SlideShare ist ein Scribd-Unternehmen logo
1 von 8
Downloaden Sie, um offline zu lesen
International Journal of Network Security & Its Applications (IJNSA), Vol.5, No.2, March 2013




    CODE AWARE DYNAMIC SOURCE ROUTING FOR
         DISTRIBUTED SENSOR NETWORK
     M Abdul Rahiman1, Nishanth Jain2, Arun K. Dubey3 and G Manoj Kumar4
           1
               Director, AICTE, Ministry of HRD,Govt of India, New Delhi, INDIA

                                    rehman_paika@yahoo.com
                2
               Cosultant,e-Gov, AICTE, Ministry of HRD, New Delhi, INDIA
       3
         Asst Professor, CSE, Bharati Vidyapeeth College of Engineering, New Delhi
       4
         Associate Professor, CSE, LBS Inst of Tech for Women, Trivandrum, Kerala

ABSTRACT
Sensor network facilitates monitoring and controlling of physical environments. These wireless networks
consist of dense collection of sensors capable of collection and dissemination of data. They have
application in variety of fields such as military purposes, environment monitoring etc. Typical deployment
of sensor network assumes central processing station or a gateway to which all other nodes route their
data using dynamic source routing (DSR). This causes congestion at central station and thus reduces the
efficiency of the network. In this work we will propose a better dynamic source routing technique using
network coding to reduce total number of transmission in sensor networks resulting in better efficiency.

KEYWORDS
Network Coding, Wireless Sensor Network, Dynamic Source Routing.

1. INTRODUCTION

Wireless sensor networks (WSNs) are one of the most popular networks used in computer
science. It consists of some autonomous sensors used to monitor various natural activities. These
natural activities may be pressure, temperature, sound vibration etc.. Sensor nodes collect data
from natural activities and pass it to central processing station or gateway called sink [1]. Lots of
researches have been made in various areas to enhance the overall throughput of WSNs.
Development of WSNs actuated by some important applications like military surveillance’s,
medical sciences, natural disaster control, etc. The topology of WSNs consists of multiple sources
and single sink. This causes some common problems like congestion at sink, limited resources,
etc. Because of limited resources inefficient DSR is also a major problem for WSNs.

2. DYNAMIC SOURCE ROUTING

Dynamic Source Routing protocol (DSR) is designed for specifically used in multi hop wireless
Ad hoc Network. It allows the network to be completely self organizing and self configuring. The
protocol consists of two mechanism route discovery and route maintenance. The use of source
routing allows packet routing to be trivially loop free. It eliminates the need for up to date routing
information in the intermediate nodes in which the packets are routed. The protocol operates

DOI : 10.5121/ijnsa.2013.5209                                                                         117
International Journal of Network Security & Its Applications (IJNSA), Vol.5, No.2, March 2013

entirely on demand. This also allows routing packet overhead of DSR to scale automatically to
only that needed to react to changes in the routers themselves in use.

3. NETWORK CODING

Network coding is the technique which is extensively used in wired networks, ad-hoc networks,
and distributed sensor networks, etc. Network coding is quite different from traditional
communication. Network coding achieves vast performance gains by permitting intermediate
nodes to carry out algebraic operations on the incoming data [10]. Network coding allows the
packets to encode and further forward it. The destination sink decodes the packets. Encoding is
simply XOR of data packets which will be called as encoded packet. XOR is simply exclusive-or
of the packets can easily be obtained by XOR truth table. Suppose node Px and Py are two
packets. Such that Px=10110 and Py=01101.Packet encoding=Px XOR Py=10110 XOR 01101=
11011=Pz. Packet decoding=Px XOR Pz=10110 XOR 11011=01101=Py and Py XOR Pz=01101
XOR 11011=10110=Px. Where Pz is encoded packet. Decoding is XOR of data packets (except
the missing one) and the encoded packet as a result the missing packet gets identified [2], [9],
[10].

Consider a sensor network in Figure 1a, having five nodes. Node S1, S2, S3 and S4 has some
packet data to share with each and every node. Assume all links have a time unit capacity. In
current approach, each node broadcasts their data and was listened by their neighboring node
according to Figure. Now there is a bottleneck on node N and have 4 data packets for
transmission. Node N broadcasts all 4 data packets one by one. Each node listen these broadcasts
and collects their data packet. This approach requires 8 broadcasts in all.

Now consider network coding approach illustrated with the help of same example. Each node
broadcasts their data which is collected by neighboring node. Now each sensor node S1, S2, S3
and S4 has 3 data packets received by their neighboring node as shown in Fig 1a. In Figure 1b
and Figure 1c Node N has 4 data packets to transmit. Using network encoding approach node N
encodes the data packets and broadcast it. Now all sensor nodes S1, S2, S3 and S4 listens this
encoded packet and decode these packets by using network decoding shown in Figure 1d. Now
this approach requires 5 broadcasts which are 37 % less than previously discussed approach. This
also reduces the bottleneck, congestion at sink and total transmission on the network and in the
process provides gain in bandwidth, efficiency and power resources of the nodes [14].

4. DEPLOYMENT STRATEGY FOR WSNS

Efficient deployment strategy is necessary to detect event occur in WSNs and obtain the real time
data. For example for a large dense forest there no need deploy WSNs in mountain region. This
can be done by deploying sub sensor networks in a distributed manner. Density of sensors
depends on the occurrence of events. The positions of sensors are predetermined and position of
sensor nodes identified by GPS systems. Each transmission contains a source ID and Sink ID and
transmission is directed to sink node [4], [7]. Proposed topology can be viewed as subsequent part
of large sensor network where each node taking part in data transmission using current
communication approaches.

5. RELATED WORK
In this section we explore the history of network coding and wireless dynamic source routing
(DSR). Ahlswede et al. [1] showed that with network coding, as symbol size approaches infinity,
                                                                                                     118
International Journal of Network Security & Its Applications (IJNSA), Vol.5, No.2, March 2013

a source can multicast information at a rate approaching the smallest minimum cut between the
source and any receiver. Practical deployment of network coding is thoroughly described in [5],
[7], [8].Various network coding techniques like linear and random network coding are classified
in [9]. [6] Provides a systematic method to quantify the benefits of using network coding in the
presence of multiple concurrent unicast sessions. A robust network coding aware data aggregation
approach which will result in better performance of the network by reducing the number of
transmitted messages in the network is discussed in [4]. It also gives protection from link failure
to many-to-many network flows from multiple sensor nodes to sink nodes. Benefits of network
coding over wireless networks are described in [14]. Various efficient dynamic source routing
(DSR) techniques are explained in [3], [12], [13]. Also large WSNs topologies are described in
[4]. This gives us motivation to implement better dynamic source routing (DSR) for large WSNs
using network coding.




6. PROPOSED SCHEME

In this section we will discuss system model, proposed approach and algorithm for proposed
scheme.

6.1. System Model

In this work we have considered sensor nodes are deployed in a systematic manner to achieve
efficient network coding. These node senses data from the environment and transmits to sink
node. However these nodes are further classified into three categories. Sensor nodes, who senses
data and transmit, some relay nodes who simply forward the data packet to sink node and
aggregate node identifies the opportunity of network coding and performs it. The function ƒ is
used by the aggregate node to decide whether to apply network coding or not [4]. This topology is
recursive. Consider Figure 2 Node 1, 2,3,4,7 and 10 are initial nodes. These nodes are simply a
sink and relay nodes and it can be called as initial level L0 and it is contains 6 nodes. Now
topology is constructed recursively with Level L1, Level L2, Level L3......Level Lp. Level L1 has
total 12 nodes. 4 of them are aggregate nodes and 8 of them are sensor nodes. Hence we can say
Level L1 contains (r+q) nodes where r is number of sensor nodes and q is number of aggregate
nodes. Now Level L2 can be obtained by 2(r+q) nodes. This recursive method continues to obtain
a large sensor network and makes our topology scalable [4].
                                                                                                     119
International Journal of Network Security & Its Applications (IJNSA), Vol.5, No.2, March 2013

To get better performance and efficient network coding we have to made sum assumptions.

    •      Node deployment is 2D.
    •      Each sensor node has unique id and sink node maintains the id these sensor nodes.
    •      All transmission contains Source-ID and Sink-ID.
    •      Nodes must approximately at equal distance.
    •      Let p and q are the two received data by an aggregate node and ƒ is a binomial function
           which computes significant difference between the two data values and returns yes or no.
           If p and q are differ not more than γ then the value of the function ƒ is false else it returns
           true. The absolute value of the difference is denoted by d = p ~ q. ƒ :{ 0 if d < γ, 1 else}

6.2. Proposed Work

This research work would primarily concentrate on the design and development of sensor
networks and its overall throughput. Focus of the application on the better dynamic source routing
(DSR) technique using network coding to reduce total number of transmission in sensor networks
resulting in better efficiency. Specified sensor network topology is used as shown in Fig 2 to
achieve better results in wireless dynamic source routing (DSR) networks.

                                                                                       1
                                                               1                       6
                                                               7
                                                                     6
                                                                                  7
                                                                                  15
                                                                     4            6
                                                                                           8
                                              19
                                                                              1
                                                      1
                                                      8
                                                      14                               3
                                                           5             2
                                                                             20
                                                                         1         9
                                                                         0
                                                                                               1
                                                               1                               3
                                                               1        1
                                                        S               2
                                                        i
                                                        R
                                                        n
                                                       Ae
                                                        k
                                                       gl
                                                        S
                                                        a
                                                       gN
                                                        e
                                                        y
                                      Wireless Link    ro
                                                        n
                                                       ed
                                                        s
                                                        N
                                                       ge
                                 Figure 2: Sensor Network Topology
                                                        o
                                                       a
                                                        r
                                                       td
Node placement is in two dimensional as shown in Fig 2. Now node {1} is sink node. Nodes {5,
                                                       ee
6, 8, and 9} are aggregate nodes. Nodes {2, 3, 4, 7, and 10} are relay nodes. Nodes {11, 12, 13,
                                                        N
14, 15, 16, 17 and 18} are sensor nodes.                o
                                                       N
                                                        d
                                                       o
                                                        e
For Example suppose sensor node 12 and 13 have dsome information to flood. Now node 12
forwards (Broadcasts) it’s information to relay node 10 and aggregate node 9 and sensor node 13
                                                       e
forwards its information to aggregate node 9. Relay node simply forwards its information to sink

                                                                                                        120
International Journal of Network Security & Its Applications (IJNSA), Vol.5, No.2, March 2013

node. Aggregate node 9 has two packets to forward. It encodes the packets using (XOR)
technique and further forwards it to sink. Now sink has two packets. One is data packet
transmitted by node 12 via relay node 10 and encoded packet transmitted by aggregate node 9. It
simply decode the packet by again XORing both the packets and collect the data packet
transmitted by sensor node 13. Here we can clearly see that sink node achieve the packets in 6
broadcasts instead of 8 which is currently done by wireless dynamic source routing (DSR).
Before hopping to algorithm 1 would like to put emphasis upon the point that we are not
providing the answer to the question: "When to encode data?”. For the purpose of this work we
have used random variable to decide upon when to encode, with equal probabilities.

6.3. Algorithm

To enable encoding and decoding of packets we have used two types of packets namely
normal_packet and code_packet. Where size of normal_packet is fixed and size of code_packet is
will be size of normal_packet plus size of header. Let at an aggregator node we need to encode
pkt1 and pkt2. This is done as following: pkt1 is XORed with pkt2 and is encapsulated under new
header and is then forwarded depending upon the new header. We have also included a bit in each
packet namely codeOn bit which is set if packet is code_packet and unset if it is normal_packet
(though it is redundant as type of packet can be identified by size) in our case. Decoding is
performed by first removing the additional header and then again XORing the packet with other
appropriate packets.

When aggregate node receives data from the sensor nodes function ƒ finds the difference between
the data. If difference is less than some predefined γ and is not significant then there is no need of
encoding and one of the data selected at random, is forwarded to sink node. If the difference is
greater than γ then aggregate node encode (XORs) data and forward to sink node. Each aggregate
node caches the previously received data from the sensor nodes. If data difference between
previously received data and currently received data is significant then encoding done and data
transmitted to sink node. Otherwise no encoding done and the data is transmitted normally.

Algorithm: Aggregate Heuristic(packet pkt1, packet pkt2)

//pkt1i& pkt2i is ith packet sent by leaf node 1 and leaf node 2 respectively.
{
Apply function f on data(pkt1i), data(pkt2i) and if it returns 0 then
{
     If data(pkt1i),data(pkt1i-1) not equals to 0
     then
     {
     Perform network coding on pkt1i and pkt1i-1 // pkt1i-1 is cached copy
     Transmit data obtained by encoding in previous step
     }
     ElseIf data(pkt2i),data(pkt2i-1) not equals 0
     {
     Perform network coding on pkt2i and pkt2i-1

                                                                                                     121
International Journal of Network Security & Its Applications (IJNSA), Vol.5, No.2, March 2013

       Transmit data obtained by encoding in previous step
       }
    Else
       {
       Select either of the packet and transmit
       }
}
Else
{
       Perform network coding on pkt1 and pkt2
       Transmit data obtained by encoding in previous step
}
//End of Algorithm
Function data(packet pkt)
{
       Return data encapsulated in packet "pkt"
}


7. SIMULATION RESULTS

Given algorithm is implemented in ns-2.34. Traffic is generated using a CBR traffic generator at
leaf nodes. We have simulated the discussed algorithm on topologies of 20, 44 and 92 nodes. AS
mentioned earlier, function ƒ is simulated with the help of random variable. Caching is only
implemented at aggregate node with cache buffer size of two, one for each leaf node. Results of
simulations are given in Figure 3 for both types of network that is to say network without coding
and network with coding. Each simulation is run four times and so each bar of Figure 3 represents
average of four simulation runs. This is done to mitigate the effect of random variable and
simulation parameters.
                                           Table 1:Coding Gain

                                      No. of nodes    Coding gain
                                      20              1.46
                                      44              1.36
                                      92              0.84


One could easily see that for smaller network size (20, 44) total numbers of transmissions per unit
time have reduced. But for the network of 92 nodes it has actually increased. This could possibly
be because for large networks, numbers of collisions in network, without coding are more as
compared to one with network coding.




                                                                                                       122
International Journal of Network Security & Its Applications (IJNSA), Vol.5, No.2, March 2013




                                       Figure 3: Simulation result

Line graph for coding gain shown in Table 1. Now from concluded result of coding gain one can
clearly see that coding gain is more than 1 for 0-75 sensor nodes. Hence we can say network
efficiency gives better performance for this range for nodes. After that coding gain degrades to
less than 1. This could possibly be because for large networks, numbers of collisions in network,
with coding are more as compared to one without network coding.

3. CONCLUSIONS & FUTURE WORK

In this paper we have implemented the idea that the function ƒ is used by the aggregate node to
decide whether to apply network coding or not. We have found out that as the size of sensor
network increases, approach with network coding allows better bandwidth utilization. Though we
have not quantified, one could easily argue, as number of transmissions required to send one
packet from leaf node to sink nodes decreases it also provides significant energy savings at sensor
nodes. Although the topology suggested is scalable and robust due to multiple paths from leaf to
sink nodes, the cost effectiveness of this topology still remains an open question. It is also
challenging to come up with a good ƒ, as it depends a lot upon the application and environment.

REFERENCES
[1]   Ian F. Akyildiz, Weilian Su, Yogesh Sankara subramaniam and Erda lCayirci, (2002) “ A Survey on
      Sensor Networks”, Georgia Institute of Technology.
[2]   Rudolf Ahlswede, NingCai, Shuo-Yen Robert Li, Raymond W. Yeung,(2000), “Network Information
      Flow”, IEEE Transactions on Information Theory, Vol. 46, No. 4.
[3]   Young-ri Choi , Mohamed G. Gouda ,Disciplined Flood Protocols in Sensor Networks, UTCS
      Technical Report TR-05-03 ,The University of Texas at Austin.
[4]    R. R. Rout , S.K. Ghosh , S. Chakrabarti,2009, Fourth International Conference on Industrial and
      Information Systems, ICIIS 2009, 28 - 31 December 2009, Sri Lanka, “Network Coding-aware Data
      Aggregation for a Distributed Wireless Sensor Network”, Indian Institute of Technology, Kharagpur.
[5]   P. A. Chou, Y. Wu, and K. Jain, (2003), “Practical network coding”, Proc. Allerton Conf. Commun.,
[6]   SudiptaSengupta, ShravanRayanchu, and Suman Banerjee, “ Network Coding-Aware Routing in
      Wireless Networks”.
[7]   S. Katti, H. Rahul, W. Hu, D. Katabi, M. Medard, and J. Crowcroft, (2006), Proc. ACM SIGCOMM,
      Sep. 2006, pp. 243–254 , XORs in the air: Practical wireless network coding.
[8]   Qunfeng Dong , Jianming Wu ,Wenjun Hu, Jon Crowcroft, “Practical Network Coding in Wireless
      Networks” ,University of Wisconsin & Cambridge.
[9]    Raymond W. Yeung, Shuo-Yen Robert Li, NingCai, Zhen Zhang, Network Coding Theory.

                                                                                                      123
International Journal of Network Security & Its Applications (IJNSA), Vol.5, No.2, March 2013

[10] K V Rashmi, Nihar B Shah and P Vijay Kumar, (2010), “Network Coding”, IISc.
[12] AnanthKini, Vilas Veeraraghavan, Steven Weber, (2004), “Fast and efficient randomized dynamic
     source routing (DSR) on lattice sensor networks”, Department of Electrical and Computer
     Engineering, Drexel University.
[13] Ting Zhu, ZiguoZhong, Tian He, and Zhi-Li Zhang, Exploring Link Correlation for Efficient
     Dynamic source routing (DSR) in Wireless Sensor Networks, University of Minnesota.
[14] Christina Fragouli, J¨orgWidmer, Jean-Yves Le Boudec, “On the Benefits of Network Coding for
     Wireless Applications”.

Author

Dr. Abdul Rahiman M is currently working as Director in All India Council for
Technical Education (AICTE), Ministry of HRD, Government of India. He also served
as Director, Vocational Higher Secondary Education (VHSE), Government of Kerala.
He worked as Professor in the Department of Computer Science & Engineering in LBS
Institute of Technology for Women, Trivandrum, Kerala State, India. He did his
M.Tech degree in Computer Science from Kerala University in Computer Science with
specialization in Digital Image Computing and also undergone MBA degree in Systems and Post
Graduate Diploma in Human Resource Management from Kerala University. He has his PhD from
Karpagam University, Coimbatore in the area of pattern recognition. He has many publications in various
International Journals and International conference proceedings. He is a Life Member of Indian Society
for Technical Education (ISTE) and Computer Society of India (CSI)and also Member of International
Association of Computer Science & Information Technology (IACSIT). He is a member of Board of
Governors in Daman Diu Higher Education and also associated with many professional bodies.
He chaired many International Conferences and editorial board member of many International Journals.




                                                                                                     124

Weitere ähnliche Inhalte

Was ist angesagt?

An Efficient Data Transmission for Cluster based Wireless Sensor Networks usi...
An Efficient Data Transmission for Cluster based Wireless Sensor Networks usi...An Efficient Data Transmission for Cluster based Wireless Sensor Networks usi...
An Efficient Data Transmission for Cluster based Wireless Sensor Networks usi...IJTET Journal
 
1 p pranitha final_paper--1-5
1 p pranitha final_paper--1-51 p pranitha final_paper--1-5
1 p pranitha final_paper--1-5Alexander Decker
 
Spatial Correlation Based Medium Access Control Protocol Using DSR & AODV Rou...
Spatial Correlation Based Medium Access Control Protocol Using DSR & AODV Rou...Spatial Correlation Based Medium Access Control Protocol Using DSR & AODV Rou...
Spatial Correlation Based Medium Access Control Protocol Using DSR & AODV Rou...IOSR Journals
 
Concealed Data Aggregation with Dynamic Intrusion Detection System to Remove ...
Concealed Data Aggregation with Dynamic Intrusion Detection System to Remove ...Concealed Data Aggregation with Dynamic Intrusion Detection System to Remove ...
Concealed Data Aggregation with Dynamic Intrusion Detection System to Remove ...csandit
 
Localization for wireless sensor
Localization for wireless sensorLocalization for wireless sensor
Localization for wireless sensorIJCNCJournal
 
International Refereed Journal of Engineering and Science (IRJES)
International Refereed Journal of Engineering and Science (IRJES)International Refereed Journal of Engineering and Science (IRJES)
International Refereed Journal of Engineering and Science (IRJES)irjes
 
Energy Efficient Routing Strategies for Large Scale Wireless Sensor in Hetero...
Energy Efficient Routing Strategies for Large Scale Wireless Sensor in Hetero...Energy Efficient Routing Strategies for Large Scale Wireless Sensor in Hetero...
Energy Efficient Routing Strategies for Large Scale Wireless Sensor in Hetero...ijtsrd
 
Based on Heterogeneity and Electing Probability of Nodes Improvement in LEACH
Based on Heterogeneity and Electing Probability of Nodes Improvement in LEACHBased on Heterogeneity and Electing Probability of Nodes Improvement in LEACH
Based on Heterogeneity and Electing Probability of Nodes Improvement in LEACHijsrd.com
 
Intrusion detection in heterogeneous network by multipath routing based toler...
Intrusion detection in heterogeneous network by multipath routing based toler...Intrusion detection in heterogeneous network by multipath routing based toler...
Intrusion detection in heterogeneous network by multipath routing based toler...eSAT Journals
 
Intrusion detection in heterogeneous network by multipath routing based toler...
Intrusion detection in heterogeneous network by multipath routing based toler...Intrusion detection in heterogeneous network by multipath routing based toler...
Intrusion detection in heterogeneous network by multipath routing based toler...eSAT Publishing House
 
A Traffic-Aware Key Management Architecture for Reducing Energy Consumption i...
A Traffic-Aware Key Management Architecture for Reducing Energy Consumption i...A Traffic-Aware Key Management Architecture for Reducing Energy Consumption i...
A Traffic-Aware Key Management Architecture for Reducing Energy Consumption i...IDES Editor
 
Review and Performance Comparison of Distributed Wireless Reprogramming Proto...
Review and Performance Comparison of Distributed Wireless Reprogramming Proto...Review and Performance Comparison of Distributed Wireless Reprogramming Proto...
Review and Performance Comparison of Distributed Wireless Reprogramming Proto...IOSR Journals
 
Performance evaluation of energy
Performance evaluation of energyPerformance evaluation of energy
Performance evaluation of energyijp2p
 

Was ist angesagt? (16)

An Efficient Data Transmission for Cluster based Wireless Sensor Networks usi...
An Efficient Data Transmission for Cluster based Wireless Sensor Networks usi...An Efficient Data Transmission for Cluster based Wireless Sensor Networks usi...
An Efficient Data Transmission for Cluster based Wireless Sensor Networks usi...
 
1 p pranitha final_paper--1-5
1 p pranitha final_paper--1-51 p pranitha final_paper--1-5
1 p pranitha final_paper--1-5
 
Spatial Correlation Based Medium Access Control Protocol Using DSR & AODV Rou...
Spatial Correlation Based Medium Access Control Protocol Using DSR & AODV Rou...Spatial Correlation Based Medium Access Control Protocol Using DSR & AODV Rou...
Spatial Correlation Based Medium Access Control Protocol Using DSR & AODV Rou...
 
Concealed Data Aggregation with Dynamic Intrusion Detection System to Remove ...
Concealed Data Aggregation with Dynamic Intrusion Detection System to Remove ...Concealed Data Aggregation with Dynamic Intrusion Detection System to Remove ...
Concealed Data Aggregation with Dynamic Intrusion Detection System to Remove ...
 
Localization for wireless sensor
Localization for wireless sensorLocalization for wireless sensor
Localization for wireless sensor
 
Ijetr012022
Ijetr012022Ijetr012022
Ijetr012022
 
International Refereed Journal of Engineering and Science (IRJES)
International Refereed Journal of Engineering and Science (IRJES)International Refereed Journal of Engineering and Science (IRJES)
International Refereed Journal of Engineering and Science (IRJES)
 
Fa36942946
Fa36942946Fa36942946
Fa36942946
 
Energy Efficient Routing Strategies for Large Scale Wireless Sensor in Hetero...
Energy Efficient Routing Strategies for Large Scale Wireless Sensor in Hetero...Energy Efficient Routing Strategies for Large Scale Wireless Sensor in Hetero...
Energy Efficient Routing Strategies for Large Scale Wireless Sensor in Hetero...
 
Based on Heterogeneity and Electing Probability of Nodes Improvement in LEACH
Based on Heterogeneity and Electing Probability of Nodes Improvement in LEACHBased on Heterogeneity and Electing Probability of Nodes Improvement in LEACH
Based on Heterogeneity and Electing Probability of Nodes Improvement in LEACH
 
Q026201030106
Q026201030106Q026201030106
Q026201030106
 
Intrusion detection in heterogeneous network by multipath routing based toler...
Intrusion detection in heterogeneous network by multipath routing based toler...Intrusion detection in heterogeneous network by multipath routing based toler...
Intrusion detection in heterogeneous network by multipath routing based toler...
 
Intrusion detection in heterogeneous network by multipath routing based toler...
Intrusion detection in heterogeneous network by multipath routing based toler...Intrusion detection in heterogeneous network by multipath routing based toler...
Intrusion detection in heterogeneous network by multipath routing based toler...
 
A Traffic-Aware Key Management Architecture for Reducing Energy Consumption i...
A Traffic-Aware Key Management Architecture for Reducing Energy Consumption i...A Traffic-Aware Key Management Architecture for Reducing Energy Consumption i...
A Traffic-Aware Key Management Architecture for Reducing Energy Consumption i...
 
Review and Performance Comparison of Distributed Wireless Reprogramming Proto...
Review and Performance Comparison of Distributed Wireless Reprogramming Proto...Review and Performance Comparison of Distributed Wireless Reprogramming Proto...
Review and Performance Comparison of Distributed Wireless Reprogramming Proto...
 
Performance evaluation of energy
Performance evaluation of energyPerformance evaluation of energy
Performance evaluation of energy
 

Ähnlich wie Ijnsa050209

Some aspects of wireless sensor networks
Some aspects of wireless sensor networksSome aspects of wireless sensor networks
Some aspects of wireless sensor networkspijans
 
An Energy-Efficient Min-Max Optimization with RSA Security in Wireless Sensor...
An Energy-Efficient Min-Max Optimization with RSA Security in Wireless Sensor...An Energy-Efficient Min-Max Optimization with RSA Security in Wireless Sensor...
An Energy-Efficient Min-Max Optimization with RSA Security in Wireless Sensor...IJMTST Journal
 
The International Journal of Engineering and Science (IJES)
The International Journal of Engineering and Science (IJES)The International Journal of Engineering and Science (IJES)
The International Journal of Engineering and Science (IJES)theijes
 
Shortest path algorithm for data transmission in wireless ad hoc sensor networks
Shortest path algorithm for data transmission in wireless ad hoc sensor networksShortest path algorithm for data transmission in wireless ad hoc sensor networks
Shortest path algorithm for data transmission in wireless ad hoc sensor networksijasuc
 
Bidirectional data centric routing protocol to improve the energy efficiency ...
Bidirectional data centric routing protocol to improve the energy efficiency ...Bidirectional data centric routing protocol to improve the energy efficiency ...
Bidirectional data centric routing protocol to improve the energy efficiency ...prj_publication
 
Characterization of directed diffusion protocol in wireless sensor network
Characterization of directed diffusion protocol in wireless sensor networkCharacterization of directed diffusion protocol in wireless sensor network
Characterization of directed diffusion protocol in wireless sensor networkijwmn
 
Ijarcet vol-2-issue-2-576-581
Ijarcet vol-2-issue-2-576-581Ijarcet vol-2-issue-2-576-581
Ijarcet vol-2-issue-2-576-581Editor IJARCET
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)IJERD Editor
 
Data Centric Approach Based Protocol using Evolutionary Approach in WSN
Data Centric Approach Based Protocol using Evolutionary Approach in WSNData Centric Approach Based Protocol using Evolutionary Approach in WSN
Data Centric Approach Based Protocol using Evolutionary Approach in WSNijsrd.com
 
DATA TRANSMISSION IN WIRELESS SENSOR NETWORKS FOR EFFECTIVE AND SECURE COMMUN...
DATA TRANSMISSION IN WIRELESS SENSOR NETWORKS FOR EFFECTIVE AND SECURE COMMUN...DATA TRANSMISSION IN WIRELESS SENSOR NETWORKS FOR EFFECTIVE AND SECURE COMMUN...
DATA TRANSMISSION IN WIRELESS SENSOR NETWORKS FOR EFFECTIVE AND SECURE COMMUN...IJEEE
 
A Survey of Fuzzy Logic Based Congestion Estimation Techniques in Wireless S...
A Survey of Fuzzy Logic Based Congestion Estimation  Techniques in Wireless S...A Survey of Fuzzy Logic Based Congestion Estimation  Techniques in Wireless S...
A Survey of Fuzzy Logic Based Congestion Estimation Techniques in Wireless S...IOSR Journals
 
EFFECTIVE AND SECURE DATA COMMUNICATION IN WSNs CONSIDERING TRANSFER MODULE O...
EFFECTIVE AND SECURE DATA COMMUNICATION IN WSNs CONSIDERING TRANSFER MODULE O...EFFECTIVE AND SECURE DATA COMMUNICATION IN WSNs CONSIDERING TRANSFER MODULE O...
EFFECTIVE AND SECURE DATA COMMUNICATION IN WSNs CONSIDERING TRANSFER MODULE O...IJEEE
 
Proactive Data Reporting of Wireless sensor Network using Wake Up Scheduling ...
Proactive Data Reporting of Wireless sensor Network using Wake Up Scheduling ...Proactive Data Reporting of Wireless sensor Network using Wake Up Scheduling ...
Proactive Data Reporting of Wireless sensor Network using Wake Up Scheduling ...ijsrd.com
 
CONCEALED DATA AGGREGATION WITH DYNAMIC INTRUSION DETECTION SYSTEM TO REMOVE ...
CONCEALED DATA AGGREGATION WITH DYNAMIC INTRUSION DETECTION SYSTEM TO REMOVE ...CONCEALED DATA AGGREGATION WITH DYNAMIC INTRUSION DETECTION SYSTEM TO REMOVE ...
CONCEALED DATA AGGREGATION WITH DYNAMIC INTRUSION DETECTION SYSTEM TO REMOVE ...cscpconf
 
Grid-Based Multipath with Congestion Avoidance Routing Protocol
Grid-Based Multipath with Congestion Avoidance Routing ProtocolGrid-Based Multipath with Congestion Avoidance Routing Protocol
Grid-Based Multipath with Congestion Avoidance Routing Protocolijtsrd
 
Performance Analysis of Fault Detection in Round Trip Delay and Path Wireless...
Performance Analysis of Fault Detection in Round Trip Delay and Path Wireless...Performance Analysis of Fault Detection in Round Trip Delay and Path Wireless...
Performance Analysis of Fault Detection in Round Trip Delay and Path Wireless...Editor IJMTER
 
Secure and Efficient DiDrip Protocol for Improving Performance of WSNs
Secure and Efficient DiDrip Protocol for Improving Performance of WSNsSecure and Efficient DiDrip Protocol for Improving Performance of WSNs
Secure and Efficient DiDrip Protocol for Improving Performance of WSNsINFOGAIN PUBLICATION
 
An Approach of Mobile Wireless Sensor Network for Target Coverage and Network...
An Approach of Mobile Wireless Sensor Network for Target Coverage and Network...An Approach of Mobile Wireless Sensor Network for Target Coverage and Network...
An Approach of Mobile Wireless Sensor Network for Target Coverage and Network...IRJET Journal
 
Performance evaluation of different routing protocols in wsn using different ...
Performance evaluation of different routing protocols in wsn using different ...Performance evaluation of different routing protocols in wsn using different ...
Performance evaluation of different routing protocols in wsn using different ...Dr Sandeep Kumar Poonia
 

Ähnlich wie Ijnsa050209 (20)

iPGCON14_134
iPGCON14_134iPGCON14_134
iPGCON14_134
 
Some aspects of wireless sensor networks
Some aspects of wireless sensor networksSome aspects of wireless sensor networks
Some aspects of wireless sensor networks
 
An Energy-Efficient Min-Max Optimization with RSA Security in Wireless Sensor...
An Energy-Efficient Min-Max Optimization with RSA Security in Wireless Sensor...An Energy-Efficient Min-Max Optimization with RSA Security in Wireless Sensor...
An Energy-Efficient Min-Max Optimization with RSA Security in Wireless Sensor...
 
The International Journal of Engineering and Science (IJES)
The International Journal of Engineering and Science (IJES)The International Journal of Engineering and Science (IJES)
The International Journal of Engineering and Science (IJES)
 
Shortest path algorithm for data transmission in wireless ad hoc sensor networks
Shortest path algorithm for data transmission in wireless ad hoc sensor networksShortest path algorithm for data transmission in wireless ad hoc sensor networks
Shortest path algorithm for data transmission in wireless ad hoc sensor networks
 
Bidirectional data centric routing protocol to improve the energy efficiency ...
Bidirectional data centric routing protocol to improve the energy efficiency ...Bidirectional data centric routing protocol to improve the energy efficiency ...
Bidirectional data centric routing protocol to improve the energy efficiency ...
 
Characterization of directed diffusion protocol in wireless sensor network
Characterization of directed diffusion protocol in wireless sensor networkCharacterization of directed diffusion protocol in wireless sensor network
Characterization of directed diffusion protocol in wireless sensor network
 
Ijarcet vol-2-issue-2-576-581
Ijarcet vol-2-issue-2-576-581Ijarcet vol-2-issue-2-576-581
Ijarcet vol-2-issue-2-576-581
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)
 
Data Centric Approach Based Protocol using Evolutionary Approach in WSN
Data Centric Approach Based Protocol using Evolutionary Approach in WSNData Centric Approach Based Protocol using Evolutionary Approach in WSN
Data Centric Approach Based Protocol using Evolutionary Approach in WSN
 
DATA TRANSMISSION IN WIRELESS SENSOR NETWORKS FOR EFFECTIVE AND SECURE COMMUN...
DATA TRANSMISSION IN WIRELESS SENSOR NETWORKS FOR EFFECTIVE AND SECURE COMMUN...DATA TRANSMISSION IN WIRELESS SENSOR NETWORKS FOR EFFECTIVE AND SECURE COMMUN...
DATA TRANSMISSION IN WIRELESS SENSOR NETWORKS FOR EFFECTIVE AND SECURE COMMUN...
 
A Survey of Fuzzy Logic Based Congestion Estimation Techniques in Wireless S...
A Survey of Fuzzy Logic Based Congestion Estimation  Techniques in Wireless S...A Survey of Fuzzy Logic Based Congestion Estimation  Techniques in Wireless S...
A Survey of Fuzzy Logic Based Congestion Estimation Techniques in Wireless S...
 
EFFECTIVE AND SECURE DATA COMMUNICATION IN WSNs CONSIDERING TRANSFER MODULE O...
EFFECTIVE AND SECURE DATA COMMUNICATION IN WSNs CONSIDERING TRANSFER MODULE O...EFFECTIVE AND SECURE DATA COMMUNICATION IN WSNs CONSIDERING TRANSFER MODULE O...
EFFECTIVE AND SECURE DATA COMMUNICATION IN WSNs CONSIDERING TRANSFER MODULE O...
 
Proactive Data Reporting of Wireless sensor Network using Wake Up Scheduling ...
Proactive Data Reporting of Wireless sensor Network using Wake Up Scheduling ...Proactive Data Reporting of Wireless sensor Network using Wake Up Scheduling ...
Proactive Data Reporting of Wireless sensor Network using Wake Up Scheduling ...
 
CONCEALED DATA AGGREGATION WITH DYNAMIC INTRUSION DETECTION SYSTEM TO REMOVE ...
CONCEALED DATA AGGREGATION WITH DYNAMIC INTRUSION DETECTION SYSTEM TO REMOVE ...CONCEALED DATA AGGREGATION WITH DYNAMIC INTRUSION DETECTION SYSTEM TO REMOVE ...
CONCEALED DATA AGGREGATION WITH DYNAMIC INTRUSION DETECTION SYSTEM TO REMOVE ...
 
Grid-Based Multipath with Congestion Avoidance Routing Protocol
Grid-Based Multipath with Congestion Avoidance Routing ProtocolGrid-Based Multipath with Congestion Avoidance Routing Protocol
Grid-Based Multipath with Congestion Avoidance Routing Protocol
 
Performance Analysis of Fault Detection in Round Trip Delay and Path Wireless...
Performance Analysis of Fault Detection in Round Trip Delay and Path Wireless...Performance Analysis of Fault Detection in Round Trip Delay and Path Wireless...
Performance Analysis of Fault Detection in Round Trip Delay and Path Wireless...
 
Secure and Efficient DiDrip Protocol for Improving Performance of WSNs
Secure and Efficient DiDrip Protocol for Improving Performance of WSNsSecure and Efficient DiDrip Protocol for Improving Performance of WSNs
Secure and Efficient DiDrip Protocol for Improving Performance of WSNs
 
An Approach of Mobile Wireless Sensor Network for Target Coverage and Network...
An Approach of Mobile Wireless Sensor Network for Target Coverage and Network...An Approach of Mobile Wireless Sensor Network for Target Coverage and Network...
An Approach of Mobile Wireless Sensor Network for Target Coverage and Network...
 
Performance evaluation of different routing protocols in wsn using different ...
Performance evaluation of different routing protocols in wsn using different ...Performance evaluation of different routing protocols in wsn using different ...
Performance evaluation of different routing protocols in wsn using different ...
 

Kürzlich hochgeladen

JAPAN: ORGANISATION OF PMDA, PHARMACEUTICAL LAWS & REGULATIONS, TYPES OF REGI...
JAPAN: ORGANISATION OF PMDA, PHARMACEUTICAL LAWS & REGULATIONS, TYPES OF REGI...JAPAN: ORGANISATION OF PMDA, PHARMACEUTICAL LAWS & REGULATIONS, TYPES OF REGI...
JAPAN: ORGANISATION OF PMDA, PHARMACEUTICAL LAWS & REGULATIONS, TYPES OF REGI...anjaliyadav012327
 
Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesFatimaKhan178732
 
Measures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDMeasures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDThiyagu K
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfciinovamais
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsTechSoup
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104misteraugie
 
9548086042 for call girls in Indira Nagar with room service
9548086042  for call girls in Indira Nagar  with room service9548086042  for call girls in Indira Nagar  with room service
9548086042 for call girls in Indira Nagar with room servicediscovermytutordmt
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAssociation for Project Management
 
social pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajansocial pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajanpragatimahajan3
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxheathfieldcps1
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Krashi Coaching
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityGeoBlogs
 
mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docxPoojaSen20
 
Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Disha Kariya
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeThiyagu K
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptxVS Mahajan Coaching Centre
 

Kürzlich hochgeladen (20)

Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
 
JAPAN: ORGANISATION OF PMDA, PHARMACEUTICAL LAWS & REGULATIONS, TYPES OF REGI...
JAPAN: ORGANISATION OF PMDA, PHARMACEUTICAL LAWS & REGULATIONS, TYPES OF REGI...JAPAN: ORGANISATION OF PMDA, PHARMACEUTICAL LAWS & REGULATIONS, TYPES OF REGI...
JAPAN: ORGANISATION OF PMDA, PHARMACEUTICAL LAWS & REGULATIONS, TYPES OF REGI...
 
Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and Actinides
 
Measures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDMeasures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SD
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The Basics
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104
 
9548086042 for call girls in Indira Nagar with room service
9548086042  for call girls in Indira Nagar  with room service9548086042  for call girls in Indira Nagar  with room service
9548086042 for call girls in Indira Nagar with room service
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across Sectors
 
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
 
social pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajansocial pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajan
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activity
 
mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docx
 
Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..
 
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptxINDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
 
Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and Mode
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
 

Ijnsa050209

  • 1. International Journal of Network Security & Its Applications (IJNSA), Vol.5, No.2, March 2013 CODE AWARE DYNAMIC SOURCE ROUTING FOR DISTRIBUTED SENSOR NETWORK M Abdul Rahiman1, Nishanth Jain2, Arun K. Dubey3 and G Manoj Kumar4 1 Director, AICTE, Ministry of HRD,Govt of India, New Delhi, INDIA rehman_paika@yahoo.com 2 Cosultant,e-Gov, AICTE, Ministry of HRD, New Delhi, INDIA 3 Asst Professor, CSE, Bharati Vidyapeeth College of Engineering, New Delhi 4 Associate Professor, CSE, LBS Inst of Tech for Women, Trivandrum, Kerala ABSTRACT Sensor network facilitates monitoring and controlling of physical environments. These wireless networks consist of dense collection of sensors capable of collection and dissemination of data. They have application in variety of fields such as military purposes, environment monitoring etc. Typical deployment of sensor network assumes central processing station or a gateway to which all other nodes route their data using dynamic source routing (DSR). This causes congestion at central station and thus reduces the efficiency of the network. In this work we will propose a better dynamic source routing technique using network coding to reduce total number of transmission in sensor networks resulting in better efficiency. KEYWORDS Network Coding, Wireless Sensor Network, Dynamic Source Routing. 1. INTRODUCTION Wireless sensor networks (WSNs) are one of the most popular networks used in computer science. It consists of some autonomous sensors used to monitor various natural activities. These natural activities may be pressure, temperature, sound vibration etc.. Sensor nodes collect data from natural activities and pass it to central processing station or gateway called sink [1]. Lots of researches have been made in various areas to enhance the overall throughput of WSNs. Development of WSNs actuated by some important applications like military surveillance’s, medical sciences, natural disaster control, etc. The topology of WSNs consists of multiple sources and single sink. This causes some common problems like congestion at sink, limited resources, etc. Because of limited resources inefficient DSR is also a major problem for WSNs. 2. DYNAMIC SOURCE ROUTING Dynamic Source Routing protocol (DSR) is designed for specifically used in multi hop wireless Ad hoc Network. It allows the network to be completely self organizing and self configuring. The protocol consists of two mechanism route discovery and route maintenance. The use of source routing allows packet routing to be trivially loop free. It eliminates the need for up to date routing information in the intermediate nodes in which the packets are routed. The protocol operates DOI : 10.5121/ijnsa.2013.5209 117
  • 2. International Journal of Network Security & Its Applications (IJNSA), Vol.5, No.2, March 2013 entirely on demand. This also allows routing packet overhead of DSR to scale automatically to only that needed to react to changes in the routers themselves in use. 3. NETWORK CODING Network coding is the technique which is extensively used in wired networks, ad-hoc networks, and distributed sensor networks, etc. Network coding is quite different from traditional communication. Network coding achieves vast performance gains by permitting intermediate nodes to carry out algebraic operations on the incoming data [10]. Network coding allows the packets to encode and further forward it. The destination sink decodes the packets. Encoding is simply XOR of data packets which will be called as encoded packet. XOR is simply exclusive-or of the packets can easily be obtained by XOR truth table. Suppose node Px and Py are two packets. Such that Px=10110 and Py=01101.Packet encoding=Px XOR Py=10110 XOR 01101= 11011=Pz. Packet decoding=Px XOR Pz=10110 XOR 11011=01101=Py and Py XOR Pz=01101 XOR 11011=10110=Px. Where Pz is encoded packet. Decoding is XOR of data packets (except the missing one) and the encoded packet as a result the missing packet gets identified [2], [9], [10]. Consider a sensor network in Figure 1a, having five nodes. Node S1, S2, S3 and S4 has some packet data to share with each and every node. Assume all links have a time unit capacity. In current approach, each node broadcasts their data and was listened by their neighboring node according to Figure. Now there is a bottleneck on node N and have 4 data packets for transmission. Node N broadcasts all 4 data packets one by one. Each node listen these broadcasts and collects their data packet. This approach requires 8 broadcasts in all. Now consider network coding approach illustrated with the help of same example. Each node broadcasts their data which is collected by neighboring node. Now each sensor node S1, S2, S3 and S4 has 3 data packets received by their neighboring node as shown in Fig 1a. In Figure 1b and Figure 1c Node N has 4 data packets to transmit. Using network encoding approach node N encodes the data packets and broadcast it. Now all sensor nodes S1, S2, S3 and S4 listens this encoded packet and decode these packets by using network decoding shown in Figure 1d. Now this approach requires 5 broadcasts which are 37 % less than previously discussed approach. This also reduces the bottleneck, congestion at sink and total transmission on the network and in the process provides gain in bandwidth, efficiency and power resources of the nodes [14]. 4. DEPLOYMENT STRATEGY FOR WSNS Efficient deployment strategy is necessary to detect event occur in WSNs and obtain the real time data. For example for a large dense forest there no need deploy WSNs in mountain region. This can be done by deploying sub sensor networks in a distributed manner. Density of sensors depends on the occurrence of events. The positions of sensors are predetermined and position of sensor nodes identified by GPS systems. Each transmission contains a source ID and Sink ID and transmission is directed to sink node [4], [7]. Proposed topology can be viewed as subsequent part of large sensor network where each node taking part in data transmission using current communication approaches. 5. RELATED WORK In this section we explore the history of network coding and wireless dynamic source routing (DSR). Ahlswede et al. [1] showed that with network coding, as symbol size approaches infinity, 118
  • 3. International Journal of Network Security & Its Applications (IJNSA), Vol.5, No.2, March 2013 a source can multicast information at a rate approaching the smallest minimum cut between the source and any receiver. Practical deployment of network coding is thoroughly described in [5], [7], [8].Various network coding techniques like linear and random network coding are classified in [9]. [6] Provides a systematic method to quantify the benefits of using network coding in the presence of multiple concurrent unicast sessions. A robust network coding aware data aggregation approach which will result in better performance of the network by reducing the number of transmitted messages in the network is discussed in [4]. It also gives protection from link failure to many-to-many network flows from multiple sensor nodes to sink nodes. Benefits of network coding over wireless networks are described in [14]. Various efficient dynamic source routing (DSR) techniques are explained in [3], [12], [13]. Also large WSNs topologies are described in [4]. This gives us motivation to implement better dynamic source routing (DSR) for large WSNs using network coding. 6. PROPOSED SCHEME In this section we will discuss system model, proposed approach and algorithm for proposed scheme. 6.1. System Model In this work we have considered sensor nodes are deployed in a systematic manner to achieve efficient network coding. These node senses data from the environment and transmits to sink node. However these nodes are further classified into three categories. Sensor nodes, who senses data and transmit, some relay nodes who simply forward the data packet to sink node and aggregate node identifies the opportunity of network coding and performs it. The function ƒ is used by the aggregate node to decide whether to apply network coding or not [4]. This topology is recursive. Consider Figure 2 Node 1, 2,3,4,7 and 10 are initial nodes. These nodes are simply a sink and relay nodes and it can be called as initial level L0 and it is contains 6 nodes. Now topology is constructed recursively with Level L1, Level L2, Level L3......Level Lp. Level L1 has total 12 nodes. 4 of them are aggregate nodes and 8 of them are sensor nodes. Hence we can say Level L1 contains (r+q) nodes where r is number of sensor nodes and q is number of aggregate nodes. Now Level L2 can be obtained by 2(r+q) nodes. This recursive method continues to obtain a large sensor network and makes our topology scalable [4]. 119
  • 4. International Journal of Network Security & Its Applications (IJNSA), Vol.5, No.2, March 2013 To get better performance and efficient network coding we have to made sum assumptions. • Node deployment is 2D. • Each sensor node has unique id and sink node maintains the id these sensor nodes. • All transmission contains Source-ID and Sink-ID. • Nodes must approximately at equal distance. • Let p and q are the two received data by an aggregate node and ƒ is a binomial function which computes significant difference between the two data values and returns yes or no. If p and q are differ not more than γ then the value of the function ƒ is false else it returns true. The absolute value of the difference is denoted by d = p ~ q. ƒ :{ 0 if d < γ, 1 else} 6.2. Proposed Work This research work would primarily concentrate on the design and development of sensor networks and its overall throughput. Focus of the application on the better dynamic source routing (DSR) technique using network coding to reduce total number of transmission in sensor networks resulting in better efficiency. Specified sensor network topology is used as shown in Fig 2 to achieve better results in wireless dynamic source routing (DSR) networks. 1 1 6 7 6 7 15 4 6 8 19 1 1 8 14 3 5 2 20 1 9 0 1 1 3 1 1 S 2 i R n Ae k gl S a gN e y Wireless Link ro n ed s N ge Figure 2: Sensor Network Topology o a r td Node placement is in two dimensional as shown in Fig 2. Now node {1} is sink node. Nodes {5, ee 6, 8, and 9} are aggregate nodes. Nodes {2, 3, 4, 7, and 10} are relay nodes. Nodes {11, 12, 13, N 14, 15, 16, 17 and 18} are sensor nodes. o N d o e For Example suppose sensor node 12 and 13 have dsome information to flood. Now node 12 forwards (Broadcasts) it’s information to relay node 10 and aggregate node 9 and sensor node 13 e forwards its information to aggregate node 9. Relay node simply forwards its information to sink 120
  • 5. International Journal of Network Security & Its Applications (IJNSA), Vol.5, No.2, March 2013 node. Aggregate node 9 has two packets to forward. It encodes the packets using (XOR) technique and further forwards it to sink. Now sink has two packets. One is data packet transmitted by node 12 via relay node 10 and encoded packet transmitted by aggregate node 9. It simply decode the packet by again XORing both the packets and collect the data packet transmitted by sensor node 13. Here we can clearly see that sink node achieve the packets in 6 broadcasts instead of 8 which is currently done by wireless dynamic source routing (DSR). Before hopping to algorithm 1 would like to put emphasis upon the point that we are not providing the answer to the question: "When to encode data?”. For the purpose of this work we have used random variable to decide upon when to encode, with equal probabilities. 6.3. Algorithm To enable encoding and decoding of packets we have used two types of packets namely normal_packet and code_packet. Where size of normal_packet is fixed and size of code_packet is will be size of normal_packet plus size of header. Let at an aggregator node we need to encode pkt1 and pkt2. This is done as following: pkt1 is XORed with pkt2 and is encapsulated under new header and is then forwarded depending upon the new header. We have also included a bit in each packet namely codeOn bit which is set if packet is code_packet and unset if it is normal_packet (though it is redundant as type of packet can be identified by size) in our case. Decoding is performed by first removing the additional header and then again XORing the packet with other appropriate packets. When aggregate node receives data from the sensor nodes function ƒ finds the difference between the data. If difference is less than some predefined γ and is not significant then there is no need of encoding and one of the data selected at random, is forwarded to sink node. If the difference is greater than γ then aggregate node encode (XORs) data and forward to sink node. Each aggregate node caches the previously received data from the sensor nodes. If data difference between previously received data and currently received data is significant then encoding done and data transmitted to sink node. Otherwise no encoding done and the data is transmitted normally. Algorithm: Aggregate Heuristic(packet pkt1, packet pkt2) //pkt1i& pkt2i is ith packet sent by leaf node 1 and leaf node 2 respectively. { Apply function f on data(pkt1i), data(pkt2i) and if it returns 0 then { If data(pkt1i),data(pkt1i-1) not equals to 0 then { Perform network coding on pkt1i and pkt1i-1 // pkt1i-1 is cached copy Transmit data obtained by encoding in previous step } ElseIf data(pkt2i),data(pkt2i-1) not equals 0 { Perform network coding on pkt2i and pkt2i-1 121
  • 6. International Journal of Network Security & Its Applications (IJNSA), Vol.5, No.2, March 2013 Transmit data obtained by encoding in previous step } Else { Select either of the packet and transmit } } Else { Perform network coding on pkt1 and pkt2 Transmit data obtained by encoding in previous step } //End of Algorithm Function data(packet pkt) { Return data encapsulated in packet "pkt" } 7. SIMULATION RESULTS Given algorithm is implemented in ns-2.34. Traffic is generated using a CBR traffic generator at leaf nodes. We have simulated the discussed algorithm on topologies of 20, 44 and 92 nodes. AS mentioned earlier, function ƒ is simulated with the help of random variable. Caching is only implemented at aggregate node with cache buffer size of two, one for each leaf node. Results of simulations are given in Figure 3 for both types of network that is to say network without coding and network with coding. Each simulation is run four times and so each bar of Figure 3 represents average of four simulation runs. This is done to mitigate the effect of random variable and simulation parameters. Table 1:Coding Gain No. of nodes Coding gain 20 1.46 44 1.36 92 0.84 One could easily see that for smaller network size (20, 44) total numbers of transmissions per unit time have reduced. But for the network of 92 nodes it has actually increased. This could possibly be because for large networks, numbers of collisions in network, without coding are more as compared to one with network coding. 122
  • 7. International Journal of Network Security & Its Applications (IJNSA), Vol.5, No.2, March 2013 Figure 3: Simulation result Line graph for coding gain shown in Table 1. Now from concluded result of coding gain one can clearly see that coding gain is more than 1 for 0-75 sensor nodes. Hence we can say network efficiency gives better performance for this range for nodes. After that coding gain degrades to less than 1. This could possibly be because for large networks, numbers of collisions in network, with coding are more as compared to one without network coding. 3. CONCLUSIONS & FUTURE WORK In this paper we have implemented the idea that the function ƒ is used by the aggregate node to decide whether to apply network coding or not. We have found out that as the size of sensor network increases, approach with network coding allows better bandwidth utilization. Though we have not quantified, one could easily argue, as number of transmissions required to send one packet from leaf node to sink nodes decreases it also provides significant energy savings at sensor nodes. Although the topology suggested is scalable and robust due to multiple paths from leaf to sink nodes, the cost effectiveness of this topology still remains an open question. It is also challenging to come up with a good ƒ, as it depends a lot upon the application and environment. REFERENCES [1] Ian F. Akyildiz, Weilian Su, Yogesh Sankara subramaniam and Erda lCayirci, (2002) “ A Survey on Sensor Networks”, Georgia Institute of Technology. [2] Rudolf Ahlswede, NingCai, Shuo-Yen Robert Li, Raymond W. Yeung,(2000), “Network Information Flow”, IEEE Transactions on Information Theory, Vol. 46, No. 4. [3] Young-ri Choi , Mohamed G. Gouda ,Disciplined Flood Protocols in Sensor Networks, UTCS Technical Report TR-05-03 ,The University of Texas at Austin. [4] R. R. Rout , S.K. Ghosh , S. Chakrabarti,2009, Fourth International Conference on Industrial and Information Systems, ICIIS 2009, 28 - 31 December 2009, Sri Lanka, “Network Coding-aware Data Aggregation for a Distributed Wireless Sensor Network”, Indian Institute of Technology, Kharagpur. [5] P. A. Chou, Y. Wu, and K. Jain, (2003), “Practical network coding”, Proc. Allerton Conf. Commun., [6] SudiptaSengupta, ShravanRayanchu, and Suman Banerjee, “ Network Coding-Aware Routing in Wireless Networks”. [7] S. Katti, H. Rahul, W. Hu, D. Katabi, M. Medard, and J. Crowcroft, (2006), Proc. ACM SIGCOMM, Sep. 2006, pp. 243–254 , XORs in the air: Practical wireless network coding. [8] Qunfeng Dong , Jianming Wu ,Wenjun Hu, Jon Crowcroft, “Practical Network Coding in Wireless Networks” ,University of Wisconsin & Cambridge. [9] Raymond W. Yeung, Shuo-Yen Robert Li, NingCai, Zhen Zhang, Network Coding Theory. 123
  • 8. International Journal of Network Security & Its Applications (IJNSA), Vol.5, No.2, March 2013 [10] K V Rashmi, Nihar B Shah and P Vijay Kumar, (2010), “Network Coding”, IISc. [12] AnanthKini, Vilas Veeraraghavan, Steven Weber, (2004), “Fast and efficient randomized dynamic source routing (DSR) on lattice sensor networks”, Department of Electrical and Computer Engineering, Drexel University. [13] Ting Zhu, ZiguoZhong, Tian He, and Zhi-Li Zhang, Exploring Link Correlation for Efficient Dynamic source routing (DSR) in Wireless Sensor Networks, University of Minnesota. [14] Christina Fragouli, J¨orgWidmer, Jean-Yves Le Boudec, “On the Benefits of Network Coding for Wireless Applications”. Author Dr. Abdul Rahiman M is currently working as Director in All India Council for Technical Education (AICTE), Ministry of HRD, Government of India. He also served as Director, Vocational Higher Secondary Education (VHSE), Government of Kerala. He worked as Professor in the Department of Computer Science & Engineering in LBS Institute of Technology for Women, Trivandrum, Kerala State, India. He did his M.Tech degree in Computer Science from Kerala University in Computer Science with specialization in Digital Image Computing and also undergone MBA degree in Systems and Post Graduate Diploma in Human Resource Management from Kerala University. He has his PhD from Karpagam University, Coimbatore in the area of pattern recognition. He has many publications in various International Journals and International conference proceedings. He is a Life Member of Indian Society for Technical Education (ISTE) and Computer Society of India (CSI)and also Member of International Association of Computer Science & Information Technology (IACSIT). He is a member of Board of Governors in Daman Diu Higher Education and also associated with many professional bodies. He chaired many International Conferences and editorial board member of many International Journals. 124