques in Wireless Sensor Network
A survey on Object Tracking Techniques in Wireless Sensor NetworkIRJET Journal
 
THRESHOLD BASED DATA REDUCTION FOR PROLONGING LIFE OF WIRELESS SENSOR NETWORK
THRESHOLD BASED DATA REDUCTION FOR PROLONGING LIFE OF WIRELESS SENSOR NETWORKTHRESHOLD BASED DATA REDUCTION FOR PROLONGING LIFE OF WIRELESS SENSOR NETWORK
THRESHOLD BASED DATA REDUCTION FOR PROLONGING LIFE OF WIRELESS SENSOR NETWORKpijans
 
A COST EFFECTIVE COMPRESSIVE DATA AGGREGATION TECHNIQUE FOR WIRELESS SENSOR N...
A COST EFFECTIVE COMPRESSIVE DATA AGGREGATION TECHNIQUE FOR WIRELESS SENSOR N...A COST EFFECTIVE COMPRESSIVE DATA AGGREGATION TECHNIQUE FOR WIRELESS SENSOR N...
A COST EFFECTIVE COMPRESSIVE DATA AGGREGATION TECHNIQUE FOR WIRELESS SENSOR N...ijasuc
 
Proactive Data Reporting of Wireless sensor Network using Wake Up Scheduling ...
Proactive Data Reporting of Wireless sensor Network using Wake Up Scheduling ...Proactive Data Reporting of Wireless sensor Network using Wake Up Scheduling ...
Proactive Data Reporting of Wireless sensor Network using Wake Up Scheduling ...ijsrd.com
 
Machine Learning Based Watchdog Protocol for Wormhole Attack Detection in Wir...
Machine Learning Based Watchdog Protocol for Wormhole Attack Detection in Wir...Machine Learning Based Watchdog Protocol for Wormhole Attack Detection in Wir...
Machine Learning Based Watchdog Protocol for Wormhole Attack Detection in Wir...IJCSIS Research Publications
 

Was ist angesagt? (19)

Bidirectional data centric routing protocol to improve the energy efficiency ...
Bidirectional data centric routing protocol to improve the energy efficiency ...Bidirectional data centric routing protocol to improve the energy efficiency ...
Bidirectional data centric routing protocol to improve the energy efficiency ...
 
Ijetcas14 469
Ijetcas14 469Ijetcas14 469
Ijetcas14 469
 
An Approach of Mobile Wireless Sensor Network for Target Coverage and Network...
An Approach of Mobile Wireless Sensor Network for Target Coverage and Network...An Approach of Mobile Wireless Sensor Network for Target Coverage and Network...
An Approach of Mobile Wireless Sensor Network for Target Coverage and Network...
 
Wireless Sensor Network Based Clustering Architecture for Cooperative Communi...
Wireless Sensor Network Based Clustering Architecture for Cooperative Communi...Wireless Sensor Network Based Clustering Architecture for Cooperative Communi...
Wireless Sensor Network Based Clustering Architecture for Cooperative Communi...
 
Characterization of directed diffusion protocol in wireless sensor network
Characterization of directed diffusion protocol in wireless sensor networkCharacterization of directed diffusion protocol in wireless sensor network
Characterization of directed diffusion protocol in wireless sensor network
 
Ijetcas14 591
Ijetcas14 591Ijetcas14 591
Ijetcas14 591
 
1104.0355
1104.03551104.0355
1104.0355
 
A Fault tolerant system based on Genetic Algorithm for Target Tracking in Wir...
A Fault tolerant system based on Genetic Algorithm for Target Tracking in Wir...A Fault tolerant system based on Genetic Algorithm for Target Tracking in Wir...
A Fault tolerant system based on Genetic Algorithm for Target Tracking in Wir...
 
A NOVEL ROUTING PROTOCOL FOR TARGET TRACKING IN WIRELESS SENSOR NETWORKS
A NOVEL ROUTING PROTOCOL FOR TARGET TRACKING IN WIRELESS SENSOR NETWORKSA NOVEL ROUTING PROTOCOL FOR TARGET TRACKING IN WIRELESS SENSOR NETWORKS
A NOVEL ROUTING PROTOCOL FOR TARGET TRACKING IN WIRELESS SENSOR NETWORKS
 
A Review Study on Shortest Path in WSN to detect the Abnormal Packet for savi...
A Review Study on Shortest Path in WSN to detect the Abnormal Packet for savi...A Review Study on Shortest Path in WSN to detect the Abnormal Packet for savi...
A Review Study on Shortest Path in WSN to detect the Abnormal Packet for savi...
 
AN ENERGY EFFICIENT DISTRIBUTED PROTOCOL FOR ENSURING COVERAGE AND CONNECTIVI...
AN ENERGY EFFICIENT DISTRIBUTED PROTOCOL FOR ENSURING COVERAGE AND CONNECTIVI...AN ENERGY EFFICIENT DISTRIBUTED PROTOCOL FOR ENSURING COVERAGE AND CONNECTIVI...
AN ENERGY EFFICIENT DISTRIBUTED PROTOCOL FOR ENSURING COVERAGE AND CONNECTIVI...
 
Performance evaluation of data filtering approach in wireless sensor networks...
Performance evaluation of data filtering approach in wireless sensor networks...Performance evaluation of data filtering approach in wireless sensor networks...
Performance evaluation of data filtering approach in wireless sensor networks...
 
V.KARTHIKEYAN PUBLISHED ARTICLE
V.KARTHIKEYAN PUBLISHED ARTICLEV.KARTHIKEYAN PUBLISHED ARTICLE
V.KARTHIKEYAN PUBLISHED ARTICLE
 
Wireless sensor networks, clustering, Energy efficient protocols, Particles S...
Wireless sensor networks, clustering, Energy efficient protocols, Particles S...Wireless sensor networks, clustering, Energy efficient protocols, Particles S...
Wireless sensor networks, clustering, Energy efficient protocols, Particles S...
 
A survey on Object Tracking Techniques in Wireless Sensor Network
A survey on Object Tracking Techniques in Wireless Sensor NetworkA survey on Object Tracking Techniques in Wireless Sensor Network
A survey on Object Tracking Techniques in Wireless Sensor Network
 
THRESHOLD BASED DATA REDUCTION FOR PROLONGING LIFE OF WIRELESS SENSOR NETWORK
THRESHOLD BASED DATA REDUCTION FOR PROLONGING LIFE OF WIRELESS SENSOR NETWORKTHRESHOLD BASED DATA REDUCTION FOR PROLONGING LIFE OF WIRELESS SENSOR NETWORK
THRESHOLD BASED DATA REDUCTION FOR PROLONGING LIFE OF WIRELESS SENSOR NETWORK
 
A COST EFFECTIVE COMPRESSIVE DATA AGGREGATION TECHNIQUE FOR WIRELESS SENSOR N...
A COST EFFECTIVE COMPRESSIVE DATA AGGREGATION TECHNIQUE FOR WIRELESS SENSOR N...A COST EFFECTIVE COMPRESSIVE DATA AGGREGATION TECHNIQUE FOR WIRELESS SENSOR N...
A COST EFFECTIVE COMPRESSIVE DATA AGGREGATION TECHNIQUE FOR WIRELESS SENSOR N...
 
Proactive Data Reporting of Wireless sensor Network using Wake Up Scheduling ...
Proactive Data Reporting of Wireless sensor Network using Wake Up Scheduling ...Proactive Data Reporting of Wireless sensor Network using Wake Up Scheduling ...
Proactive Data Reporting of Wireless sensor Network using Wake Up Scheduling ...
 
Machine Learning Based Watchdog Protocol for Wormhole Attack Detection in Wir...
Machine Learning Based Watchdog Protocol for Wormhole Attack Detection in Wir...Machine Learning Based Watchdog Protocol for Wormhole Attack Detection in Wir...
Machine Learning Based Watchdog Protocol for Wormhole Attack Detection in Wir...
 

Ă„hnlich wie Reliable and Efficient Data Acquisition in Wireless Sensor Network

Mobile Agents based Energy Efficient Routing for Wireless Sensor Networks
Mobile Agents based Energy Efficient Routing for Wireless Sensor NetworksMobile Agents based Energy Efficient Routing for Wireless Sensor Networks
Mobile Agents based Energy Efficient Routing for Wireless Sensor NetworksEswar Publications
 
Energy Proficient and Security Protocol for WSN: A Review
Energy Proficient and Security Protocol for WSN: A ReviewEnergy Proficient and Security Protocol for WSN: A Review
Energy Proficient and Security Protocol for WSN: A Reviewtheijes
 
IRJET- Chaos based Secured Communication in Energy Efficient Wireless Sensor...
IRJET-	 Chaos based Secured Communication in Energy Efficient Wireless Sensor...IRJET-	 Chaos based Secured Communication in Energy Efficient Wireless Sensor...
IRJET- Chaos based Secured Communication in Energy Efficient Wireless Sensor...IRJET Journal
 
Wide-band spectrum sensing with convolution neural network using spectral cor...
Wide-band spectrum sensing with convolution neural network using spectral cor...Wide-band spectrum sensing with convolution neural network using spectral cor...
Wide-band spectrum sensing with convolution neural network using spectral cor...IJECEIAES
 
Computational Analysis of Routing Algorithm for Wireless Sensor Network
Computational Analysis of Routing Algorithm for Wireless Sensor NetworkComputational Analysis of Routing Algorithm for Wireless Sensor Network
Computational Analysis of Routing Algorithm for Wireless Sensor NetworkIRJET Journal
 
Paper id 28201419
Paper id 28201419Paper id 28201419
Paper id 28201419IJRAT
 
An Improved Enhanced Real Time Routing Protocol (IERT) for Mobile Wireless Se...
An Improved Enhanced Real Time Routing Protocol (IERT) for Mobile Wireless Se...An Improved Enhanced Real Time Routing Protocol (IERT) for Mobile Wireless Se...
An Improved Enhanced Real Time Routing Protocol (IERT) for Mobile Wireless Se...IRJET Journal
 
LIFETIME IMPROVEMENT USING MOBILE AGENT IN WIRELESS SENSOR NETWORK
LIFETIME IMPROVEMENT USING MOBILE AGENT IN WIRELESS SENSOR NETWORKLIFETIME IMPROVEMENT USING MOBILE AGENT IN WIRELESS SENSOR NETWORK
LIFETIME IMPROVEMENT USING MOBILE AGENT IN WIRELESS SENSOR NETWORKJournal For Research
 
EVENT DRIVEN ROUTING PROTOCOLS FOR WIRELESS SENSOR NETWORK- A SURVEY
EVENT DRIVEN ROUTING PROTOCOLS FOR  WIRELESS SENSOR NETWORK- A SURVEYEVENT DRIVEN ROUTING PROTOCOLS FOR  WIRELESS SENSOR NETWORK- A SURVEY
EVENT DRIVEN ROUTING PROTOCOLS FOR WIRELESS SENSOR NETWORK- A SURVEYijcsa
 
DEVELOPMENT OF SOM NEURAL NETWORK BASED ENERGY EFFICIENT CLUSTERING HIERARCHI...
DEVELOPMENT OF SOM NEURAL NETWORK BASED ENERGY EFFICIENT CLUSTERING HIERARCHI...DEVELOPMENT OF SOM NEURAL NETWORK BASED ENERGY EFFICIENT CLUSTERING HIERARCHI...
DEVELOPMENT OF SOM NEURAL NETWORK BASED ENERGY EFFICIENT CLUSTERING HIERARCHI...ijassn
 
Fault Diagonosis Approach for WSN using Normal Bias Technique
Fault Diagonosis Approach for WSN using Normal Bias TechniqueFault Diagonosis Approach for WSN using Normal Bias Technique
Fault Diagonosis Approach for WSN using Normal Bias TechniqueIDES Editor
 
Survey of Wireless Sensor Network Application
Survey of Wireless Sensor Network ApplicationSurvey of Wireless Sensor Network Application
Survey of Wireless Sensor Network Applicationijsrd.com
 
Current issue- International Journal of Advanced Smart Sensor Network Systems...
Current issue- International Journal of Advanced Smart Sensor Network Systems...Current issue- International Journal of Advanced Smart Sensor Network Systems...
Current issue- International Journal of Advanced Smart Sensor Network Systems...ijassn
 
A Comparative Review on Reliability and Fault Tolerance Enhancement Protocols...
A Comparative Review on Reliability and Fault Tolerance Enhancement Protocols...A Comparative Review on Reliability and Fault Tolerance Enhancement Protocols...
A Comparative Review on Reliability and Fault Tolerance Enhancement Protocols...IRJET Journal
 
B05630814
B05630814B05630814
B05630814IOSR-JEN
 

Ă„hnlich wie Reliable and Efficient Data Acquisition in Wireless Sensor Network (20)

SDSFLF: fault localization framework for optical communication using softwar...
SDSFLF: fault localization framework for optical  communication using softwar...SDSFLF: fault localization framework for optical  communication using softwar...
SDSFLF: fault localization framework for optical communication using softwar...
 
C1804011117
C1804011117C1804011117
C1804011117
 
Mobile Agents based Energy Efficient Routing for Wireless Sensor Networks
Mobile Agents based Energy Efficient Routing for Wireless Sensor NetworksMobile Agents based Energy Efficient Routing for Wireless Sensor Networks
Mobile Agents based Energy Efficient Routing for Wireless Sensor Networks
 
Energy Proficient and Security Protocol for WSN: A Review
Energy Proficient and Security Protocol for WSN: A ReviewEnergy Proficient and Security Protocol for WSN: A Review
Energy Proficient and Security Protocol for WSN: A Review
 
DESIGN AND IMPLEMENTATION OF ADVANCED MULTILEVEL PRIORITY PACKET SCHEDULING S...
DESIGN AND IMPLEMENTATION OF ADVANCED MULTILEVEL PRIORITY PACKET SCHEDULING S...DESIGN AND IMPLEMENTATION OF ADVANCED MULTILEVEL PRIORITY PACKET SCHEDULING S...
DESIGN AND IMPLEMENTATION OF ADVANCED MULTILEVEL PRIORITY PACKET SCHEDULING S...
 
IRJET- Chaos based Secured Communication in Energy Efficient Wireless Sensor...
IRJET-	 Chaos based Secured Communication in Energy Efficient Wireless Sensor...IRJET-	 Chaos based Secured Communication in Energy Efficient Wireless Sensor...
IRJET- Chaos based Secured Communication in Energy Efficient Wireless Sensor...
 
D0606032413 Paper
D0606032413 PaperD0606032413 Paper
D0606032413 Paper
 
Wide-band spectrum sensing with convolution neural network using spectral cor...
Wide-band spectrum sensing with convolution neural network using spectral cor...Wide-band spectrum sensing with convolution neural network using spectral cor...
Wide-band spectrum sensing with convolution neural network using spectral cor...
 
Computational Analysis of Routing Algorithm for Wireless Sensor Network
Computational Analysis of Routing Algorithm for Wireless Sensor NetworkComputational Analysis of Routing Algorithm for Wireless Sensor Network
Computational Analysis of Routing Algorithm for Wireless Sensor Network
 
Paper id 28201419
Paper id 28201419Paper id 28201419
Paper id 28201419
 
An Improved Enhanced Real Time Routing Protocol (IERT) for Mobile Wireless Se...
An Improved Enhanced Real Time Routing Protocol (IERT) for Mobile Wireless Se...An Improved Enhanced Real Time Routing Protocol (IERT) for Mobile Wireless Se...
An Improved Enhanced Real Time Routing Protocol (IERT) for Mobile Wireless Se...
 
LIFETIME IMPROVEMENT USING MOBILE AGENT IN WIRELESS SENSOR NETWORK
LIFETIME IMPROVEMENT USING MOBILE AGENT IN WIRELESS SENSOR NETWORKLIFETIME IMPROVEMENT USING MOBILE AGENT IN WIRELESS SENSOR NETWORK
LIFETIME IMPROVEMENT USING MOBILE AGENT IN WIRELESS SENSOR NETWORK
 
EVENT DRIVEN ROUTING PROTOCOLS FOR WIRELESS SENSOR NETWORK- A SURVEY
EVENT DRIVEN ROUTING PROTOCOLS FOR  WIRELESS SENSOR NETWORK- A SURVEYEVENT DRIVEN ROUTING PROTOCOLS FOR  WIRELESS SENSOR NETWORK- A SURVEY
EVENT DRIVEN ROUTING PROTOCOLS FOR WIRELESS SENSOR NETWORK- A SURVEY
 
DEVELOPMENT OF SOM NEURAL NETWORK BASED ENERGY EFFICIENT CLUSTERING HIERARCHI...
DEVELOPMENT OF SOM NEURAL NETWORK BASED ENERGY EFFICIENT CLUSTERING HIERARCHI...DEVELOPMENT OF SOM NEURAL NETWORK BASED ENERGY EFFICIENT CLUSTERING HIERARCHI...
DEVELOPMENT OF SOM NEURAL NETWORK BASED ENERGY EFFICIENT CLUSTERING HIERARCHI...
 
Fault Diagonosis Approach for WSN using Normal Bias Technique
Fault Diagonosis Approach for WSN using Normal Bias TechniqueFault Diagonosis Approach for WSN using Normal Bias Technique
Fault Diagonosis Approach for WSN using Normal Bias Technique
 
Survey of Wireless Sensor Network Application
Survey of Wireless Sensor Network ApplicationSurvey of Wireless Sensor Network Application
Survey of Wireless Sensor Network Application
 
Current issue- International Journal of Advanced Smart Sensor Network Systems...
Current issue- International Journal of Advanced Smart Sensor Network Systems...Current issue- International Journal of Advanced Smart Sensor Network Systems...
Current issue- International Journal of Advanced Smart Sensor Network Systems...
 
A Comparative Review on Reliability and Fault Tolerance Enhancement Protocols...
A Comparative Review on Reliability and Fault Tolerance Enhancement Protocols...A Comparative Review on Reliability and Fault Tolerance Enhancement Protocols...
A Comparative Review on Reliability and Fault Tolerance Enhancement Protocols...
 
B05630814
B05630814B05630814
B05630814
 
F33022028
F33022028F33022028
F33022028
 

KĂĽrzlich hochgeladen

Artificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptxArtificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptxbritheesh05
 
TechTAC® CFD Report Summary: A Comparison of Two Types of Tubing Anchor Catchers
TechTAC® CFD Report Summary: A Comparison of Two Types of Tubing Anchor CatchersTechTAC® CFD Report Summary: A Comparison of Two Types of Tubing Anchor Catchers
TechTAC® CFD Report Summary: A Comparison of Two Types of Tubing Anchor Catcherssdickerson1
 
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxWhat are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxwendy cai
 
Call Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call GirlsCall Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call Girlsssuser7cb4ff
 
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)Dr SOUNDIRARAJ N
 
Heart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptxHeart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptxPoojaBan
 
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdfCCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdfAsst.prof M.Gokilavani
 
Concrete Mix Design - IS 10262-2019 - .pptx
Concrete Mix Design - IS 10262-2019 - .pptxConcrete Mix Design - IS 10262-2019 - .pptx
Concrete Mix Design - IS 10262-2019 - .pptxKartikeyaDwivedi3
 
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
Churning of Butter, Factors affecting .
Churning of Butter, Factors affecting  .Churning of Butter, Factors affecting  .
Churning of Butter, Factors affecting .Satyam Kumar
 
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)dollysharma2066
 
Biology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxBiology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxDeepakSakkari2
 
Electronically Controlled suspensions system .pdf
Electronically Controlled suspensions system .pdfElectronically Controlled suspensions system .pdf
Electronically Controlled suspensions system .pdfme23b1001
 
computer application and construction management
computer application and construction managementcomputer application and construction management
computer application and construction managementMariconPadriquez1
 
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxDecoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxJoĂŁo Esperancinha
 
Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...VICTOR MAESTRE RAMIREZ
 
An introduction to Semiconductor and its types.pptx
An introduction to Semiconductor and its types.pptxAn introduction to Semiconductor and its types.pptx
An introduction to Semiconductor and its types.pptxPurva Nikam
 
Introduction to Machine Learning Unit-3 for II MECH
Introduction to Machine Learning Unit-3 for II MECHIntroduction to Machine Learning Unit-3 for II MECH
Introduction to Machine Learning Unit-3 for II MECHC Sai Kiran
 

KĂĽrzlich hochgeladen (20)

Artificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptxArtificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptx
 
TechTAC® CFD Report Summary: A Comparison of Two Types of Tubing Anchor Catchers
TechTAC® CFD Report Summary: A Comparison of Two Types of Tubing Anchor CatchersTechTAC® CFD Report Summary: A Comparison of Two Types of Tubing Anchor Catchers
TechTAC® CFD Report Summary: A Comparison of Two Types of Tubing Anchor Catchers
 
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxWhat are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptx
 
Call Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call GirlsCall Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call Girls
 
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)
 
Heart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptxHeart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptx
 
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdfCCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
 
Concrete Mix Design - IS 10262-2019 - .pptx
Concrete Mix Design - IS 10262-2019 - .pptxConcrete Mix Design - IS 10262-2019 - .pptx
Concrete Mix Design - IS 10262-2019 - .pptx
 
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
 
Churning of Butter, Factors affecting .
Churning of Butter, Factors affecting  .Churning of Butter, Factors affecting  .
Churning of Butter, Factors affecting .
 
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
 
Biology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxBiology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptx
 
Electronically Controlled suspensions system .pdf
Electronically Controlled suspensions system .pdfElectronically Controlled suspensions system .pdf
Electronically Controlled suspensions system .pdf
 
computer application and construction management
computer application and construction managementcomputer application and construction management
computer application and construction management
 
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxDecoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
 
Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...
 
Design and analysis of solar grass cutter.pdf
Design and analysis of solar grass cutter.pdfDesign and analysis of solar grass cutter.pdf
Design and analysis of solar grass cutter.pdf
 
An introduction to Semiconductor and its types.pptx
An introduction to Semiconductor and its types.pptxAn introduction to Semiconductor and its types.pptx
An introduction to Semiconductor and its types.pptx
 
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Serviceyoung call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
 
Introduction to Machine Learning Unit-3 for II MECH
Introduction to Machine Learning Unit-3 for II MECHIntroduction to Machine Learning Unit-3 for II MECH
Introduction to Machine Learning Unit-3 for II MECH
 

Reliable and Efficient Data Acquisition in Wireless Sensor Network

  • 1. 100 International Journal for Modern Trends in Science and Technology Volume: 2 | Issue: 09 | September 2016 | ISSN: 2455-3778IJMTST Reliable and Efficient Data Acquisition in Wireless Sensor Network Harshada Sonawane1 | Prof. Rachana Satao2 1Department of Computer Engineering Computer Network, Smt.Kashibai Navale College of Engineering, Pune, Maharashtra, India. 2Assistant Professor, Department of Computer Engineering Computer Network, Smt.Kashibai Navale College of Engineering, Pune, Maharashtra, India. The sensors in the WSN sense the surrounding, collects the data and transfers the data to the sink node. It has been observed that the sensor nodes are deactivated or damaged when exposed to certain radiations or due to energy problems. This damage leads to the temporary isolation of the nodes from the network which results in the formation of the holes. These holes are dynamic in nature and can grow and shrink depending upon the factors causing the damage to the sensor nodes. So a solution has been presented in the base paper where the dual mode i.e. Radio frequency and the Acoustic mode are considered so that the data can be transferred easily. Based on this a survey has been done where several factors are studied so that the performance of the system can be increased. KEYWORDS: Wireless Sensor Network, Sensor deployment, Energy hole problem. Copyright © 2016 International Journal for Modern Trends in Science and Technology All rights reserved. I. INTRODUCTION WSN is the collection of several nodes which transfers the data. There are several factors which affect the performance of the sensor nodes and may even damage them.As long as there is no damage to the sensor nodes, it continues to work in the radio frequency mode, when there occurs the node failure, the acoustic mode is activated. The data is then extracted and transferred further. The elimination of the faulty nodes from the system cannot be the solution since all the resources and the services associated with the sensor node can be used again when they are recovered. It also helps in increasing the lifetime of a network. Thus the working of the model in dual mode proves to be better, since we switch to the other sleeping nodes and transfer the data through them. Also the range of the node plays the equal important role while the data is transferred from one node to the other. The motivating factors related to this are increasing the lifetime of the Wireless sensor network using the fault tolerance and the fault node detection, also active cooperative communication has to be there amongst the nodes so that the change in the topology can be reflected immediately and data can be sent with minimum delay. The architecture diagram of the system shown below helps us to understand the system. II. LITERATURE SURVEY The paper presented by the Pushpendu Kar and Sudip Misra Jan 2016 provides us with the details of how the dual mode i.e. radio frequency and the acoustic mode can be implemented for the effective and efficient data transfer. Also emphasized on the data extraction process. Due to the proposed system the data can be sent more efficiently [1]. In the paper presented by Kealan McCusker, Noel E. O’Connor May/June 2011 a solution for ABSTRACT
  • 2. 101 International Journal for Modern Trends in Science and Technology Reliable and Efficient Data Acquisition in Wireless Sensor Network distributing symmetric keys and network access control in a WSN using IBC is proposed. The proposed scheme was evaluated against well-known attacks on a WSN and found to perform well. Several groups implement for Tate pairing in hardware but are targeting the latency metric and also Field Programmable Gate Arrays (FPGAs) rather than energy and an ASIC, therefore these contributions lack over the suggested theory which is several magnitudes higher than what is achieved by implementing the pairing in hardware, and too high for the limited energy available to a node. Work is needed in order to implement other components of the scheme such as the elliptic curve point multiplication and exponentiation in the field [2]. Cesare Alippi, Giuseppe Anastasi, Mario Di Francesco, and Manuel Roveri Feb 2011. In this paper authors proposed an adaptive sampling algorithm that estimates online the optimal samplingfrequencies for sensors. This approach, which requires the designof adaptive measurement systems, minimizes the energy consumptionof the sensors and, incidentally, that of the radio while maintaininga very high accuracy of collected data.It can perform similar to a fixed-rate scheme where the samplingfrequency is known in advance.This approach resultsin a corresponding energy saving of both the sensor and theradio.Conclusion strongly depends on the specific sensor, whosepower consumption is significantly larger than that of the radio [3]. Levente Buttya´ n, La´ szlo´ Czap, and Istva´n Vajda Nov/Dec 2011In a pollution attack, the adversary maliciously alters some of the stored encoded packets, which results in the incorrect decoding of a large part of the original data upon retrieval. Authors proposed algorithms to detect and recover from such attacks. This paper can be applied in any coding-based distributed storage systems, be it in the domain of P2P file distribution or in wireless sensor networks. In particular, this approach does not require the storage nodes to perform additional coding on or to add additional information to the encoded packets. Proposed algorithm is effective and extremely efficient both in terms of communication and computational overhead. It does not scale up to very large systems in terms of computational complexity [4]. Ing-Ray Chen, Anh Phan Speer, and Mohamed Eltoweissy March/April 2011 Authors developed adaptive fault-tolerant quality of service (QoS) control algorithms based on hop-by-hop data delivery utilizing “source” and “path” redundancy, with the goal to satisfy application QoS requirements while prolonging the lifetime of the sensor system. Algorithm which incorporates path and source redundancy mechanisms to satisfy query QoS requirements while maximizing the lifetime of query-based sensor networks. Future work: provide a more detailed analysis of the effect of network dynamics on MTTF, such as more energy may be consumed by some SNs over others or some SNs may fail earlier than others [5]. Masanori Miyazawa and Michiaki Hayashi Rolf Stadler2nd Jan, 2015 The paper proposes a distributed managementfunction, called virtualized network management function(vNMF), to detect failures related to virtualized services. vNMF detects the failures by monitoring physical-layer statistics that are processed with a self-organizing map algorithm. Memory leaks and network congestion failures can be successfully detected and that and the accuracy of failure detection can be significantly improved compared to common k-means clustering. The proposed vNMF is expected to facilitate scalable network management toward more complex network virtualization environments in the future work [6]. Steven S. McClure, L. D. Edmonds, R. Mihailovich, A. H. Johnston, P. Alonzo, J. DeNatale, Member, IEEE, J. Lehman, and C. Yui Dec 2002 A mechanism for dielectric charge trapping and its effect on the electrostatic force is proposed. Of notable significance is the susceptibility of GaAS MEMS devices to radiation effects, as found in this work. Such effects, if present, may be eliminated with proper design techniques, as demonstrated in the alternate RSC switch configuration. It is strongly recommended that devices of this type be thoroughly characterized for radiation effects prior to use in systems with a space or nuclear radiation environments. [7]. Erfan Soltanmohammadi, Mahdi Orooji, Mort Naraghi-Pour Jan 2013 The problem of decentralized detection in wireless sensor networks in the presence of one or more classes of misbehaving nodes. Binary hypothesis testing is considered where the honest nodes transmit their binary decisions to the fusion center (FC), while the misbehaving nodes transmit fictitious messages the problem of decentralized detection in wireless sensor networks in the presence of one or more classes of misbehaving nodes. Binary hypothesis testing is considered where the honest nodes transmit their binary decisions to the fusion center
  • 3. 102 International Journal for Modern Trends in Science and Technology Volume: 2 | Issue: 09 | September 2016 | ISSN: 2455-3778IJMTST (FC), while the misbehaving nodes transmit fictitious messages[8]. Tapas Kanungo, David M. Mount, Nathan S. Netanyahu, Christine D. Piatko, Ruth Silverman, and Angela Y. Wu July 2002 Proposed in 2 ways: First, authors present a data-sensitive analysis of the algorithm's running time, which shows that the algorithm runs faster as the separation between clusters increases. Second, a number of empirical studies both on synthetically generated data and on real data sets from applications in colour quantization, data compression, and image segmentation.A simple and efficient implementation of Lloyd's k-means clustering algorithm, which we call the filtering algorithm. The advantage of this algorithm is it requires a kd-tree as the only major data structure.This algorithm is quite complex and does not provide significantly faster running time in practice [9]. Vibha Paradkar, Gajendra Singh Chandel, Kailash Patidar,2015 proposes a new routing algorithm (Master/Slave) for discovery and recovery of the routing path efficiently. The primary path, secondary path and the segmentation process helps to navigate the data from the non-faulty nodes [10]. Also multipath routing helps transfer data simultaneously thus by reducing delay and congestion in the network [12]. Saad Ahmad Khan, Ladislau Bölöni, Damla Turgut, 2015 the paper proposes a theory where the bridge nodes are protected by giving some of the responsibilities of the sink nodes to the other nodes. It prevents the apparition of the additional bridge nodes. The disadvantage is that the algorithm sacrifices the length of some routes in order to distribute the routes away from the critical area [11]. Amit Sharma, Kshitij Shinghal, Neelam Srivastava, Raghuvir Singh, Mar 2011 in this work analysis of the energy consumption of a WSN node is analysed with proposed node. With the help of this the estimated lifetime of the battery can be increased significantly [14]. It is observed that sensors are used for forwarding data to sink directly so as to reduce energy consumption, packet loss and delay [13]. III. CONCLUSION Reliable and efficient WSN is the need of the today’s communication technology and has been able to capture the attention of several researchers. The dual mode working of the sensor nodes in the WSN has been able to reduce the delay. Also the lifetime is increased by not eliminating the nodes directly when then go in the isolation state. Energy of the node being one of the several important factors, has to be worked upon by monitoring and with the help of the knowledge acquired by the survey. It also motivates to consider the mobile nodes and not just the stationary nodes and we can improve the computational power by optimal sensor deployment in wireless sensor network. REFERENCES [1] Pushpendu Kar, Student Member, IEEE and Sudip Misra, Senior Member, IEEE, “Reliable and Efficient Data Acquisition in Wireless Sensor Networks in the Presence of Transfaulty Nodes,” IEEE TRANSACTIONS ON NETWORK AND SERVICE MANAGEMENT, 8th Jan, 2016. [2] Kealan McCusker, Noel E. O’Connor, “Low-energy symmetric key distribution in wireless sensor networks,” IEEE Transactions on Dependable and Secure Computing May/June 2011. [3] Cesare Alippi, Fellow, IEEE, Giuseppe Anastasi, Mario Di Francesco, and Manuel Roveri, “Adaptive Sampling Algorithm for Effective Energy Management in Wireless Sensor Networks With Energy-Hungry Sensors,” IEEE TRANSACTIONS ON INSTRUMENTATION AND MEASUREMENT, VOL. 59, NO. 2, FEBRUARY 2010. [4] Levente Buttya´ n, La´ szlo´ Czap, and Istva´n Vajda, “Detection and Recovery from Pollution Attacks in Coding-Based Distributed Storage Schemes,” IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, VOL. 8, NO. 6, NOVEMBER/DECEMBER 2011. [5] Ing-Ray Chen, Member, IEEE, Anh Phan Speer, and Mohamed Eltoweissy, Senior Member, IEEE, “Adaptive Fault-Tolerant QoS Control Algorithms for Maximizing System Lifetime of Query-Based Wireless Sensor Networks,” IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, VOL. 8, NO. 2, MARCH-APRIL 2011. [6] Masanori Miyazawa and Michiaki Hayashi Rolf Stadler, “vNMF: Distributed Fault Detection using Clustering Approach for Network Function Virtualization,” 2nd Jan, 2015. [7] Steven S. McClure, L. D. Edmonds, R. Mihailovich, A. H. Johnston, Fellow, IEEE, P. Alonzo, J. DeNatale, Member, IEEE, J. Lehman, and C. Yui, “Radiation Effects in Micro-Electromechanical Systems (MEMS): RF Relays,” IEEE TRANSACTIONS ON NUCLEAR SCIENCE, VOL. 49, NO. 6, DECEMBER 2002. [8] Erfan Soltanmohammadi, Student Member, IEEE, Mahdi Orooji, Student Member, IEEE, and Mort Naraghi-Pour, Member, IEEE, “Decentralized Hypothesis Testing in Wireless Sensor Networks in the Presence of Misbehaving Nodes,” IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, VOL. 8, NO. 1, Jan 2013.
  • 4. 103 International Journal for Modern Trends in Science and Technology Reliable and Efficient Data Acquisition in Wireless Sensor Network [9] Tapas Kanungo, Senior Member, IEEE, David M. Mount, Member, IEEE, Nathan S. Netanyahu, Member, IEEE, Christine D. Piatko, Ruth Silverman, and Angela Y. Wu, Senior Member, IEEE, “An Efficient k-Means Clustering Algorithm: Analysis and Implementation,” IEEE TRANSACTIONS ON PATTERN ANALYSIS AND MACHINE INTELLIGENCE, VOL. 24, NO. 7, JULY 2002. [10]Vibha Paradkar, Gajendra Singh Chandel, Kailash Patidar, “Fault Node Discovery and Efficient Route Repairing Algorithm for Wireless Sensor Network” (IJCSIT) International Journal of Computer Science and Information Technologies, Vol. 6 (2), 2015, 1710-1715. [11]Saad Ahmad Khan, Ladislau Bölöni, Damla Turgut, “Bridge protection algorithms – A technique for fault-tolerance in sensor networks” Ad Hoc Networks 24 (2015) 186–199. [12]Anasane, Aboli Arun, and Rachana Anil Satao. "A Survey on Various Multipath Routing Protocols in Wireless Sensor Networks." Procedia Computer Science 79 (2016): 610-615. [13]Kudale, Roma, and Rachana Satao. "STESA: Self Transmission Energy Saving Algorithm for road surveillance." 2013 Tenth International Conference on Wireless and Optical Communications Networks (WOCN). IEEE, 2013. [14]Amit Sharma, Kshitij Shinghal , Neelam Srivastava, Raghuvir Singh, “Energy management for wireless sensor network nodes” International Journal of Advances in Engineering & Technology, Vol. 1, Mar 2011.