SlideShare ist ein Scribd-Unternehmen logo
1 von 6
Downloaden Sie, um offline zu lesen
ACEEE Int. J. on Network Security, Vol. 01, No. 03, Dec 2010




            FTTCP: Fault Tolerant Two-level Clustering
                     Protocol for WSN
                                              Amarjeet Kaur1, T P Sharma2
                                           CSE Department, NIT Hamirpur, India
                                               1
                                                 mail4amarjeet@gmail.com
                                                   2
                                                     teek@nitham.ac.in

Abstract— In this paper, we propose an agreement-based fault            Sensor nodes are prone to failure due to harsh
detection and recovery protocol for cluster head (CH) in             environment. The failure of a sensor node affects the
wireless sensor networks (WSNs) of two level cluster                 normal operation of a WSN [3].The failure of a CH makes
hierarchy. The aim of protocol is to accurately detect CH            situation even worse. In literature, number of authors have
failure to avoid unnecessary energy consumption caused by a
mistaken detection process. For this, it allows each cluster
                                                                     proposed fault tolerant protocols [4-7]. In this paper, we
member to detect its CH failure independently. Cluster               propose a fault tolerant protocol for WSN, which is based
members employ distributed agreement protocol to reach an            on agreement protocol.
agreement on failure of the CH among multiple cluster
members. The detection process runs concurrently with                                    II. RELATED WORK
normal network operation by periodically performing a
distributed detection process at each cluster member To                Clustering is an effective way for improving the energy
reduce energy consumption, it makes use of heartbeat                 efficiency and prolonging the network lifetime of WSNs.
messages sent periodically by a CH for fault detection.              The CH failure causes the connectivity and data loss within
Simulation results show, our protocol provides high detection        cluster. It also disconnects cluster members from rest of the
accuracy because of agreement protocol.                              network. Hence, it is crucial to detect and recover the CH
Keywords—Wireless Sensor Network, Clustering,          Fault         failure to maintain normal operation of cluster and network
detection, Agreement protocol, Detection accuracy.                   as a whole.
                                                                        Bandyopadhyay et al. [8] proposed a multi level
                    I. INTRODUCTION                                  clustering scheme in multi hop fashion. It derives
                                                                     probability of becoming a CH that minimizes energy
  Wireless sensor networks (WSNs) consist of hundreds                dissipation. These probability functions are highly complex
and even thousands of small tiny devices called sensor               and thus require numerical optimizations. It also gives the
nodes distributed autonomously to monitor physical                   concept of forced CHs i.e. if a node does not fall within the
/environmental conditions (like temperature, sound,                  range of any CH, it becomes a CH itself. Periodical run of
vibration, pressure etc); motion at different locations;             clustering algorithm for load balancing is used here also.
industrial sensing, infrastructure protection, battlefield              In REED (Robust Energy Efficient Distributed
awareness etc. Each sensor node has sensing, computation,            clustering) [9], a k-fault tolerant (i.e., k-connected) network
and wireless communication capabilities [1]. Sensor nodes            is constructed. In this, fault tolerance is achieved by
sense the data and send it to base station (BS). Sensor              selecting k independent sets of cluster heads on top of the
nodes are small in size powered by small onboard batteries           physical network, so that each node can quickly switch to
that store few Joules. Sensor nodes are often left                   other cluster heads in case of failures or attacks on its
unattended which makes it difficult or impossible to re-             current cluster head. The independent cluster head overlays
charge or replace their batteries. The cost of transmitting          also provide load balancing and security. In this,
information is much higher than computation and hence it             periodically re-clustering the network is done which
is necessary to reduce the number of transmissions.                  consumes significant energy. Moreover, to maintain a list
   In many situations, sensor nodes are organized into               of k cluster heads list requires a lot of storage space.
clusters where data collected by sensor nodes is sent to             In EEMC (An Energy Efficient Multi Level Clustering) [10], CHs
local cluster BS (e.g. CH). CH processes this data and               at each level are elected on the basis of probability function
sends it to the BS. Clustering is an effective way to reduce         which takes into consideration the residual energy as well
the number of transmissions and prolongs the life time of a          as distance factor very efficiently. In this scheme whole
network. The CH processes the data collected from all                information is sent and received by sink node for cluster
cluster members and transmits towards BS after suitable              formation. Fault tolerance is provided by periodic re-
processing. Due to this, CH drains energy much faster than           clustering of whole network.
cluster members. The role of CH must be rotated among                   In cellular approach to fault detection and recovery [11],
cluster members to prolong the life time of the network.             network is partitioned into a virtual grid of cells, where
There are number of clustering-based routing protocols               each cell consists of a group of sensor nodes. A cell
proposed in literature for WSNs [2]. These protocols                 manager and a secondary manager are chosen in each cell
improve energy consumption and performance when                      to perform fault management tasks. Secondary manager
compared to flat large-scale WSNs, but they also increase            works as back up node which will take control of the cell
the overhead to configure and maintain the network.                  when cell manager fails to operate. This protocol handles
                                                                     only those failures which are caused by energy depletion.

© 2010 ACEEE                                                    28
DOI: 01.IJNS.01.03.177
ACEEE Int. J. on Network Security, Vol. 01, No. 03, Dec 2010



   FTEP [12] is a dynamic and distributed CH election                  B. Sensor Node’s Energy Model
algorithm with fault tolerance capabilities based upon two-                A sensor node consists of sensors, analog signal
level clustering scheme. If energy level of current CH falls           conditioning, data conversion circuitry, digital signal
below a threshold value or any CH fails to communicate                 processing and a radio link. Each component of sensor
with cluster members then election process is started which            node consumes energy for sending and receiving data. The
is based on residual energy of sensor nodes. This election             following energy consumption model shows the energy,
process appoints a CH and a back up node to handle CH                  consumed by components of sensor node.
failure. It has a single point (back up node) to detect failure        Assuming path loss, the energy consumption on each
which may itself be disastrous.                                        sensor node is:

                     III. SYSTEM MODEL
  In this paper we extended our previous work [13] for
fault detection and recovery protocol for two –level
clustering.
                                                                          According to eq. 1, the transmitter unit consumes
A. Network Model
                                                                       energy to send bits; where e_tx the energy is consumed
    Figure 1 shows the two-level clustering network model              by transmitter electronics per bit and        is the energy
that used. Various symbols and terms used are shown in
                                                                       used by amplifier per bit. According to eq. 2, the receiving
Table I. All sensor nodes are homogeneous, which have
                                                                       unit consumes energy to receive bits, where is the
two transmission modes i.e. high power transmission mode
                                                                       energy used by receiver electronics per bit.
for communication between CHs and BS and low power
transmission mode for communication between cluster                                               TABLE I
members and CH. The distribution of sensor nodes is                                        NOTATIONS USED IN PAPER
uniform throughout the environment. Communication                                   Distance that message travels
medium is radio links. Links between two sensor nodes is                            Number of bits in the message
considered bidirectional. There is only single channel for                          Energy dissipated in transmitter electronics per bit
communication between sensor nodes.                                                 (taken to be 50nJ/bit)
                                                                                    Energy dissipated in transmitter amplifier (taken to
                                                                                    be 50nJ/bit)
                                                                                    Energy dissipated in receiver electronics per bit
                                                                                    (taken to be 50nJ/bit)
                                                                                    Energy consumed in transmission
                                                                                    Energy consumed in receiving
                                TR/2                                                Status vector
                                                                                    Location of node

                                                                                    Cluster head of cluster
                                                                                    Cluster
                                                                                    Current energy of node
                                                                                    Energy level at which sensor node can participant
        tr/2                                                                        in election of     at level-1
                                                                                    Energy level at which current     starts election
                                                                                    process at level-1
                                                                                    Energy level up to which election process must be
                                                Level-2 CH                          completed at level-1
                                                Level -1 CH                         Energy level at which sensor node can participant
                                                                                    in election of     at level-2
                                               Common Node
                                                                                    Energy level at which current     starts election
                                                                                    process at level-2
                Figure 1 Network Model
                                                                                    Energy level up to which election process must be
     During the network deployment, all the sensor nodes                            completed at level-2
are assigned same initial energy value. All sensor nodes are                        Transmission range of node at level-1
assumed to know their geographical location [14]. We
                                                                                    Transmission range of node at level-2
assume that clusters may overlap during election procedure
so that every sensor node comes under at least one cluster.                     Table I summarizes the meaning of each term and
Initially, some sensor nodes are randomly selected as CHs              its      typical       value.      The       values      for 
and they announce their energy levels and location                           ,        , and        are updated during each election
information. These CHs start working in high power                     process at level-1. Typically, value of             for next
transmission mode while other regular sensor nodes work                election round is set to the average value of the energy
in low power transmission mode.                                        levels of all candidate nodes during current election round.



© 2010 ACEEE                                                      29
DOI: 01.IJNS.01.03.177
ACEEE Int. J. on Network Security, Vol. 01, No. 03, Dec 2010



The values of        is set according to     . The values of
      is set according to        as follows:
                  - (energy consumption during election
process + energy consumption in data transmission during                                          any node
                                                                                                      i
that period)
    These values of           ,   and           calculate                         Y                                          N
similarly for cluster at level-2.
                                                                               Send CH                           Wait for
                                                                               Advertise                           CH
                  IV. FTTCP PROTOCOL                                             ment                           Advertisem
    FTTCP works in two phases namely: setup phase and
steady state phase. Setup phase runs only once, when
network starts working. In setup phase, clusters are formed                     Wait for                          Send Join
                                                                                 Join                            message to
and remain fixed through-out the lifetime of network.                                                             CH with
                                                                                message
Steady state phase consists of three phases: CH election,                        f                               energy and
failure detection and failure recovery. Failure detection
runs parallel with network operation.
                                                                             Create TDMA                           Wait for
A. Setup Phase                                                                Schedule &                           TDMA
                                                                             send it to CM                         Schedul
     Clusters are formed only once during the setup phase                      and elect                            e from
before the network starts to run (as shown in Figure 2).
Here we explain only level-2, level-1 explained in [13].
After the formation of clusters at level-1, some CHs are
randomly selected as a CH for level-2, because energy of                                        Steady State
each CH at level-1 is equal in amount. CHs send
advertisement messages that contain energy and location                                        Figure 2 Setup Phase
information of CHs to neighboring CHs (at level-1). Each
CH that listen to this advertisement message responds with
a return message comprising its residual energy and                               at any
location. However, a CH may be in the range of multiple
CHs, but finally it must be associated with a single CH(at                                           N
level-2). If any CH falls within the overlapping region of                                                     Collect Data
more than one CH, it decides its association to a CH by                                                        and forward
calculating the value of e/d (energy/distance). CH (atlevel-                                                        i
2) that has maximum e/d value is selected as final CH by                      Y
that CH. If more than one CH yields same maximum e/d                                                           Periodically
                                                                                                                   send
value, then any of them is randomly selected. If a CH does                     Call election                    heartbeat
not fall within the range of any CH, it declares itself as a                     process
CH and gets activated in high power transmission mode.                                                                           N
When clusters are established, the CHs (at level-1) collect
the data from cluster members, perform local data                                                                    CH
                                                                                                                   failed?
aggregation and send it to CH of level-2. This CH sends
data to base station or sink node in multi-hop manner.
     Clusters form circle of radius size at level-1 and at                                                     Y
level-2. and size is taken to confirm that every node in                                                 New        back-up
cluster able to communicate with other nodes within a                                                      Call Backup node
single-hop in same cluster.
B. Steady State Phase
                                                                                           Figure 3 Steady State Phase
    Once cluster is formed, CH creates a TDMA schedule
for cluster members and sends it to them at both levels.            CH Election
Cluster members sense data and send it to CH according to
                                                                               CH broadcasts          for next round, which is
TDMA schedule. This process continues for all clusters
until CH’s current energy level equals to or less than or CH        average energy of those cluster members who participated
fails. Then CH starts election process of new CH for next           in last election process. All cluster members within cluster
round or recovers from failure respectively (as shown in            listen message and compare with their current energy level
Figure 3).                                                          (       ). cluster members which have           greater than or
                                                                    equal to           , marks itself as a participant for election
                                                                    process(as shown in Figure 4). All participant sensor nodes
                                                                    broadcast their and location. All participant cluster
                                                                    member can listen to each other because all cluster

© 2010 ACEEE                                                   30
DOI: 01.IJNS.01.03.177
ACEEE Int. J. on Network Security, Vol. 01, No. 03, Dec 2010



members are within low (at level) or high (at level-2)                decides that CH has failed and broadcasts data plus status
power transmission range of each other. Because of this, all          vector. Other cluster members also listen this message.
participant sensor nodes know about and of each other.                They extract status vector from message and merge it with
Hence, each participant cluster member is aware about                 own status vector and this process continuous up to the end
higher energy participant cluster member. The participant             of the TDMA schedule. At the end of the TDMA frame,
cluster member with highest value of promotes itself as               cluster members reach on an agreement about failure of
CH and gets activated in high power mode (at level-1);                CH. If all bits of status vector are set then it is decided that
whereas cluster member with second highest energy                     CH has failed.
upgrades itself as back up CH. New CH receives and of
all participant cluster members during election process, it
calculates average of all and gets value of , which is used
                                                                                              any node i
for next round. Both new CH and back up node know the                                          Is CH?
value of . All participant cluster members mark themselves
as non-participant cluster members again. The previous CH                                                             N
also starts working in low power mode (at level-1).                               Y

                     CH sends                                                                                 Waiting for
                                                                                 CH sends
                                                                                                               heartbeat
                                                                                 heartbeat
                                                                                                               message
                                                                                  message
                   Each node compare                                                                          after time
                                                                                 after time
                    id l       (     )



                                                                                  Waitin                  Set or rest Status
                                               Y                                  g for                  Vector (SV) on the
         N                                                                         data                   basis of hearing
                                    Mark itself as a                                                     heartbeat message


                                Broadcast its and receive
                                                                                                           Send its Data+ SV
                                other participant node’s                                                     and receive SV
                                                                                                            from other nodes
                                                                                                           and merge it with
                                      highest energy node
                        Backup node      second highest energy


                                 Elected CH sends CH                                                            CH has
                                 d    i                                                                          been
                                                                                                                failed?
         Mark itself as non-
                                                                                                       N
                                                                                                                               Y
             Return new
                                                                                                Return                    Return
                     Figure 4 CH Election                                                       FALSE                     TRUE


Failure Detection                                                                             Figure 5 CH Failure Detection
    The detection process runs parallel with normal
network operation by periodically performing a distributed            Failure Recovery
detection process at each cluster member (as shown in                     By using agreement protocol when cluster members
Figure 5). For failure detection mechanism each cluster               confirm about CH then cluster member who has last slot in
member maintains a status vector and a timer. In status               TDMA schedule informs to back up node about failure.
vector each bit corresponds to a cluster member. Initially            Back up node elects itself as a CH by sending an
all bits are set to zero of status vector on each cluster             advertisement message in high power transmission mode
member. A bit in the vector is set once its corresponding             (as shown in Figure 4). It keeps on working as CH till its
cluster member detects that CH has failed. CH of each                 residual energy level reaches a critical limit or it fails. New
cluster periodically sends a hello message (i.e. notification         back up node is required for new CH depending on
that CH is alive) to cluster members after a certain time             application, so CH start election process for new back up
interval. Cluster members also know about time interval,              node by sending. Back up node election process is similar
CH sends it to cluster members. After that time interval              to election process of CH.
cluster member, who does not listen hello message, sets its
corresponding bit as one in status vector and locally

© 2010 ACEEE                                                     31
DOI: 01.IJNS.01.03.177
ACEEE Int. J. on Network Security, Vol. 01, No. 03, Dec 2010



                                                                       It can be observed form Figure 6 that as the number of
                                                                   nodes increases, network lifetime increases. But after
              V.     PERFORMANCE EVALUATION                        certain number of nodes, the network life time starts
                                                                   decreasing due to more overhead of cluster maintenance.
A. Simulation Environment                                          FTTCP consumes more energy in failure detection and
   In this section, we evaluate the performance of our             recovery as compare to FTEP. Thus, it reduces average
proposed FTTCP protocol. We used OMNET-4.0 [15] as                 0.42% number of rounds as compare to FTEP. When
simulator and same radio model as discussed in section III.        number of nodes are 100, network is alive up to 860
The basic simulation parameters are given in Table II.             rounds.
                                                                                         1400
                          TABLE II
                   EXPERIMENT PARAMETERS
                                                                                         1200                                                  FTEP
            Parameter              Value                                                                                                       FTTCP

            Area of sensor field   100×100 m2




                                                                      Number of Rounds
                                                                                         1000
            Sink position          At origin (0,0)
            Initial energy per     1J
                                                                                          800
            node
            Path loss exponent     2
                                                                                          600
                                   50 nJ/bit
                                   100 pJ/bit/m2
                                                                                          400
                                   50 nJ/bit                                                                                    0              50         100          150          200      250
                                                                                                                                                              Number of Nodes
            Size of data packet    500 bits
            Size of control        20 bits
            packet                                                                                                                                  Figure 6 Network Lifetime
            Sensing Interval       0.5 s
            High transmission      60 m                            Detection Accuracy
            range
            Low transmission       20 m                                From Figure 7, we can observe the effects of the packet
            range                                                  loss rate on detection accuracy for different cluster size.
            No of Nodes            300                             For simulation, we consider the packet loss rate range from
            Cluster Size           10, 20, 30                      0.2 to 0.4. It can be observed that with the increase of the
                                                                   packet loss rate the probability of false alarm positive
   In order to check the performance of FTTCP protocol,            increases, which leads to lower detection accuracy. A
we take following metrics/clustering attributes:                   larger number of sensor nodes lead to a smaller probability
 • Network lifetime: This metric gives the time up to which        of false alarm positive, i.e., higher detection accuracy. As
   a network remains alive. It shows number of rounds              expected FTTCP can achieve high detection accuracy.
   (including fault tolerance) up to which network remains         CH election overhead
   alive for different number of nodes in network. One
                                                                       When number of nodes are 200, node failure frequency
   round consists of an operation of network from sensing
                                                                   is 1% after every 50s for FTEP and FTTCP. It can be
   the phenomenon to receiving data at sink node
                                                                   observed from Figure 8 that FTTCP consumes slightly
   including election process and fault handling if any.
                                                                   more energy (average energy consumption 0.64%) for CH
 • CH election overhead: It is defined as energy consumed          failure recovery as compared to FTEP. This is because of
   in electing a CH in a network. It is the energy consumed        similar to FTEP, FTTCP elects back up node as new CH
   by total number of messages exchanged among sensor              and also elects new back up node for new CH which results
   nodes for electing CH.                                          into more number of messages exchanged. In FTEP, back
 • Detection Accuracy: It shows how accurately fault can           up node is not elected for new CH.
   be detected by nodes. The detection accuracy is defined
   by the probability of false alarm, which is the
                                                                                                                                     0.1
   probability that an operational CH is mistakenly                                                                                                   n=20
   detected as a faulty one. Detection accuracy                                                                                     0.01              n=15
                                                                                                                                                      n=10
                                                                                          Probability of False Alarm Positive




   performance is measured under different packets loss                                                                             1E-3

   rates and cluster sizes.                                                                                                         1E-4

B. Simulation Results and discussion
                                                                                                                                    1E-5

   To find out more reliable and accurate results, we
                                                                                                                                    1E-6
executed FTTCP protocol with different number of nodes,
number of times and failure frequency.                                                                                              1E-7


                                                                                                                                    1E-8
Network lifetime                                                                                                                        0.20           0.25            0.30           0.35         0.40
                                                                                                                                                                 Packet Loss Rate




© 2010 ACEEE                                                  32
DOI: 01.IJNS.01.03.177
ACEEE Int. J. on Network Security, Vol. 01, No. 03, Dec 2010



                                              Figure 7 Detection Accuracy                          [3] Peng Jiang, “A New Method for Node Fault Detection in
                                                                                                         Wireless                  Sensor                 Networks,”
                                    12                                                                   www.mdpi.com/journal/sensors, Feb, 2009, 1282-1294.
                                                                                                         Luciana Moreira S´a de Souza, Harald Vogt and Michael
                                    10
                                                  FTEP
                                                                                                         Beigl, “A survey on Fault Tolerance in Wireless Sensor
                                                  AFDEP                                                  Networks,” http://www.cobis-online.de/,
          Energy Consumption (mJ)



                                    8                                                              [4]    M.Yu, H.Mokhtar, M.Merabti, “A Survey on Fault
                                                                                                         Management in Wireless Sensor Networks,” Computer
                                    6                                                                    Networks, 2007.
                                                                                                   [5] Myeong-Hyeon Lee, Yoon-Hwa Choi, “Fault detection of
                                    4                                                                    wireless     sensor     networks,”    Elsevier    Computer
                                                                                                         Communications,Vol. 31, 2008, pp 3469–3475.
                                    2                                                              [6] Peng Jiang, “A New Method for Node Fault Detection in
                                                                                                         Wireless                  Sensor                 Networks,”
                                    0
                                         0   10   20      30    40        50   60   70   80
                                                                                                         www.mdpi.com/journal/sensors, Feb, 2009, 1282-1294.
                                                               Time (s)                            [7] S. Bandyopadhyay, E.J. Coyle, “Minimizing communication
                                                                                                         costs in hierarchically-clustered networks of wireless
                                                                                                         sensors”, Computer Networks- The International Journal of
                                             Figure 8 CH Election overhead                               Computer and Telecommunications Networking, vol. 44, no.
                                                                                                         1, pp. 1–16, Jan. 2004.
                                                                                                   [8] O. Younis, S. Fahmy, and P. Santi, “Robust communications
                                                  VI. CONCLUSION                                         for sensor networks in hostile environments,” In
    FTTCP is agreement-based fault detection and recovery                                                Proceedings of the 12th IEEE Int’l Workshop on Quality of
protocol for faulty CH for two level clustering in WSNs.                                                 Service (IWQoS), pp. 10-19, June 2004.
                                                                                                   [9] J. Yan, W. Ling, K. Yoohwan, Y. Xiaozong, “EEMC: An
FTTCP periodically checks for CH failure. This detection
                                                                                                         energy efficient multi level clustering algorithm for large
process runs parallel with network operation. It provides                                                scale wireless sensor networks”, Computer Networks: The
high accuracy, because it allows each cluster member to                                                  International Journal of Computer and Telecommunications
detect its faulty CH independently. It employs a distributed                                             Networking, vol. 52, no. 3, pp. 542-562, Feb. 2008.
agreement protocol to reach an agreement on the failure of                                         [10] M.Asim, H.Mokhtar, and M.Merabti ,2009 , “A cellular
CH among multiple cluster members. In order to recover                                                   approach to fault detection and recovery in wireless sensor
from faulty CH, back up node is elected as new CH and                                                    networks,” Third International Conference on Sensor
new back up node is elected locally. Election of CH and                                                  Technologies and Applications, 2009,SENSORCOMM '09,
back up node is based on residual energy of sensor nodes.                                                18-23 June 2009, pp. 352 – 357.
                                                                                                   [11] Nidhi Bansal, T. P. Sharma, Manoj Misra and R. C. Joshi,
A simulation result show, however, FTTCP consumes little
                                                                                                         “FTEP: A Fault Tolerant Election Protocol for Multi-level
bit more energy than FTEP, but provides high detection                                                   Clustering in Homogeneous Wireless Sensor Networks,” in
accuracy in harsh environment.                                                                           Proceeding 16th IEEE International Conference on
                                                                                                         Networks, ICON 2008 ,Dec, 2008.
                                                    REFERENCES                                     [12] Amarjeet Kaur and T P Sharma, "AFDEP: Agreement based
                                                                                                         CH Failure Detection and Election Protocol for a WSN," in
[1] F. Akyildiz et al., “Wireless sensor networks: a survey,”
                                                                                                         proceedings International Conference on Advances in
    Computer Networks, Vol. 38, March 2002, 393-422.                                                     Information and Communication Technologies (ICT 2010),
[2] Amarjeet Kaur, T P Sharma, “Clustering Algorithms in
                                                                                                         Sept, 2010 in Kochi, Kerala, India.
    Wireless Sensor Networks: A Survey ,” Accepted in                                              [13] Kai Wai Fan, Sha Liu and Prasun Sinha ,“On the Potential
    International Conference on Informatics, Cybernetics, and                                            of Structure-free Data Aggregation in Sensor Networks,” in
    Computer      Applications    (ICICCA2010)      ,    July,
                                                                                                         theProceedingsIEEEInfocom,2006.http://www.omnetpp.org
    2010,Bangalore,India.




© 2010 ACEEE                                                                                  33
DOI: 01.IJNS.01.03.177

Weitere ähnliche Inhalte

Was ist angesagt?

Clustering Based Lifetime Maximizing Aggregation Tree for Wireless Sensor Net...
Clustering Based Lifetime Maximizing Aggregation Tree for Wireless Sensor Net...Clustering Based Lifetime Maximizing Aggregation Tree for Wireless Sensor Net...
Clustering Based Lifetime Maximizing Aggregation Tree for Wireless Sensor Net...IJASCSE
 
An Adaptive Energy Efficient Reliable Routing Protocol for Wireless Sensor Ne...
An Adaptive Energy Efficient Reliable Routing Protocol for Wireless Sensor Ne...An Adaptive Energy Efficient Reliable Routing Protocol for Wireless Sensor Ne...
An Adaptive Energy Efficient Reliable Routing Protocol for Wireless Sensor Ne...IDES Editor
 
Energy Efficient Zone Divided and Energy Balanced Clustering Routing Protocol...
Energy Efficient Zone Divided and Energy Balanced Clustering Routing Protocol...Energy Efficient Zone Divided and Energy Balanced Clustering Routing Protocol...
Energy Efficient Zone Divided and Energy Balanced Clustering Routing Protocol...csijjournal
 
tankala srinivas, palasa
tankala srinivas, palasatankala srinivas, palasa
tankala srinivas, palasashiva782
 
Energy efficient routing_in_wireless_sensor_networks
Energy efficient routing_in_wireless_sensor_networksEnergy efficient routing_in_wireless_sensor_networks
Energy efficient routing_in_wireless_sensor_networksGr Patel
 
18 9254 eeem diminishing connectivity edit septian
18 9254 eeem diminishing connectivity edit septian18 9254 eeem diminishing connectivity edit septian
18 9254 eeem diminishing connectivity edit septianIAESIJEECS
 
Cube2012 Submission 359
Cube2012 Submission 359Cube2012 Submission 359
Cube2012 Submission 359Sandeep Saxena
 
Neural network based energy efficient clustering and routing
Neural network based energy efficient clustering and routingNeural network based energy efficient clustering and routing
Neural network based energy efficient clustering and routingambitlick
 
International Journal of Advanced Smart Sensor Network Systems (IJASSN)
International Journal of Advanced Smart Sensor Network Systems (IJASSN)International Journal of Advanced Smart Sensor Network Systems (IJASSN)
International Journal of Advanced Smart Sensor Network Systems (IJASSN)ijcseit
 
Computing localized power efficient data
Computing localized power efficient dataComputing localized power efficient data
Computing localized power efficient dataambitlick
 
De31486489
De31486489De31486489
De31486489IJMER
 
Virtual backbone trees for most minimal
Virtual backbone trees for most minimalVirtual backbone trees for most minimal
Virtual backbone trees for most minimalIJCNCJournal
 

Was ist angesagt? (15)

Kianoosh&sajjad
Kianoosh&sajjadKianoosh&sajjad
Kianoosh&sajjad
 
Clustering Based Lifetime Maximizing Aggregation Tree for Wireless Sensor Net...
Clustering Based Lifetime Maximizing Aggregation Tree for Wireless Sensor Net...Clustering Based Lifetime Maximizing Aggregation Tree for Wireless Sensor Net...
Clustering Based Lifetime Maximizing Aggregation Tree for Wireless Sensor Net...
 
An Adaptive Energy Efficient Reliable Routing Protocol for Wireless Sensor Ne...
An Adaptive Energy Efficient Reliable Routing Protocol for Wireless Sensor Ne...An Adaptive Energy Efficient Reliable Routing Protocol for Wireless Sensor Ne...
An Adaptive Energy Efficient Reliable Routing Protocol for Wireless Sensor Ne...
 
Energy Efficient Zone Divided and Energy Balanced Clustering Routing Protocol...
Energy Efficient Zone Divided and Energy Balanced Clustering Routing Protocol...Energy Efficient Zone Divided and Energy Balanced Clustering Routing Protocol...
Energy Efficient Zone Divided and Energy Balanced Clustering Routing Protocol...
 
Ijetr021229
Ijetr021229Ijetr021229
Ijetr021229
 
Kanchan ppt
Kanchan pptKanchan ppt
Kanchan ppt
 
tankala srinivas, palasa
tankala srinivas, palasatankala srinivas, palasa
tankala srinivas, palasa
 
Energy efficient routing_in_wireless_sensor_networks
Energy efficient routing_in_wireless_sensor_networksEnergy efficient routing_in_wireless_sensor_networks
Energy efficient routing_in_wireless_sensor_networks
 
18 9254 eeem diminishing connectivity edit septian
18 9254 eeem diminishing connectivity edit septian18 9254 eeem diminishing connectivity edit septian
18 9254 eeem diminishing connectivity edit septian
 
Cube2012 Submission 359
Cube2012 Submission 359Cube2012 Submission 359
Cube2012 Submission 359
 
Neural network based energy efficient clustering and routing
Neural network based energy efficient clustering and routingNeural network based energy efficient clustering and routing
Neural network based energy efficient clustering and routing
 
International Journal of Advanced Smart Sensor Network Systems (IJASSN)
International Journal of Advanced Smart Sensor Network Systems (IJASSN)International Journal of Advanced Smart Sensor Network Systems (IJASSN)
International Journal of Advanced Smart Sensor Network Systems (IJASSN)
 
Computing localized power efficient data
Computing localized power efficient dataComputing localized power efficient data
Computing localized power efficient data
 
De31486489
De31486489De31486489
De31486489
 
Virtual backbone trees for most minimal
Virtual backbone trees for most minimalVirtual backbone trees for most minimal
Virtual backbone trees for most minimal
 

Andere mochten auch

Fault Diagonosis Approach for WSN using Normal Bias Technique
Fault Diagonosis Approach for WSN using Normal Bias TechniqueFault Diagonosis Approach for WSN using Normal Bias Technique
Fault Diagonosis Approach for WSN using Normal Bias TechniqueIDES Editor
 
Wireless Sensor Networks (WSN)
Wireless Sensor Networks (WSN)Wireless Sensor Networks (WSN)
Wireless Sensor Networks (WSN)M.k. Praveen
 
Wireless sensor network (WSN)
Wireless sensor network (WSN)Wireless sensor network (WSN)
Wireless sensor network (WSN)Sajid ali
 
Wireless sensor network security
Wireless sensor network securityWireless sensor network security
Wireless sensor network securityargh61
 
Fault Node Recovery Algorithm for a Wireless Sensor Network
Fault Node Recovery Algorithm for a Wireless Sensor NetworkFault Node Recovery Algorithm for a Wireless Sensor Network
Fault Node Recovery Algorithm for a Wireless Sensor NetworkYogesh Vk
 
Fault tolerance in wsn
Fault tolerance in wsnFault tolerance in wsn
Fault tolerance in wsnElham Hormozi
 
FAULT DETECTION IN WIRELESS SENSOR NETWORK
FAULT DETECTION IN WIRELESS SENSOR NETWORKFAULT DETECTION IN WIRELESS SENSOR NETWORK
FAULT DETECTION IN WIRELESS SENSOR NETWORKPavithraRShettigar
 
Apache Kafka 0.8 basic training - Verisign
Apache Kafka 0.8 basic training - VerisignApache Kafka 0.8 basic training - Verisign
Apache Kafka 0.8 basic training - VerisignMichael Noll
 

Andere mochten auch (11)

Fault Diagonosis Approach for WSN using Normal Bias Technique
Fault Diagonosis Approach for WSN using Normal Bias TechniqueFault Diagonosis Approach for WSN using Normal Bias Technique
Fault Diagonosis Approach for WSN using Normal Bias Technique
 
Intro to wsn
Intro to wsnIntro to wsn
Intro to wsn
 
Wireless Sensor Networks (WSN)
Wireless Sensor Networks (WSN)Wireless Sensor Networks (WSN)
Wireless Sensor Networks (WSN)
 
Wireless sensor network (WSN)
Wireless sensor network (WSN)Wireless sensor network (WSN)
Wireless sensor network (WSN)
 
Wireless sensor network security
Wireless sensor network securityWireless sensor network security
Wireless sensor network security
 
Fault Node Recovery Algorithm for a Wireless Sensor Network
Fault Node Recovery Algorithm for a Wireless Sensor NetworkFault Node Recovery Algorithm for a Wireless Sensor Network
Fault Node Recovery Algorithm for a Wireless Sensor Network
 
TinyOS Course 00: Introduction to WSN
TinyOS Course 00: Introduction to WSNTinyOS Course 00: Introduction to WSN
TinyOS Course 00: Introduction to WSN
 
Fault tolerance in wsn
Fault tolerance in wsnFault tolerance in wsn
Fault tolerance in wsn
 
Wsn
WsnWsn
Wsn
 
FAULT DETECTION IN WIRELESS SENSOR NETWORK
FAULT DETECTION IN WIRELESS SENSOR NETWORKFAULT DETECTION IN WIRELESS SENSOR NETWORK
FAULT DETECTION IN WIRELESS SENSOR NETWORK
 
Apache Kafka 0.8 basic training - Verisign
Apache Kafka 0.8 basic training - VerisignApache Kafka 0.8 basic training - Verisign
Apache Kafka 0.8 basic training - Verisign
 

Ähnlich wie Fault Tolerant Clustering Protocol for Wireless Sensor Networks

Energy efficient protocol with static clustering (eepsc) comparing with low e...
Energy efficient protocol with static clustering (eepsc) comparing with low e...Energy efficient protocol with static clustering (eepsc) comparing with low e...
Energy efficient protocol with static clustering (eepsc) comparing with low e...Alexander Decker
 
DYNAMIC RE-CLUSTERING LEACH-BASED (DR-LEACH) PROTOCOL FOR WIRELESS SENSOR NET...
DYNAMIC RE-CLUSTERING LEACH-BASED (DR-LEACH) PROTOCOL FOR WIRELESS SENSOR NET...DYNAMIC RE-CLUSTERING LEACH-BASED (DR-LEACH) PROTOCOL FOR WIRELESS SENSOR NET...
DYNAMIC RE-CLUSTERING LEACH-BASED (DR-LEACH) PROTOCOL FOR WIRELESS SENSOR NET...IJCNCJournal
 
CLUSTERING ALGORITHMS FOR HETEROGENEOUS WIRELESS SENSOR NETWORKS – A BRIEF SU...
CLUSTERING ALGORITHMS FOR HETEROGENEOUS WIRELESS SENSOR NETWORKS – A BRIEF SU...CLUSTERING ALGORITHMS FOR HETEROGENEOUS WIRELESS SENSOR NETWORKS – A BRIEF SU...
CLUSTERING ALGORITHMS FOR HETEROGENEOUS WIRELESS SENSOR NETWORKS – A BRIEF SU...ijasuc
 
Energy Efficient LEACH protocol for Wireless Sensor Network (I-LEACH)
Energy Efficient LEACH protocol for Wireless Sensor Network (I-LEACH)Energy Efficient LEACH protocol for Wireless Sensor Network (I-LEACH)
Energy Efficient LEACH protocol for Wireless Sensor Network (I-LEACH)ijsrd.com
 
International Journal of Advanced Smart Sensor Network Systems ( IJASSN )
International Journal of Advanced Smart Sensor Network Systems ( IJASSN )International Journal of Advanced Smart Sensor Network Systems ( IJASSN )
International Journal of Advanced Smart Sensor Network Systems ( IJASSN )ijassn
 
IMPROVEMENT OF LEACH AND ITS VARIANTS IN WIRELESS SENSOR NETWORK
IMPROVEMENT OF LEACH AND ITS VARIANTS IN WIRELESS SENSOR NETWORKIMPROVEMENT OF LEACH AND ITS VARIANTS IN WIRELESS SENSOR NETWORK
IMPROVEMENT OF LEACH AND ITS VARIANTS IN WIRELESS SENSOR NETWORKIAEME Publication
 
Energy Efficient Data Aggregation in Wireless Sensor Networks: A Survey
Energy Efficient Data Aggregation in Wireless Sensor Networks: A SurveyEnergy Efficient Data Aggregation in Wireless Sensor Networks: A Survey
Energy Efficient Data Aggregation in Wireless Sensor Networks: A Surveyijsrd.com
 
Flow balanced routing in wireless sensor networks
Flow balanced routing in wireless sensor networksFlow balanced routing in wireless sensor networks
Flow balanced routing in wireless sensor networkseSAT Publishing House
 
29 ijaprr vol1-4-14-23kishor
29 ijaprr vol1-4-14-23kishor29 ijaprr vol1-4-14-23kishor
29 ijaprr vol1-4-14-23kishorijaprr_editor
 
Energy Efficient Optimized LEACH-C Protocol using PBO Algorithm For Wireless ...
Energy Efficient Optimized LEACH-C Protocol using PBO Algorithm For Wireless ...Energy Efficient Optimized LEACH-C Protocol using PBO Algorithm For Wireless ...
Energy Efficient Optimized LEACH-C Protocol using PBO Algorithm For Wireless ...IRJET Journal
 
Energy Efficient LEACH protocol for Wireless Sensor Network (I-LEACH)
Energy Efficient LEACH protocol for Wireless Sensor Network (I-LEACH)Energy Efficient LEACH protocol for Wireless Sensor Network (I-LEACH)
Energy Efficient LEACH protocol for Wireless Sensor Network (I-LEACH)ijsrd.com
 
Modified leach protocol in wireless sensor network a survey
Modified leach protocol in wireless sensor network a surveyModified leach protocol in wireless sensor network a survey
Modified leach protocol in wireless sensor network a surveyIAEME Publication
 
Selection of Energy Efficient Clustering Algorithm upon Cluster Head Failure ...
Selection of Energy Efficient Clustering Algorithm upon Cluster Head Failure ...Selection of Energy Efficient Clustering Algorithm upon Cluster Head Failure ...
Selection of Energy Efficient Clustering Algorithm upon Cluster Head Failure ...ijsrd.com
 
Enhanced Hybrid Clustering Scheme for Dense Wireless Sensor Networks
Enhanced Hybrid Clustering Scheme for Dense Wireless Sensor NetworksEnhanced Hybrid Clustering Scheme for Dense Wireless Sensor Networks
Enhanced Hybrid Clustering Scheme for Dense Wireless Sensor NetworksAssociate Professor in VSB Coimbatore
 
Energy Efficient Zone Divided and Energy Balanced Clustering Routing Protocol...
Energy Efficient Zone Divided and Energy Balanced Clustering Routing Protocol...Energy Efficient Zone Divided and Energy Balanced Clustering Routing Protocol...
Energy Efficient Zone Divided and Energy Balanced Clustering Routing Protocol...csijjournal
 
Improvement In LEACH Protocol By Electing Master Cluster Heads To Enhance The...
Improvement In LEACH Protocol By Electing Master Cluster Heads To Enhance The...Improvement In LEACH Protocol By Electing Master Cluster Heads To Enhance The...
Improvement In LEACH Protocol By Electing Master Cluster Heads To Enhance The...Editor IJCATR
 
Highly Scalable Energy Efficient Distributed Clustering Mechanism in Wireless...
Highly Scalable Energy Efficient Distributed Clustering Mechanism in Wireless...Highly Scalable Energy Efficient Distributed Clustering Mechanism in Wireless...
Highly Scalable Energy Efficient Distributed Clustering Mechanism in Wireless...Associate Professor in VSB Coimbatore
 
ENERGY OPTIMISATION SCHEMES FOR WIRELESS SENSOR NETWORK
ENERGY OPTIMISATION SCHEMES FOR WIRELESS SENSOR NETWORKENERGY OPTIMISATION SCHEMES FOR WIRELESS SENSOR NETWORK
ENERGY OPTIMISATION SCHEMES FOR WIRELESS SENSOR NETWORKcscpconf
 
Enhanced Leach Protocol
Enhanced Leach ProtocolEnhanced Leach Protocol
Enhanced Leach Protocolijceronline
 

Ähnlich wie Fault Tolerant Clustering Protocol for Wireless Sensor Networks (20)

Energy efficient protocol with static clustering (eepsc) comparing with low e...
Energy efficient protocol with static clustering (eepsc) comparing with low e...Energy efficient protocol with static clustering (eepsc) comparing with low e...
Energy efficient protocol with static clustering (eepsc) comparing with low e...
 
H0421043049
H0421043049H0421043049
H0421043049
 
DYNAMIC RE-CLUSTERING LEACH-BASED (DR-LEACH) PROTOCOL FOR WIRELESS SENSOR NET...
DYNAMIC RE-CLUSTERING LEACH-BASED (DR-LEACH) PROTOCOL FOR WIRELESS SENSOR NET...DYNAMIC RE-CLUSTERING LEACH-BASED (DR-LEACH) PROTOCOL FOR WIRELESS SENSOR NET...
DYNAMIC RE-CLUSTERING LEACH-BASED (DR-LEACH) PROTOCOL FOR WIRELESS SENSOR NET...
 
CLUSTERING ALGORITHMS FOR HETEROGENEOUS WIRELESS SENSOR NETWORKS – A BRIEF SU...
CLUSTERING ALGORITHMS FOR HETEROGENEOUS WIRELESS SENSOR NETWORKS – A BRIEF SU...CLUSTERING ALGORITHMS FOR HETEROGENEOUS WIRELESS SENSOR NETWORKS – A BRIEF SU...
CLUSTERING ALGORITHMS FOR HETEROGENEOUS WIRELESS SENSOR NETWORKS – A BRIEF SU...
 
Energy Efficient LEACH protocol for Wireless Sensor Network (I-LEACH)
Energy Efficient LEACH protocol for Wireless Sensor Network (I-LEACH)Energy Efficient LEACH protocol for Wireless Sensor Network (I-LEACH)
Energy Efficient LEACH protocol for Wireless Sensor Network (I-LEACH)
 
International Journal of Advanced Smart Sensor Network Systems ( IJASSN )
International Journal of Advanced Smart Sensor Network Systems ( IJASSN )International Journal of Advanced Smart Sensor Network Systems ( IJASSN )
International Journal of Advanced Smart Sensor Network Systems ( IJASSN )
 
IMPROVEMENT OF LEACH AND ITS VARIANTS IN WIRELESS SENSOR NETWORK
IMPROVEMENT OF LEACH AND ITS VARIANTS IN WIRELESS SENSOR NETWORKIMPROVEMENT OF LEACH AND ITS VARIANTS IN WIRELESS SENSOR NETWORK
IMPROVEMENT OF LEACH AND ITS VARIANTS IN WIRELESS SENSOR NETWORK
 
Energy Efficient Data Aggregation in Wireless Sensor Networks: A Survey
Energy Efficient Data Aggregation in Wireless Sensor Networks: A SurveyEnergy Efficient Data Aggregation in Wireless Sensor Networks: A Survey
Energy Efficient Data Aggregation in Wireless Sensor Networks: A Survey
 
Flow balanced routing in wireless sensor networks
Flow balanced routing in wireless sensor networksFlow balanced routing in wireless sensor networks
Flow balanced routing in wireless sensor networks
 
29 ijaprr vol1-4-14-23kishor
29 ijaprr vol1-4-14-23kishor29 ijaprr vol1-4-14-23kishor
29 ijaprr vol1-4-14-23kishor
 
Energy Efficient Optimized LEACH-C Protocol using PBO Algorithm For Wireless ...
Energy Efficient Optimized LEACH-C Protocol using PBO Algorithm For Wireless ...Energy Efficient Optimized LEACH-C Protocol using PBO Algorithm For Wireless ...
Energy Efficient Optimized LEACH-C Protocol using PBO Algorithm For Wireless ...
 
Energy Efficient LEACH protocol for Wireless Sensor Network (I-LEACH)
Energy Efficient LEACH protocol for Wireless Sensor Network (I-LEACH)Energy Efficient LEACH protocol for Wireless Sensor Network (I-LEACH)
Energy Efficient LEACH protocol for Wireless Sensor Network (I-LEACH)
 
Modified leach protocol in wireless sensor network a survey
Modified leach protocol in wireless sensor network a surveyModified leach protocol in wireless sensor network a survey
Modified leach protocol in wireless sensor network a survey
 
Selection of Energy Efficient Clustering Algorithm upon Cluster Head Failure ...
Selection of Energy Efficient Clustering Algorithm upon Cluster Head Failure ...Selection of Energy Efficient Clustering Algorithm upon Cluster Head Failure ...
Selection of Energy Efficient Clustering Algorithm upon Cluster Head Failure ...
 
Enhanced Hybrid Clustering Scheme for Dense Wireless Sensor Networks
Enhanced Hybrid Clustering Scheme for Dense Wireless Sensor NetworksEnhanced Hybrid Clustering Scheme for Dense Wireless Sensor Networks
Enhanced Hybrid Clustering Scheme for Dense Wireless Sensor Networks
 
Energy Efficient Zone Divided and Energy Balanced Clustering Routing Protocol...
Energy Efficient Zone Divided and Energy Balanced Clustering Routing Protocol...Energy Efficient Zone Divided and Energy Balanced Clustering Routing Protocol...
Energy Efficient Zone Divided and Energy Balanced Clustering Routing Protocol...
 
Improvement In LEACH Protocol By Electing Master Cluster Heads To Enhance The...
Improvement In LEACH Protocol By Electing Master Cluster Heads To Enhance The...Improvement In LEACH Protocol By Electing Master Cluster Heads To Enhance The...
Improvement In LEACH Protocol By Electing Master Cluster Heads To Enhance The...
 
Highly Scalable Energy Efficient Distributed Clustering Mechanism in Wireless...
Highly Scalable Energy Efficient Distributed Clustering Mechanism in Wireless...Highly Scalable Energy Efficient Distributed Clustering Mechanism in Wireless...
Highly Scalable Energy Efficient Distributed Clustering Mechanism in Wireless...
 
ENERGY OPTIMISATION SCHEMES FOR WIRELESS SENSOR NETWORK
ENERGY OPTIMISATION SCHEMES FOR WIRELESS SENSOR NETWORKENERGY OPTIMISATION SCHEMES FOR WIRELESS SENSOR NETWORK
ENERGY OPTIMISATION SCHEMES FOR WIRELESS SENSOR NETWORK
 
Enhanced Leach Protocol
Enhanced Leach ProtocolEnhanced Leach Protocol
Enhanced Leach Protocol
 

Mehr von IDES Editor

Power System State Estimation - A Review
Power System State Estimation - A ReviewPower System State Estimation - A Review
Power System State Estimation - A ReviewIDES Editor
 
Artificial Intelligence Technique based Reactive Power Planning Incorporating...
Artificial Intelligence Technique based Reactive Power Planning Incorporating...Artificial Intelligence Technique based Reactive Power Planning Incorporating...
Artificial Intelligence Technique based Reactive Power Planning Incorporating...IDES Editor
 
Design and Performance Analysis of Genetic based PID-PSS with SVC in a Multi-...
Design and Performance Analysis of Genetic based PID-PSS with SVC in a Multi-...Design and Performance Analysis of Genetic based PID-PSS with SVC in a Multi-...
Design and Performance Analysis of Genetic based PID-PSS with SVC in a Multi-...IDES Editor
 
Optimal Placement of DG for Loss Reduction and Voltage Sag Mitigation in Radi...
Optimal Placement of DG for Loss Reduction and Voltage Sag Mitigation in Radi...Optimal Placement of DG for Loss Reduction and Voltage Sag Mitigation in Radi...
Optimal Placement of DG for Loss Reduction and Voltage Sag Mitigation in Radi...IDES Editor
 
Line Losses in the 14-Bus Power System Network using UPFC
Line Losses in the 14-Bus Power System Network using UPFCLine Losses in the 14-Bus Power System Network using UPFC
Line Losses in the 14-Bus Power System Network using UPFCIDES Editor
 
Study of Structural Behaviour of Gravity Dam with Various Features of Gallery...
Study of Structural Behaviour of Gravity Dam with Various Features of Gallery...Study of Structural Behaviour of Gravity Dam with Various Features of Gallery...
Study of Structural Behaviour of Gravity Dam with Various Features of Gallery...IDES Editor
 
Assessing Uncertainty of Pushover Analysis to Geometric Modeling
Assessing Uncertainty of Pushover Analysis to Geometric ModelingAssessing Uncertainty of Pushover Analysis to Geometric Modeling
Assessing Uncertainty of Pushover Analysis to Geometric ModelingIDES Editor
 
Secure Multi-Party Negotiation: An Analysis for Electronic Payments in Mobile...
Secure Multi-Party Negotiation: An Analysis for Electronic Payments in Mobile...Secure Multi-Party Negotiation: An Analysis for Electronic Payments in Mobile...
Secure Multi-Party Negotiation: An Analysis for Electronic Payments in Mobile...IDES Editor
 
Selfish Node Isolation & Incentivation using Progressive Thresholds
Selfish Node Isolation & Incentivation using Progressive ThresholdsSelfish Node Isolation & Incentivation using Progressive Thresholds
Selfish Node Isolation & Incentivation using Progressive ThresholdsIDES Editor
 
Various OSI Layer Attacks and Countermeasure to Enhance the Performance of WS...
Various OSI Layer Attacks and Countermeasure to Enhance the Performance of WS...Various OSI Layer Attacks and Countermeasure to Enhance the Performance of WS...
Various OSI Layer Attacks and Countermeasure to Enhance the Performance of WS...IDES Editor
 
Responsive Parameter based an AntiWorm Approach to Prevent Wormhole Attack in...
Responsive Parameter based an AntiWorm Approach to Prevent Wormhole Attack in...Responsive Parameter based an AntiWorm Approach to Prevent Wormhole Attack in...
Responsive Parameter based an AntiWorm Approach to Prevent Wormhole Attack in...IDES Editor
 
Cloud Security and Data Integrity with Client Accountability Framework
Cloud Security and Data Integrity with Client Accountability FrameworkCloud Security and Data Integrity with Client Accountability Framework
Cloud Security and Data Integrity with Client Accountability FrameworkIDES Editor
 
Genetic Algorithm based Layered Detection and Defense of HTTP Botnet
Genetic Algorithm based Layered Detection and Defense of HTTP BotnetGenetic Algorithm based Layered Detection and Defense of HTTP Botnet
Genetic Algorithm based Layered Detection and Defense of HTTP BotnetIDES Editor
 
Enhancing Data Storage Security in Cloud Computing Through Steganography
Enhancing Data Storage Security in Cloud Computing Through SteganographyEnhancing Data Storage Security in Cloud Computing Through Steganography
Enhancing Data Storage Security in Cloud Computing Through SteganographyIDES Editor
 
Low Energy Routing for WSN’s
Low Energy Routing for WSN’sLow Energy Routing for WSN’s
Low Energy Routing for WSN’sIDES Editor
 
Permutation of Pixels within the Shares of Visual Cryptography using KBRP for...
Permutation of Pixels within the Shares of Visual Cryptography using KBRP for...Permutation of Pixels within the Shares of Visual Cryptography using KBRP for...
Permutation of Pixels within the Shares of Visual Cryptography using KBRP for...IDES Editor
 
Rotman Lens Performance Analysis
Rotman Lens Performance AnalysisRotman Lens Performance Analysis
Rotman Lens Performance AnalysisIDES Editor
 
Band Clustering for the Lossless Compression of AVIRIS Hyperspectral Images
Band Clustering for the Lossless Compression of AVIRIS Hyperspectral ImagesBand Clustering for the Lossless Compression of AVIRIS Hyperspectral Images
Band Clustering for the Lossless Compression of AVIRIS Hyperspectral ImagesIDES Editor
 
Microelectronic Circuit Analogous to Hydrogen Bonding Network in Active Site ...
Microelectronic Circuit Analogous to Hydrogen Bonding Network in Active Site ...Microelectronic Circuit Analogous to Hydrogen Bonding Network in Active Site ...
Microelectronic Circuit Analogous to Hydrogen Bonding Network in Active Site ...IDES Editor
 
Texture Unit based Monocular Real-world Scene Classification using SOM and KN...
Texture Unit based Monocular Real-world Scene Classification using SOM and KN...Texture Unit based Monocular Real-world Scene Classification using SOM and KN...
Texture Unit based Monocular Real-world Scene Classification using SOM and KN...IDES Editor
 

Mehr von IDES Editor (20)

Power System State Estimation - A Review
Power System State Estimation - A ReviewPower System State Estimation - A Review
Power System State Estimation - A Review
 
Artificial Intelligence Technique based Reactive Power Planning Incorporating...
Artificial Intelligence Technique based Reactive Power Planning Incorporating...Artificial Intelligence Technique based Reactive Power Planning Incorporating...
Artificial Intelligence Technique based Reactive Power Planning Incorporating...
 
Design and Performance Analysis of Genetic based PID-PSS with SVC in a Multi-...
Design and Performance Analysis of Genetic based PID-PSS with SVC in a Multi-...Design and Performance Analysis of Genetic based PID-PSS with SVC in a Multi-...
Design and Performance Analysis of Genetic based PID-PSS with SVC in a Multi-...
 
Optimal Placement of DG for Loss Reduction and Voltage Sag Mitigation in Radi...
Optimal Placement of DG for Loss Reduction and Voltage Sag Mitigation in Radi...Optimal Placement of DG for Loss Reduction and Voltage Sag Mitigation in Radi...
Optimal Placement of DG for Loss Reduction and Voltage Sag Mitigation in Radi...
 
Line Losses in the 14-Bus Power System Network using UPFC
Line Losses in the 14-Bus Power System Network using UPFCLine Losses in the 14-Bus Power System Network using UPFC
Line Losses in the 14-Bus Power System Network using UPFC
 
Study of Structural Behaviour of Gravity Dam with Various Features of Gallery...
Study of Structural Behaviour of Gravity Dam with Various Features of Gallery...Study of Structural Behaviour of Gravity Dam with Various Features of Gallery...
Study of Structural Behaviour of Gravity Dam with Various Features of Gallery...
 
Assessing Uncertainty of Pushover Analysis to Geometric Modeling
Assessing Uncertainty of Pushover Analysis to Geometric ModelingAssessing Uncertainty of Pushover Analysis to Geometric Modeling
Assessing Uncertainty of Pushover Analysis to Geometric Modeling
 
Secure Multi-Party Negotiation: An Analysis for Electronic Payments in Mobile...
Secure Multi-Party Negotiation: An Analysis for Electronic Payments in Mobile...Secure Multi-Party Negotiation: An Analysis for Electronic Payments in Mobile...
Secure Multi-Party Negotiation: An Analysis for Electronic Payments in Mobile...
 
Selfish Node Isolation & Incentivation using Progressive Thresholds
Selfish Node Isolation & Incentivation using Progressive ThresholdsSelfish Node Isolation & Incentivation using Progressive Thresholds
Selfish Node Isolation & Incentivation using Progressive Thresholds
 
Various OSI Layer Attacks and Countermeasure to Enhance the Performance of WS...
Various OSI Layer Attacks and Countermeasure to Enhance the Performance of WS...Various OSI Layer Attacks and Countermeasure to Enhance the Performance of WS...
Various OSI Layer Attacks and Countermeasure to Enhance the Performance of WS...
 
Responsive Parameter based an AntiWorm Approach to Prevent Wormhole Attack in...
Responsive Parameter based an AntiWorm Approach to Prevent Wormhole Attack in...Responsive Parameter based an AntiWorm Approach to Prevent Wormhole Attack in...
Responsive Parameter based an AntiWorm Approach to Prevent Wormhole Attack in...
 
Cloud Security and Data Integrity with Client Accountability Framework
Cloud Security and Data Integrity with Client Accountability FrameworkCloud Security and Data Integrity with Client Accountability Framework
Cloud Security and Data Integrity with Client Accountability Framework
 
Genetic Algorithm based Layered Detection and Defense of HTTP Botnet
Genetic Algorithm based Layered Detection and Defense of HTTP BotnetGenetic Algorithm based Layered Detection and Defense of HTTP Botnet
Genetic Algorithm based Layered Detection and Defense of HTTP Botnet
 
Enhancing Data Storage Security in Cloud Computing Through Steganography
Enhancing Data Storage Security in Cloud Computing Through SteganographyEnhancing Data Storage Security in Cloud Computing Through Steganography
Enhancing Data Storage Security in Cloud Computing Through Steganography
 
Low Energy Routing for WSN’s
Low Energy Routing for WSN’sLow Energy Routing for WSN’s
Low Energy Routing for WSN’s
 
Permutation of Pixels within the Shares of Visual Cryptography using KBRP for...
Permutation of Pixels within the Shares of Visual Cryptography using KBRP for...Permutation of Pixels within the Shares of Visual Cryptography using KBRP for...
Permutation of Pixels within the Shares of Visual Cryptography using KBRP for...
 
Rotman Lens Performance Analysis
Rotman Lens Performance AnalysisRotman Lens Performance Analysis
Rotman Lens Performance Analysis
 
Band Clustering for the Lossless Compression of AVIRIS Hyperspectral Images
Band Clustering for the Lossless Compression of AVIRIS Hyperspectral ImagesBand Clustering for the Lossless Compression of AVIRIS Hyperspectral Images
Band Clustering for the Lossless Compression of AVIRIS Hyperspectral Images
 
Microelectronic Circuit Analogous to Hydrogen Bonding Network in Active Site ...
Microelectronic Circuit Analogous to Hydrogen Bonding Network in Active Site ...Microelectronic Circuit Analogous to Hydrogen Bonding Network in Active Site ...
Microelectronic Circuit Analogous to Hydrogen Bonding Network in Active Site ...
 
Texture Unit based Monocular Real-world Scene Classification using SOM and KN...
Texture Unit based Monocular Real-world Scene Classification using SOM and KN...Texture Unit based Monocular Real-world Scene Classification using SOM and KN...
Texture Unit based Monocular Real-world Scene Classification using SOM and KN...
 

Kürzlich hochgeladen

Tableaux 9ème étape circuit fédéral 2024
Tableaux 9ème étape circuit fédéral 2024Tableaux 9ème étape circuit fédéral 2024
Tableaux 9ème étape circuit fédéral 2024HechemLaameri
 
08448380779 Call Girls In Lajpat Nagar Women Seeking Men
08448380779 Call Girls In Lajpat Nagar Women Seeking Men08448380779 Call Girls In Lajpat Nagar Women Seeking Men
08448380779 Call Girls In Lajpat Nagar Women Seeking MenDelhi Call girls
 
08448380779 Call Girls In International Airport Women Seeking Men
08448380779 Call Girls In International Airport Women Seeking Men08448380779 Call Girls In International Airport Women Seeking Men
08448380779 Call Girls In International Airport Women Seeking MenDelhi Call girls
 
大学假文凭《原版英国Imperial文凭》帝国理工学院毕业证制作成绩单修改
大学假文凭《原版英国Imperial文凭》帝国理工学院毕业证制作成绩单修改大学假文凭《原版英国Imperial文凭》帝国理工学院毕业证制作成绩单修改
大学假文凭《原版英国Imperial文凭》帝国理工学院毕业证制作成绩单修改atducpo
 
JORNADA 5 LIGA MURO 2024INSUGURACION.pdf
JORNADA 5 LIGA MURO 2024INSUGURACION.pdfJORNADA 5 LIGA MURO 2024INSUGURACION.pdf
JORNADA 5 LIGA MURO 2024INSUGURACION.pdfArturo Pacheco Alvarez
 
Who Is Emmanuel Katto Uganda? His Career, personal life etc.
Who Is Emmanuel Katto Uganda? His Career, personal life etc.Who Is Emmanuel Katto Uganda? His Career, personal life etc.
Who Is Emmanuel Katto Uganda? His Career, personal life etc.Marina Costa
 
Slovenia Vs Serbia UEFA Euro 2024 Fixture Guide Every Fixture Detailed.docx
Slovenia Vs Serbia UEFA Euro 2024 Fixture Guide Every Fixture Detailed.docxSlovenia Vs Serbia UEFA Euro 2024 Fixture Guide Every Fixture Detailed.docx
Slovenia Vs Serbia UEFA Euro 2024 Fixture Guide Every Fixture Detailed.docxWorld Wide Tickets And Hospitality
 
Technical Data | Sig Sauer Easy6 BDX 1-6x24 | Optics Trade
Technical Data | Sig Sauer Easy6 BDX 1-6x24 | Optics TradeTechnical Data | Sig Sauer Easy6 BDX 1-6x24 | Optics Trade
Technical Data | Sig Sauer Easy6 BDX 1-6x24 | Optics TradeOptics-Trade
 
Jankipuram / Call Girls Lucknow | Whatsapp No 🫗 8923113531 🎳 VIP Escorts Serv...
Jankipuram / Call Girls Lucknow | Whatsapp No 🫗 8923113531 🎳 VIP Escorts Serv...Jankipuram / Call Girls Lucknow | Whatsapp No 🫗 8923113531 🎳 VIP Escorts Serv...
Jankipuram / Call Girls Lucknow | Whatsapp No 🫗 8923113531 🎳 VIP Escorts Serv...gurkirankumar98700
 
Atlanta Dream Exec Dan Gadd on Driving Fan Engagement and Growth, Serving the...
Atlanta Dream Exec Dan Gadd on Driving Fan Engagement and Growth, Serving the...Atlanta Dream Exec Dan Gadd on Driving Fan Engagement and Growth, Serving the...
Atlanta Dream Exec Dan Gadd on Driving Fan Engagement and Growth, Serving the...Neil Horowitz
 
CALL ON ➥8923113531 🔝Call Girls Telibagh Lucknow best Night Fun service 🧣
CALL ON ➥8923113531 🔝Call Girls Telibagh Lucknow best Night Fun service  🧣CALL ON ➥8923113531 🔝Call Girls Telibagh Lucknow best Night Fun service  🧣
CALL ON ➥8923113531 🔝Call Girls Telibagh Lucknow best Night Fun service 🧣anilsa9823
 
( Sports training) All topic (MCQs).pptx
( Sports training) All topic (MCQs).pptx( Sports training) All topic (MCQs).pptx
( Sports training) All topic (MCQs).pptxParshotamGupta1
 
9990611130 Find & Book Russian Call Girls In Ghazipur
9990611130 Find & Book Russian Call Girls In Ghazipur9990611130 Find & Book Russian Call Girls In Ghazipur
9990611130 Find & Book Russian Call Girls In GhazipurGenuineGirls
 
Albania Vs Spain Albania is Loaded with Defensive Talent on their Roster.docx
Albania Vs Spain Albania is Loaded with Defensive Talent on their Roster.docxAlbania Vs Spain Albania is Loaded with Defensive Talent on their Roster.docx
Albania Vs Spain Albania is Loaded with Defensive Talent on their Roster.docxWorld Wide Tickets And Hospitality
 
🔝|97111༒99012🔝 Call Girls In {Delhi} Cr Park ₹5.5k Cash Payment With Room De...
🔝|97111༒99012🔝 Call Girls In  {Delhi} Cr Park ₹5.5k Cash Payment With Room De...🔝|97111༒99012🔝 Call Girls In  {Delhi} Cr Park ₹5.5k Cash Payment With Room De...
🔝|97111༒99012🔝 Call Girls In {Delhi} Cr Park ₹5.5k Cash Payment With Room De...Diya Sharma
 
Croatia vs Italy Euro Cup 2024 Three pitfalls for Spalletti’s Italy in Group ...
Croatia vs Italy Euro Cup 2024 Three pitfalls for Spalletti’s Italy in Group ...Croatia vs Italy Euro Cup 2024 Three pitfalls for Spalletti’s Italy in Group ...
Croatia vs Italy Euro Cup 2024 Three pitfalls for Spalletti’s Italy in Group ...Eticketing.co
 
ALL NFL NETWORK CONTACTS- April 29, 2024
ALL NFL NETWORK CONTACTS- April 29, 2024ALL NFL NETWORK CONTACTS- April 29, 2024
ALL NFL NETWORK CONTACTS- April 29, 2024Brian Slack
 
CALL ON ➥8923113531 🔝Call Girls Saharaganj Lucknow best Female service 🦺
CALL ON ➥8923113531 🔝Call Girls Saharaganj Lucknow best Female service  🦺CALL ON ➥8923113531 🔝Call Girls Saharaganj Lucknow best Female service  🦺
CALL ON ➥8923113531 🔝Call Girls Saharaganj Lucknow best Female service 🦺anilsa9823
 

Kürzlich hochgeladen (20)

Tableaux 9ème étape circuit fédéral 2024
Tableaux 9ème étape circuit fédéral 2024Tableaux 9ème étape circuit fédéral 2024
Tableaux 9ème étape circuit fédéral 2024
 
08448380779 Call Girls In Lajpat Nagar Women Seeking Men
08448380779 Call Girls In Lajpat Nagar Women Seeking Men08448380779 Call Girls In Lajpat Nagar Women Seeking Men
08448380779 Call Girls In Lajpat Nagar Women Seeking Men
 
08448380779 Call Girls In International Airport Women Seeking Men
08448380779 Call Girls In International Airport Women Seeking Men08448380779 Call Girls In International Airport Women Seeking Men
08448380779 Call Girls In International Airport Women Seeking Men
 
大学假文凭《原版英国Imperial文凭》帝国理工学院毕业证制作成绩单修改
大学假文凭《原版英国Imperial文凭》帝国理工学院毕业证制作成绩单修改大学假文凭《原版英国Imperial文凭》帝国理工学院毕业证制作成绩单修改
大学假文凭《原版英国Imperial文凭》帝国理工学院毕业证制作成绩单修改
 
JORNADA 5 LIGA MURO 2024INSUGURACION.pdf
JORNADA 5 LIGA MURO 2024INSUGURACION.pdfJORNADA 5 LIGA MURO 2024INSUGURACION.pdf
JORNADA 5 LIGA MURO 2024INSUGURACION.pdf
 
Who Is Emmanuel Katto Uganda? His Career, personal life etc.
Who Is Emmanuel Katto Uganda? His Career, personal life etc.Who Is Emmanuel Katto Uganda? His Career, personal life etc.
Who Is Emmanuel Katto Uganda? His Career, personal life etc.
 
Slovenia Vs Serbia UEFA Euro 2024 Fixture Guide Every Fixture Detailed.docx
Slovenia Vs Serbia UEFA Euro 2024 Fixture Guide Every Fixture Detailed.docxSlovenia Vs Serbia UEFA Euro 2024 Fixture Guide Every Fixture Detailed.docx
Slovenia Vs Serbia UEFA Euro 2024 Fixture Guide Every Fixture Detailed.docx
 
Technical Data | Sig Sauer Easy6 BDX 1-6x24 | Optics Trade
Technical Data | Sig Sauer Easy6 BDX 1-6x24 | Optics TradeTechnical Data | Sig Sauer Easy6 BDX 1-6x24 | Optics Trade
Technical Data | Sig Sauer Easy6 BDX 1-6x24 | Optics Trade
 
Jankipuram / Call Girls Lucknow | Whatsapp No 🫗 8923113531 🎳 VIP Escorts Serv...
Jankipuram / Call Girls Lucknow | Whatsapp No 🫗 8923113531 🎳 VIP Escorts Serv...Jankipuram / Call Girls Lucknow | Whatsapp No 🫗 8923113531 🎳 VIP Escorts Serv...
Jankipuram / Call Girls Lucknow | Whatsapp No 🫗 8923113531 🎳 VIP Escorts Serv...
 
Atlanta Dream Exec Dan Gadd on Driving Fan Engagement and Growth, Serving the...
Atlanta Dream Exec Dan Gadd on Driving Fan Engagement and Growth, Serving the...Atlanta Dream Exec Dan Gadd on Driving Fan Engagement and Growth, Serving the...
Atlanta Dream Exec Dan Gadd on Driving Fan Engagement and Growth, Serving the...
 
CALL ON ➥8923113531 🔝Call Girls Telibagh Lucknow best Night Fun service 🧣
CALL ON ➥8923113531 🔝Call Girls Telibagh Lucknow best Night Fun service  🧣CALL ON ➥8923113531 🔝Call Girls Telibagh Lucknow best Night Fun service  🧣
CALL ON ➥8923113531 🔝Call Girls Telibagh Lucknow best Night Fun service 🧣
 
Call Girls In RK Puram 📱 9999965857 🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SERVICE
Call Girls In RK Puram 📱  9999965857  🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SERVICECall Girls In RK Puram 📱  9999965857  🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SERVICE
Call Girls In RK Puram 📱 9999965857 🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SERVICE
 
( Sports training) All topic (MCQs).pptx
( Sports training) All topic (MCQs).pptx( Sports training) All topic (MCQs).pptx
( Sports training) All topic (MCQs).pptx
 
9990611130 Find & Book Russian Call Girls In Ghazipur
9990611130 Find & Book Russian Call Girls In Ghazipur9990611130 Find & Book Russian Call Girls In Ghazipur
9990611130 Find & Book Russian Call Girls In Ghazipur
 
Albania Vs Spain Albania is Loaded with Defensive Talent on their Roster.docx
Albania Vs Spain Albania is Loaded with Defensive Talent on their Roster.docxAlbania Vs Spain Albania is Loaded with Defensive Talent on their Roster.docx
Albania Vs Spain Albania is Loaded with Defensive Talent on their Roster.docx
 
🔝|97111༒99012🔝 Call Girls In {Delhi} Cr Park ₹5.5k Cash Payment With Room De...
🔝|97111༒99012🔝 Call Girls In  {Delhi} Cr Park ₹5.5k Cash Payment With Room De...🔝|97111༒99012🔝 Call Girls In  {Delhi} Cr Park ₹5.5k Cash Payment With Room De...
🔝|97111༒99012🔝 Call Girls In {Delhi} Cr Park ₹5.5k Cash Payment With Room De...
 
Croatia vs Italy Euro Cup 2024 Three pitfalls for Spalletti’s Italy in Group ...
Croatia vs Italy Euro Cup 2024 Three pitfalls for Spalletti’s Italy in Group ...Croatia vs Italy Euro Cup 2024 Three pitfalls for Spalletti’s Italy in Group ...
Croatia vs Italy Euro Cup 2024 Three pitfalls for Spalletti’s Italy in Group ...
 
ALL NFL NETWORK CONTACTS- April 29, 2024
ALL NFL NETWORK CONTACTS- April 29, 2024ALL NFL NETWORK CONTACTS- April 29, 2024
ALL NFL NETWORK CONTACTS- April 29, 2024
 
Call Girls 🫤 Malviya Nagar ➡️ 9999965857 ➡️ Delhi 🫦 Russian Escorts FULL ENJOY
Call Girls 🫤 Malviya Nagar ➡️ 9999965857  ➡️ Delhi 🫦  Russian Escorts FULL ENJOYCall Girls 🫤 Malviya Nagar ➡️ 9999965857  ➡️ Delhi 🫦  Russian Escorts FULL ENJOY
Call Girls 🫤 Malviya Nagar ➡️ 9999965857 ➡️ Delhi 🫦 Russian Escorts FULL ENJOY
 
CALL ON ➥8923113531 🔝Call Girls Saharaganj Lucknow best Female service 🦺
CALL ON ➥8923113531 🔝Call Girls Saharaganj Lucknow best Female service  🦺CALL ON ➥8923113531 🔝Call Girls Saharaganj Lucknow best Female service  🦺
CALL ON ➥8923113531 🔝Call Girls Saharaganj Lucknow best Female service 🦺
 

Fault Tolerant Clustering Protocol for Wireless Sensor Networks

  • 1. ACEEE Int. J. on Network Security, Vol. 01, No. 03, Dec 2010 FTTCP: Fault Tolerant Two-level Clustering Protocol for WSN Amarjeet Kaur1, T P Sharma2 CSE Department, NIT Hamirpur, India 1 mail4amarjeet@gmail.com 2 teek@nitham.ac.in Abstract— In this paper, we propose an agreement-based fault Sensor nodes are prone to failure due to harsh detection and recovery protocol for cluster head (CH) in environment. The failure of a sensor node affects the wireless sensor networks (WSNs) of two level cluster normal operation of a WSN [3].The failure of a CH makes hierarchy. The aim of protocol is to accurately detect CH situation even worse. In literature, number of authors have failure to avoid unnecessary energy consumption caused by a mistaken detection process. For this, it allows each cluster proposed fault tolerant protocols [4-7]. In this paper, we member to detect its CH failure independently. Cluster propose a fault tolerant protocol for WSN, which is based members employ distributed agreement protocol to reach an on agreement protocol. agreement on failure of the CH among multiple cluster members. The detection process runs concurrently with II. RELATED WORK normal network operation by periodically performing a distributed detection process at each cluster member To Clustering is an effective way for improving the energy reduce energy consumption, it makes use of heartbeat efficiency and prolonging the network lifetime of WSNs. messages sent periodically by a CH for fault detection. The CH failure causes the connectivity and data loss within Simulation results show, our protocol provides high detection cluster. It also disconnects cluster members from rest of the accuracy because of agreement protocol. network. Hence, it is crucial to detect and recover the CH Keywords—Wireless Sensor Network, Clustering, Fault failure to maintain normal operation of cluster and network detection, Agreement protocol, Detection accuracy. as a whole. Bandyopadhyay et al. [8] proposed a multi level I. INTRODUCTION clustering scheme in multi hop fashion. It derives probability of becoming a CH that minimizes energy Wireless sensor networks (WSNs) consist of hundreds dissipation. These probability functions are highly complex and even thousands of small tiny devices called sensor and thus require numerical optimizations. It also gives the nodes distributed autonomously to monitor physical concept of forced CHs i.e. if a node does not fall within the /environmental conditions (like temperature, sound, range of any CH, it becomes a CH itself. Periodical run of vibration, pressure etc); motion at different locations; clustering algorithm for load balancing is used here also. industrial sensing, infrastructure protection, battlefield In REED (Robust Energy Efficient Distributed awareness etc. Each sensor node has sensing, computation, clustering) [9], a k-fault tolerant (i.e., k-connected) network and wireless communication capabilities [1]. Sensor nodes is constructed. In this, fault tolerance is achieved by sense the data and send it to base station (BS). Sensor selecting k independent sets of cluster heads on top of the nodes are small in size powered by small onboard batteries physical network, so that each node can quickly switch to that store few Joules. Sensor nodes are often left other cluster heads in case of failures or attacks on its unattended which makes it difficult or impossible to re- current cluster head. The independent cluster head overlays charge or replace their batteries. The cost of transmitting also provide load balancing and security. In this, information is much higher than computation and hence it periodically re-clustering the network is done which is necessary to reduce the number of transmissions. consumes significant energy. Moreover, to maintain a list In many situations, sensor nodes are organized into of k cluster heads list requires a lot of storage space. clusters where data collected by sensor nodes is sent to In EEMC (An Energy Efficient Multi Level Clustering) [10], CHs local cluster BS (e.g. CH). CH processes this data and at each level are elected on the basis of probability function sends it to the BS. Clustering is an effective way to reduce which takes into consideration the residual energy as well the number of transmissions and prolongs the life time of a as distance factor very efficiently. In this scheme whole network. The CH processes the data collected from all information is sent and received by sink node for cluster cluster members and transmits towards BS after suitable formation. Fault tolerance is provided by periodic re- processing. Due to this, CH drains energy much faster than clustering of whole network. cluster members. The role of CH must be rotated among In cellular approach to fault detection and recovery [11], cluster members to prolong the life time of the network. network is partitioned into a virtual grid of cells, where There are number of clustering-based routing protocols each cell consists of a group of sensor nodes. A cell proposed in literature for WSNs [2]. These protocols manager and a secondary manager are chosen in each cell improve energy consumption and performance when to perform fault management tasks. Secondary manager compared to flat large-scale WSNs, but they also increase works as back up node which will take control of the cell the overhead to configure and maintain the network. when cell manager fails to operate. This protocol handles only those failures which are caused by energy depletion. © 2010 ACEEE 28 DOI: 01.IJNS.01.03.177
  • 2. ACEEE Int. J. on Network Security, Vol. 01, No. 03, Dec 2010 FTEP [12] is a dynamic and distributed CH election B. Sensor Node’s Energy Model algorithm with fault tolerance capabilities based upon two- A sensor node consists of sensors, analog signal level clustering scheme. If energy level of current CH falls conditioning, data conversion circuitry, digital signal below a threshold value or any CH fails to communicate processing and a radio link. Each component of sensor with cluster members then election process is started which node consumes energy for sending and receiving data. The is based on residual energy of sensor nodes. This election following energy consumption model shows the energy, process appoints a CH and a back up node to handle CH consumed by components of sensor node. failure. It has a single point (back up node) to detect failure Assuming path loss, the energy consumption on each which may itself be disastrous. sensor node is: III. SYSTEM MODEL In this paper we extended our previous work [13] for fault detection and recovery protocol for two –level clustering. According to eq. 1, the transmitter unit consumes A. Network Model energy to send bits; where e_tx the energy is consumed Figure 1 shows the two-level clustering network model by transmitter electronics per bit and is the energy that used. Various symbols and terms used are shown in used by amplifier per bit. According to eq. 2, the receiving Table I. All sensor nodes are homogeneous, which have unit consumes energy to receive bits, where is the two transmission modes i.e. high power transmission mode energy used by receiver electronics per bit. for communication between CHs and BS and low power transmission mode for communication between cluster TABLE I members and CH. The distribution of sensor nodes is NOTATIONS USED IN PAPER uniform throughout the environment. Communication Distance that message travels medium is radio links. Links between two sensor nodes is Number of bits in the message considered bidirectional. There is only single channel for Energy dissipated in transmitter electronics per bit communication between sensor nodes. (taken to be 50nJ/bit) Energy dissipated in transmitter amplifier (taken to be 50nJ/bit) Energy dissipated in receiver electronics per bit (taken to be 50nJ/bit) Energy consumed in transmission Energy consumed in receiving TR/2 Status vector Location of node Cluster head of cluster Cluster Current energy of node Energy level at which sensor node can participant tr/2 in election of at level-1 Energy level at which current starts election process at level-1 Energy level up to which election process must be Level-2 CH completed at level-1 Level -1 CH Energy level at which sensor node can participant in election of at level-2 Common Node Energy level at which current starts election process at level-2 Figure 1 Network Model Energy level up to which election process must be During the network deployment, all the sensor nodes completed at level-2 are assigned same initial energy value. All sensor nodes are Transmission range of node at level-1 assumed to know their geographical location [14]. We Transmission range of node at level-2 assume that clusters may overlap during election procedure so that every sensor node comes under at least one cluster. Table I summarizes the meaning of each term and Initially, some sensor nodes are randomly selected as CHs its typical value. The values for  and they announce their energy levels and location , , and are updated during each election information. These CHs start working in high power process at level-1. Typically, value of for next transmission mode while other regular sensor nodes work election round is set to the average value of the energy in low power transmission mode. levels of all candidate nodes during current election round. © 2010 ACEEE 29 DOI: 01.IJNS.01.03.177
  • 3. ACEEE Int. J. on Network Security, Vol. 01, No. 03, Dec 2010 The values of is set according to . The values of is set according to as follows: - (energy consumption during election process + energy consumption in data transmission during any node i that period) These values of , and calculate Y N similarly for cluster at level-2. Send CH Wait for Advertise CH IV. FTTCP PROTOCOL ment Advertisem FTTCP works in two phases namely: setup phase and steady state phase. Setup phase runs only once, when network starts working. In setup phase, clusters are formed Wait for Send Join Join message to and remain fixed through-out the lifetime of network. CH with message Steady state phase consists of three phases: CH election, f energy and failure detection and failure recovery. Failure detection runs parallel with network operation. Create TDMA Wait for A. Setup Phase Schedule & TDMA send it to CM Schedul Clusters are formed only once during the setup phase and elect e from before the network starts to run (as shown in Figure 2). Here we explain only level-2, level-1 explained in [13]. After the formation of clusters at level-1, some CHs are randomly selected as a CH for level-2, because energy of Steady State each CH at level-1 is equal in amount. CHs send advertisement messages that contain energy and location Figure 2 Setup Phase information of CHs to neighboring CHs (at level-1). Each CH that listen to this advertisement message responds with a return message comprising its residual energy and at any location. However, a CH may be in the range of multiple CHs, but finally it must be associated with a single CH(at N level-2). If any CH falls within the overlapping region of Collect Data more than one CH, it decides its association to a CH by and forward calculating the value of e/d (energy/distance). CH (atlevel- i 2) that has maximum e/d value is selected as final CH by Y that CH. If more than one CH yields same maximum e/d Periodically send value, then any of them is randomly selected. If a CH does Call election heartbeat not fall within the range of any CH, it declares itself as a process CH and gets activated in high power transmission mode. N When clusters are established, the CHs (at level-1) collect the data from cluster members, perform local data CH failed? aggregation and send it to CH of level-2. This CH sends data to base station or sink node in multi-hop manner. Clusters form circle of radius size at level-1 and at Y level-2. and size is taken to confirm that every node in New back-up cluster able to communicate with other nodes within a Call Backup node single-hop in same cluster. B. Steady State Phase Figure 3 Steady State Phase Once cluster is formed, CH creates a TDMA schedule for cluster members and sends it to them at both levels. CH Election Cluster members sense data and send it to CH according to CH broadcasts for next round, which is TDMA schedule. This process continues for all clusters until CH’s current energy level equals to or less than or CH average energy of those cluster members who participated fails. Then CH starts election process of new CH for next in last election process. All cluster members within cluster round or recovers from failure respectively (as shown in listen message and compare with their current energy level Figure 3). ( ). cluster members which have greater than or equal to , marks itself as a participant for election process(as shown in Figure 4). All participant sensor nodes broadcast their and location. All participant cluster member can listen to each other because all cluster © 2010 ACEEE 30 DOI: 01.IJNS.01.03.177
  • 4. ACEEE Int. J. on Network Security, Vol. 01, No. 03, Dec 2010 members are within low (at level) or high (at level-2) decides that CH has failed and broadcasts data plus status power transmission range of each other. Because of this, all vector. Other cluster members also listen this message. participant sensor nodes know about and of each other. They extract status vector from message and merge it with Hence, each participant cluster member is aware about own status vector and this process continuous up to the end higher energy participant cluster member. The participant of the TDMA schedule. At the end of the TDMA frame, cluster member with highest value of promotes itself as cluster members reach on an agreement about failure of CH and gets activated in high power mode (at level-1); CH. If all bits of status vector are set then it is decided that whereas cluster member with second highest energy CH has failed. upgrades itself as back up CH. New CH receives and of all participant cluster members during election process, it calculates average of all and gets value of , which is used any node i for next round. Both new CH and back up node know the Is CH? value of . All participant cluster members mark themselves as non-participant cluster members again. The previous CH N also starts working in low power mode (at level-1). Y CH sends Waiting for CH sends heartbeat heartbeat message message Each node compare after time after time id l ( ) Waitin Set or rest Status Y g for Vector (SV) on the N data basis of hearing Mark itself as a heartbeat message Broadcast its and receive Send its Data+ SV other participant node’s and receive SV from other nodes and merge it with highest energy node Backup node second highest energy Elected CH sends CH CH has d i been failed? Mark itself as non- N Y Return new Return Return Figure 4 CH Election FALSE TRUE Failure Detection Figure 5 CH Failure Detection The detection process runs parallel with normal network operation by periodically performing a distributed Failure Recovery detection process at each cluster member (as shown in By using agreement protocol when cluster members Figure 5). For failure detection mechanism each cluster confirm about CH then cluster member who has last slot in member maintains a status vector and a timer. In status TDMA schedule informs to back up node about failure. vector each bit corresponds to a cluster member. Initially Back up node elects itself as a CH by sending an all bits are set to zero of status vector on each cluster advertisement message in high power transmission mode member. A bit in the vector is set once its corresponding (as shown in Figure 4). It keeps on working as CH till its cluster member detects that CH has failed. CH of each residual energy level reaches a critical limit or it fails. New cluster periodically sends a hello message (i.e. notification back up node is required for new CH depending on that CH is alive) to cluster members after a certain time application, so CH start election process for new back up interval. Cluster members also know about time interval, node by sending. Back up node election process is similar CH sends it to cluster members. After that time interval to election process of CH. cluster member, who does not listen hello message, sets its corresponding bit as one in status vector and locally © 2010 ACEEE 31 DOI: 01.IJNS.01.03.177
  • 5. ACEEE Int. J. on Network Security, Vol. 01, No. 03, Dec 2010 It can be observed form Figure 6 that as the number of nodes increases, network lifetime increases. But after V. PERFORMANCE EVALUATION certain number of nodes, the network life time starts decreasing due to more overhead of cluster maintenance. A. Simulation Environment FTTCP consumes more energy in failure detection and In this section, we evaluate the performance of our recovery as compare to FTEP. Thus, it reduces average proposed FTTCP protocol. We used OMNET-4.0 [15] as 0.42% number of rounds as compare to FTEP. When simulator and same radio model as discussed in section III. number of nodes are 100, network is alive up to 860 The basic simulation parameters are given in Table II. rounds. 1400 TABLE II EXPERIMENT PARAMETERS 1200 FTEP Parameter Value FTTCP Area of sensor field 100×100 m2 Number of Rounds 1000 Sink position At origin (0,0) Initial energy per 1J 800 node Path loss exponent 2 600 50 nJ/bit 100 pJ/bit/m2 400 50 nJ/bit 0 50 100 150 200 250 Number of Nodes Size of data packet 500 bits Size of control 20 bits packet Figure 6 Network Lifetime Sensing Interval 0.5 s High transmission 60 m Detection Accuracy range Low transmission 20 m From Figure 7, we can observe the effects of the packet range loss rate on detection accuracy for different cluster size. No of Nodes 300 For simulation, we consider the packet loss rate range from Cluster Size 10, 20, 30 0.2 to 0.4. It can be observed that with the increase of the packet loss rate the probability of false alarm positive In order to check the performance of FTTCP protocol, increases, which leads to lower detection accuracy. A we take following metrics/clustering attributes: larger number of sensor nodes lead to a smaller probability • Network lifetime: This metric gives the time up to which of false alarm positive, i.e., higher detection accuracy. As a network remains alive. It shows number of rounds expected FTTCP can achieve high detection accuracy. (including fault tolerance) up to which network remains CH election overhead alive for different number of nodes in network. One When number of nodes are 200, node failure frequency round consists of an operation of network from sensing is 1% after every 50s for FTEP and FTTCP. It can be the phenomenon to receiving data at sink node observed from Figure 8 that FTTCP consumes slightly including election process and fault handling if any. more energy (average energy consumption 0.64%) for CH • CH election overhead: It is defined as energy consumed failure recovery as compared to FTEP. This is because of in electing a CH in a network. It is the energy consumed similar to FTEP, FTTCP elects back up node as new CH by total number of messages exchanged among sensor and also elects new back up node for new CH which results nodes for electing CH. into more number of messages exchanged. In FTEP, back • Detection Accuracy: It shows how accurately fault can up node is not elected for new CH. be detected by nodes. The detection accuracy is defined by the probability of false alarm, which is the 0.1 probability that an operational CH is mistakenly n=20 detected as a faulty one. Detection accuracy 0.01 n=15 n=10 Probability of False Alarm Positive performance is measured under different packets loss 1E-3 rates and cluster sizes. 1E-4 B. Simulation Results and discussion 1E-5 To find out more reliable and accurate results, we 1E-6 executed FTTCP protocol with different number of nodes, number of times and failure frequency. 1E-7 1E-8 Network lifetime 0.20 0.25 0.30 0.35 0.40 Packet Loss Rate © 2010 ACEEE 32 DOI: 01.IJNS.01.03.177
  • 6. ACEEE Int. J. on Network Security, Vol. 01, No. 03, Dec 2010 Figure 7 Detection Accuracy [3] Peng Jiang, “A New Method for Node Fault Detection in Wireless Sensor Networks,” 12 www.mdpi.com/journal/sensors, Feb, 2009, 1282-1294. Luciana Moreira S´a de Souza, Harald Vogt and Michael 10 FTEP Beigl, “A survey on Fault Tolerance in Wireless Sensor AFDEP Networks,” http://www.cobis-online.de/, Energy Consumption (mJ) 8 [4] M.Yu, H.Mokhtar, M.Merabti, “A Survey on Fault Management in Wireless Sensor Networks,” Computer 6 Networks, 2007. [5] Myeong-Hyeon Lee, Yoon-Hwa Choi, “Fault detection of 4 wireless sensor networks,” Elsevier Computer Communications,Vol. 31, 2008, pp 3469–3475. 2 [6] Peng Jiang, “A New Method for Node Fault Detection in Wireless Sensor Networks,” 0 0 10 20 30 40 50 60 70 80 www.mdpi.com/journal/sensors, Feb, 2009, 1282-1294. Time (s) [7] S. Bandyopadhyay, E.J. Coyle, “Minimizing communication costs in hierarchically-clustered networks of wireless sensors”, Computer Networks- The International Journal of Figure 8 CH Election overhead Computer and Telecommunications Networking, vol. 44, no. 1, pp. 1–16, Jan. 2004. [8] O. Younis, S. Fahmy, and P. Santi, “Robust communications VI. CONCLUSION for sensor networks in hostile environments,” In FTTCP is agreement-based fault detection and recovery Proceedings of the 12th IEEE Int’l Workshop on Quality of protocol for faulty CH for two level clustering in WSNs. Service (IWQoS), pp. 10-19, June 2004. [9] J. Yan, W. Ling, K. Yoohwan, Y. Xiaozong, “EEMC: An FTTCP periodically checks for CH failure. This detection energy efficient multi level clustering algorithm for large process runs parallel with network operation. It provides scale wireless sensor networks”, Computer Networks: The high accuracy, because it allows each cluster member to International Journal of Computer and Telecommunications detect its faulty CH independently. It employs a distributed Networking, vol. 52, no. 3, pp. 542-562, Feb. 2008. agreement protocol to reach an agreement on the failure of [10] M.Asim, H.Mokhtar, and M.Merabti ,2009 , “A cellular CH among multiple cluster members. In order to recover approach to fault detection and recovery in wireless sensor from faulty CH, back up node is elected as new CH and networks,” Third International Conference on Sensor new back up node is elected locally. Election of CH and Technologies and Applications, 2009,SENSORCOMM '09, back up node is based on residual energy of sensor nodes. 18-23 June 2009, pp. 352 – 357. [11] Nidhi Bansal, T. P. Sharma, Manoj Misra and R. C. Joshi, A simulation result show, however, FTTCP consumes little “FTEP: A Fault Tolerant Election Protocol for Multi-level bit more energy than FTEP, but provides high detection Clustering in Homogeneous Wireless Sensor Networks,” in accuracy in harsh environment. Proceeding 16th IEEE International Conference on Networks, ICON 2008 ,Dec, 2008. REFERENCES [12] Amarjeet Kaur and T P Sharma, "AFDEP: Agreement based CH Failure Detection and Election Protocol for a WSN," in [1] F. Akyildiz et al., “Wireless sensor networks: a survey,” proceedings International Conference on Advances in Computer Networks, Vol. 38, March 2002, 393-422. Information and Communication Technologies (ICT 2010), [2] Amarjeet Kaur, T P Sharma, “Clustering Algorithms in Sept, 2010 in Kochi, Kerala, India. Wireless Sensor Networks: A Survey ,” Accepted in [13] Kai Wai Fan, Sha Liu and Prasun Sinha ,“On the Potential International Conference on Informatics, Cybernetics, and of Structure-free Data Aggregation in Sensor Networks,” in Computer Applications (ICICCA2010) , July, theProceedingsIEEEInfocom,2006.http://www.omnetpp.org 2010,Bangalore,India. © 2010 ACEEE 33 DOI: 01.IJNS.01.03.177