Professional Documents
Culture Documents
I. Introduction
A recent advances in wireless sensor Networks has seen a substantial transformationin the integration of
computation, secure communication , High throughput communications and sensing mechanisms in the military and
civilian application[1][2]. A key feature of such networks is that each network consists of a large number of
untethered and unattended sensor nodes. These nodes often have very limited and non-replenishable energy
resources, which makes energy an importantdesign issue for these networks. Routing is another very challenging
design issue for WSNs [3]. A properly designed routing protocol should not only ensure high message delivery ratio
and low energy consumption for message delivery, but also balance the entire sensor network energy consumption,
and thereby extend the sensor network lifetime. Localization is one of the most important subjects because the
location information is typically useful for coverage, deployment, routing, location service, target tracking, and
rescue. The sensor nodes are randomly deployed by the vehicle robots oraircrafts is depicted in figure 1.1.
Figure 1.1: Node Deploying and Secured Data Retrieval in Wireless Sensor Network
While the Global Positioning System (GPS) is one of the most popular positioning technologies which is widely
accessible, the weakness of high cost and energy consuming makes it different to install in every node is analysed
with respect to signal Strength Analysis [1][4]. In order to reduce the energy consumption and cost, only a few of
nodes which are called beacon nodes contain the GPS modules. The rest of nodes could obtain their locations
through localization method. The process of estimating the unknown node position within the network is referred to
as node self-localization[5].
II. Background
2.1. Node Intermediate Selection Strategies
Node intermediate is been selected based on the Node density factor among the threshold fixed for the node for
the forward transmission. The delay and latency is proportional factor for consideration of the node committing
conditions. Scheduling feasibility is the ability of a node to guarantee a packet to arrive at its destination within QoS
requirements. As mentioned, when the QoS of the direct transmission between a source node and an AP cannot be
guaranteed, the source node sends a request message to its neighbor nodes. After receiving a forward request from a
source node, a neighbor node ni with space utility less than a threshold replies the source node. The reply message
contains information about available resources for checking packet scheduling feasibility.Based on this information,
the source node chooses the replied neighbours that can guarantee the delay QoS of packet transmission to APs.
2.2. Packet Scheduling and Transmitting Strategies
Packet Scheduled based on the network type and traffic flowing in the predicted path. Data classified into
packets and initiated for transmission with random routing and request acknowledgments. In order to reduce the
stream transmission time, a distributed packet scheduling algorithm is proposed for packet routing. This algorithm
assigns earlier generated packets to forwarders with higher queuing delays and scheduling feasibility, while assigns
more recently generated packets to forwarders with lower queuing delays and scheduling feasibility, so that the
transmission delay of an entire packet stream can be reduced. Reducing packet size can increase the scheduling
feasibility of an intermediate node and reduces packet dropping probability. However, we cannot make the size of
the packet too small because it generates more packets to be transmitted, producing higher packet overhead.
2.3. Traffic Redundancy Elimination Strategies
Traffic redundancy can be eliminated by constraint like high priority node routing, overall space utility function,
Thresholding of workload to the node, packet traffic in particular specified period. In a highly dynamic mobile
wireless network, the transmissionlink between two nodes is frequently broken down. The delay generated in the
packet retransmission degrades the QoS of the transmission of a packet flow. On the other hand, a node in a highly
dynamic network has higher probability to meet different mobile nodes and APs, which is beneficial to resource
scheduling. an intermediate node forwards the packets in the order from the packets with the closest deadlines to the
packets with the farthest deadlines.
2.4. Mobility Segment Resizing Strategies
Mobility segment resizing is carried out with respect the long path and neighbour nodes mobility with directions
specified . The basic idea is that the larger size packets are assigned to lower mobility intermediate nodes and
smaller size packets are assigned to higher mobility intermediate nodes, which increases the QoS-guaranteed packet
transmissions. Specifically, in QOD, as the mobility of a node increases, the size of a packet Sp sent from a node to
its neighbor nodes decreases In order to achieve fairness in the packet forwarding scheduling for soft-deadline
driven applications, a forwarding node can use the least slack first (LSF) scheduling algorithm
2.5. Designing an Interference Aware Distributed Routing Protocol for Data Dissemination
Routing Protocol has been modelled against the node collision and node Interference with constraints as follows
2.6. Node Outage Prediction
Node outage is calculated with respect to the periodic communication of the same nodes between both, It can be
eliminated using the outage probability factor. Therefore, by reducing the NAV (Network Allocation Vector)value,
we can increase the scheduling feasibility of the intermediate nodes and sequentially increase the QoS of the packet
transmission. Due to the broadcasting feature of the wireless networks, in a hybrid network, the APs and mobile
nodes can overhead and cache packets, we use an end-to-end traffic redundancy elimination (TRE) algorithm to
eliminate the redundancy data to improve the QoS of the packet transmission
T(a,b) = outage consumed in transmitting and receiving by node in specified time w.r.t packet over one hop
from a to b
ej = Σk-1i=1 T(ni, ni+1) = total outage energy spent for packet j
TRE uses a chunking scheme to determine the boundary of the chunks in a data stream. The source node caches
the data it has sent out andthe receiver also caches its received data.
information of aggregates. However, in a hostile environment, the adversary could fabricate false temporal variation
patterns of the aggregates by manipulating a series of aggregation results through compromised nodes. Secure
aggregation schemes conducted one individual verification for each aggregation result is analysed and processed in
many network topologies , which could incur great accumulative communication cost and negative impact on
transmission scheduling for continuous aggregation. In this literature, we identify distinct design issues for
protecting continuous in network aggregation and Secure scheme to detect false temporal variation patterns.
Compared with the existing schemes, our scheme greatly reduces the verification cost by checking only a small part
of aggregation results to verify the correctness of the temporal variation patterns in a time window. A sampling-
based approach is used to check the aggregation results, which enables our scheme independent of any particular in-
network aggregation protocols as opposed to existing schemes.
Neil Zhenqiang Gong Mario Frank, and Prateek Mittal “Sybil Belief: A Semi-Supervised Learning Approachfor
Structure-Based Sybil Detection” discusses about Sybil attacks are a fundamental threat to the securityof distributed
systems. Recently, there has been a growinginterest in leveraging social networks to mitigate Sybil attacks.However,
the existing approaches suffer from one or more drawbacks, including bootstrapping from either only known
benignor known Sybil nodes, failing to tolerate noise in their priorknowledge about known benign or Sybil nodes,
and not beingscalable. In this literature, we aim to overcome these drawbacks.Toward this goal, we gather Sybil
Belief, a semi-supervised learning framework, to detect Sybil nodes. Sybil Belief takes asocial network of the nodes
in the system, a small set of knownbenign nodes, and, optionally, a small set of known Sybils as input. Then, Sybil
Belief propagates the label information from the known benign and/or Sybil nodes to the remaining nodes in the
system. We evaluate Sybil Belief using both synthetic andreal-world social network topologies. We analyse that
Sybil Belief is able to accurately identify Sybil nodes with low false positiverates and low false negative rates. Sybil
Belief is resilient to noisein our prior knowledge about known benign and Sybil nodes. Moreover, Sybil Belief
performs orders of magnitudes better thanexisting Sybil classification mechanisms and significantly betterthan
existing Sybil ranking mechanisms.
IV. Conclusion
In this paper, wireless sensor network against the secure technique and routing principles against the conflicting
issues through localization algorithms in security and Energy management Strategies for the lifetime optimization of
the sensor nodes are analysed. In randomly deployed sensor Setting, the crucial steps of routing and node
localization has discussed in review of literature sections and vulnerable to attacks like wormhole, black hole and
denial of service attacks. In response to these challenges , many light weight secure aware routing and localization
approach has exploited the benefits of the link directionality , Neighbour discovery , bandwidth segment resizing
through the Frequency division multiplexing and modulation, traffic congestion control , fault tolerance , data
compression and data redundancy injection technique and equalization principles. Detailed analysis is proved that
secure data dissemination strategies outcome in terms of throughput and delay properties against the state of
approaches.
References
[1] Li, Y., Ren, J. and Wu, J. Quantitative measurement and design of source-location privacy schemes for
wireless sensor networks. IEEE Transactions on Parallel and Distributed Systems 23 (7) (2012)
1302-1311.
[2] Garg, R., Varna, A.L. and Wu, M. An efficient gradient descent approach to secure localization in resource
constrained wireless sensor networks. IEEE Transactions on Information Forensics and Security 7 (2)
(2012) 717-730.
[3] Bose, P., Morin, P., Stojmenović, I. and Urrutia, J. Routing with guaranteed delivery in ad hoc wireless
networks. Wireless networks 7 (6) (2001) 609-616.
[4] Okorafor, U.N. and Kundur, D. Security-aware routing and localization for a directional mission critical
network. IEEE Journal on Selected Areas in Communications 28 (5) (2010).
[5] Tang, D., Li, T., Ren, J. and Wu, J. Cost-aware secure routing (CASER) protocol design for wireless sensor
networks. IEEE transactions on parallel and distributed systems 26 (4) (2015) 960-973.
[6] Ma, X. and Chen, Y. DDoS detection method based on chaos analysis of network traffic entropy. IEEE
Communications Letters 18 (1) (2014) 114-117.
[7] Yu, L., Li, J., Cheng, S., Xiong, S. and Shen, H. Secure continuous aggregation in wireless sensor
networks. IEEE Transactions on Parallel and Distributed Systems 25 (3) (2014) 762-774.
[8] Gong, N.Z., Frank, M. and Mittal, P. Sybilbelief: A semi-supervised learning approach for structure-based
sybil detection. IEEE Transactions on Information Forensics and Security 9 (6) (2014) 976-987.
[9] Liu, F., Tsui, C.Y. and Zhang, Y.J. Joint routing and sleep scheduling for lifetime maximization of wireless
sensor networks. IEEE Transactions on Wireless Communications 9 (7) (2010) 2258-2267.
[10] Yu, B., Li, J. and Li, Y. Distributed data aggregation scheduling in wireless sensor networks.
In IEEE INFOCOM, 2009, 2159-2167.
[11] Li, Z. and Shen, H. A QoS-oriented distributed routing protocol for hybrid wireless networks. IEEE
Transactions on mobile computing 13 (3) (2014) 693-708.
[12] Gong, Z. and Haenggi, M. Interference and outage in mobile random networks: Expectation, distribution,
and correlation. IEEE Transactions on Mobile Computing 13 (2) (2014) 337-349.