scholarly journals Block Design-Based Asynchronous Neighbor Discovery Protocol for Wireless Sensor Networks

2015 ◽  
Vol 2015 ◽  
pp. 1-12 ◽  
Author(s):  
Sangil Choi ◽  
Wooksik Lee ◽  
Teukseob Song ◽  
Jong-Hoon Youn

Neighbor discovery is a significant research topic in wireless sensor networks. After wireless sensor devices are deployed in specific areas, they attempt to determine neighbors within their communication range. This paper proposes a new Block design-based Asynchronous Neighbor Discovery protocol for sensor networks calledBAND. We borrow the concept of combinatorial block designs for neighbor discovery. First, we summarize a practical challenge and difficulty of using the original block designs. To address this challenge, we create a new block generation technique for neighbor discovery schedules and provide a mathematical proof of the proposed concept. A key aspect of the proposed protocol is that it combines two block designs in order to construct a new block for neighbor discovery. We analyze the worst-case neighbor discovery latency numerically between our protocol and some well-known protocols in the literature. Our protocol reveals that the worst-case latency is much lower than others. Finally, we evaluate the performance ofBANDand existing representative protocols through the simulation study. The results of our simulation study show that the average and maximum latency ofBANDis about 40% lower than that of existing protocols. Furthermore,BANDspends approximately 30% less energy than others during the neighbor discovery process.

2009 ◽  
Vol 7 (1) ◽  
pp. 24-41 ◽  
Author(s):  
Mikko Kohvakka ◽  
Jukka Suhonen ◽  
Mauri Kuorilehto ◽  
Ville Kaseva ◽  
Marko Hännikäinen ◽  
...  

2014 ◽  
Vol 2014 ◽  
pp. 1-23 ◽  
Author(s):  
Marjan Radi ◽  
Behnam Dezfouli ◽  
Kamalrulnizam Abu Bakar ◽  
Shukor Abd Razak

Network connectivity and link quality information are the fundamental requirements of wireless sensor network protocols to perform their desired functionality. Most of the existing discovery protocols have only focused on the neighbor discovery problem, while a few number of them provide an integrated neighbor search and link estimation. As these protocols require a careful parameter adjustment before network deployment, they cannot provide scalable and accurate network initialization in large-scale dense wireless sensor networks with random topology. Furthermore, performance of these protocols has not entirely been evaluated yet. In this paper, we perform a comprehensive simulation study on the efficiency of employing adaptive protocols compared to the existing nonadaptive protocols for initializing sensor networks with random topology. In this regard, we propose adaptive network initialization protocols which integrate the initial neighbor discovery with link quality estimation process to initialize large-scale dense wireless sensor networks without requiring any parameter adjustment before network deployment. To the best of our knowledge, this work is the first attempt to provide a detailed simulation study on the performance of integrated neighbor discovery and link quality estimation protocols for initializing sensor networks. This study can help system designers to determine the most appropriate approach for different applications.


Author(s):  
K. R. Singh ◽  
P. Das ◽  
S. Banerjee

An accumulation of wireless sensor nodes is combined together to form the Wireless Sensor Networks. The sensor nodes are distributed haphazardly without any decided method into a natural setting, which is generally inhospitable and it is difficult to provide key-chains to each node for security as they are haphazardly distributed. In this paper, we use Nested Block Design (NBD) as Key Pre-distribution Scheme (KPS) and found out that NBD support large networks with fewer keys in each node than Symmetric Balanced Incomplete Block Designs (SBIBD) and Transversal Design (TD[Formula: see text]), provide higher resiliency than SBIBDs and better connectivity than TD[Formula: see text], tradeoff between local connectivity and resiliency ([Formula: see text]) is lower than SBIBD but more than TD[Formula: see text] and key-node ratio ([Formula: see text]) is same for [Formula: see text] but lower than SBIBD.


2019 ◽  
Vol 7 (2) ◽  
pp. 7-16
Author(s):  
Poonam Mittal ◽  

Dynamic and cooperative nature of sensor nodes in Wireless Sensor Networks raises question on security. Various researchers work in this direction to spot malicious, selfish and compromised nodes. Various mechanisms followed are uniqueness of clustering, reputation system and an operation at specific nodes. LEACH is a hierarchical protocol in which most nodes transmit to cluster heads, and the cluster heads aggregate and compress the data and forward it to the base station (sink). Each node uses a stochastic algorithm at each round to determine whether it will become a cluster head in this round. Clustering process carried out in two stages takes the role of the reputation scheme and reveals specific operation at CH, IN and MNs beside their usual activities in cluster based wireless sensor networks. This paper mentioned the final structure of the security framework, corresponding attacks and defense mechanism of the model. It also discusses various security level processes of wireless sensor networks. Results implies that in a cluster-based protocol such as LEACH in which optimally 5% of the nodes are cluster heads it is likely that a significant portion of the network can be paralyzed or the entire network disabled, in the worst-case scenario, if these cluster heads are compromised. Our main contribution in this paper is our novel approach in maintaining trusted clusters through a trust-based decision-making cluster head election algorithm.


Sign in / Sign up

Export Citation Format

Share Document