scholarly journals Impact of Mobility models on Mobile Sensor Networks

Author(s):  
R.Alagu Pushpa ◽  
A. Vallimayil ◽  
V.R.Sarma Dhulipala

Wireless sensor networks (WSN) is an emerging technology, finds variety of applications in military, movement tracking, industries and medical fields. WSN are self configurable, self healing networks. In mobile sensor network, (MSN) nodes are free to move with wireless links without infrastructure. In this paper, we have studied the impact of various mobility models with AODV and DSDV routing protocols and have compared the throughput of the models. Parameters such as loss ratio, hop counts, velocity of the nodes are analyzed by varying the node density using various mobility models and routing protocols.

Author(s):  
Rachit Mittal ◽  
Manik Lal Das

Secure node localization in wireless sensor networks (WSN) has become an important research topic. Although, Global Positioning System (GPS) based node localization has got significant attention from researchers, GPS-free node localization trend is evolving in recent times. GPS-free node localization in mobile sensor networks can be constructed in two ways: Beacon based (BB) and Without Beacon based (WBB). The BB approach has been studied extensively under adversarial model and many algorithms based on BB approach have been proposed in literature in order to localize nodes in a secure manner. In contrast, WBB approach for node localization under adversarial model has not received substantial attention from researchers. In this paper, the authors discuss WBB approach for node localization under adversarial model. The authors discuss static and dynamic key settings for node localization using WBB approach. The authors present an improved protocol for node localization in mobile sensor networks, aiming at minimizing the impact of node capture threats. The authors consider the LEAP (Localized Encryption and Authentication Protocol) (Zhu, Setia, & Jajodia, 2003) and the LOCK (Localized Combinatorial Keying) (Eltoweissy, Moharrum, & Mukkamala, 2006) as the building blocks of their proposed scheme. The authors show that the improved protocol provides effective node localization in a secure manner with minimal node capture threats.


2010 ◽  
Vol 21 (3) ◽  
pp. 490-504 ◽  
Author(s):  
Fu-Long XU ◽  
Ming LIU ◽  
Hai-Gang GONG ◽  
Gui-Hai CHEN ◽  
Jian-Ping LI ◽  
...  

2012 ◽  
Vol 23 (3) ◽  
pp. 629-647 ◽  
Author(s):  
Lei WU ◽  
Xiao-Min WANG ◽  
Ming LIU ◽  
Gui-Hai CHEN ◽  
Hai-Gang GONG

Sign in / Sign up

Export Citation Format

Share Document