International Journal of Engineering Science Invention Research & Development; Vol. IV, Issue III, SEPTEMBER 2017
www.ijesird.com, E-ISSN: 2349-6185
SECURE AND RELIABLE ROUTING
PROTOCOLS IN MULTI-HOP WIRELESS
NETWORKS USING MANET
Thanikonda Madhavi1, Dr.ch.Balaswamy2
1
M.Tech (DECS) , Professor & HOD2, Department of ECE,QIS College of Engineering and Technology
Pondur Road, Vengamukkapalem, Ongole- 523272, AP
2
tanikondamadhavi2@gmail.com1 , ch.balaswamy7@gmail.com
Abstract— In multi-hop wireless networks, the mobile to significant energy savings. The characteristics of
nodes usually act as routers to relay packets generated from low cost, low-power, and multifunctional sensors
other nodes. However, selfish nodes do not cooperate but make
rendered WSNs very attractive.[2][3]
use of the honest ones to relay their packets, which has negative have
effect on fairness, security and performance of the network. In Nowadays, with the development of cloud
propose a novel incentive mechanism to stimulate cooperation in technology WSNs have been rapidly deployed
multi-hop wireless networks. Fairness is achieved by using
credits to reward the cooperative nodes. The overhead is many practical applications, including home
significantly reduced by using a cheating detection system (CDS) security,
battlefield surveillance, monitoring
to secure the payment. Extensive security analysis demonstrates movement of wild animals in the forest, healthcare
that the CDS can identify the cheating nodes effectively under
different cheating strategies. Simulation results show that the applications etc. Recently, extensive research
overhead of the proposed incentive mechanism is incomparable efforts have been dedicated to explore new roles for
with the existing ones. The circulated design makes it difficult to WSNs in remote and inaccessible environments. In
build a exceedingly secure and dependable yet insubstantial data
storage scheme. on top of the one dispense, sensor information a sensor network, each node is both a sensor and a
are subject to not only Byzantine failures, but also lively router, and its computing capability, storage
pollution attacks, as along the time the adversary may modify capacity and communications ability are limited.
pollute the stored data by compromise individual sensors. On the
erstwhile hand, the resource-constrain environment of WSNs Moreover, in many WSN applications, sensor nodes
precludes the applicability of overload for security designs. To are deployed in harsh environments, which make
address the challenge, in this object propose framework based the replacement of failed nodes either difficult or
integrated dynamic data storage scheme with dynamic reliability
expensive. Thus, in many scenarios, a wireless node
guarantee.
Keywords-WSN, CDS, MANET, selfish node.
I. INTRODUCTION
A wireless sensor network (WSN) is a selforganized wireless network system consisting of a
number of sensors, which gather information from
their surrounding environments and transmit it to a
data sink or a base station (BS). In WSN
applications, the main objective is to monitor and
collect sensor data and then transmit the data to the
BS. Sensors in different regions of the field can
collaborate in data collection, and provide more
accurate reports about their local regions. Most
deployed WSNs measure physical phenomena like
temperature, pressure, humidity, or location of
objects to improve the fidelity of reported
measurements, and data aggregation reduces the
communications overhead in the network, leading
Thanikonda Madhavi and Dr.ch.Balaswamy
must operate without battery replacement for an
extended period of time. HEED ensures that only
one CH within a certain range achieves the uniform
CH distribution across the network. Therefore, the
head nodes consume a great deal of power in the
HEED protocol, resulting in their quick depletion of
energy. The EECS protocol leads to a fair
distribution for cluster heads, in which cluster heads
are selected based on the residual energy and
location of nodes. In EECS, a competitive
algorithm is suggested for the CH selection
phase.[10][11][13]
II. EXISTING SYSTEM
A recent advance in sampling theory, known
as compressive sensing (CS) provides a promising
solution to reducing the required number of
measurements to represent the original signal,
ijesird, Vol. IV, Issue III, September 2017/121
International Journal of Engineering Science Invention Research & Development; Vol. IV, Issue III, SEPTEMBER 2017
www.ijesird.com, E-ISSN: 2349-6185
where high-dimensional sparse signals can be
recovered from highly incomplete low-dimensional
vectors. Taking advantage of the combination of CS
and network coding, a variety of DDS schemes
such as CStorage, ICStorage, and compressive
network coding based distributed data storage
(CNCDS) have been proposed to improve the
energy efficiency. Transmitting the linear
projections of sensor readings, these DDS schemes
can greatly reduce the number of transmissions and
receptions. However, they have been designed by
only taking into account the spatial correlation
among sensor readings from geographically
neighboring nodes. Note that sensor readings in a
WSN from natural phenomena generally exhibit
correlations in both spatial and temporal domains.
In this letter, we exploit both spatial and
temporal (spatiotemporal) correlations among
sensor readings to further improve DDS energy
efficiency. The new approach is referred to as
spatiotemporal compressive network coding (STCNC). Specifically, the projections of sensor
readings within several consecutive time slots are
first generated, and then linearly combined along
multiple random paths in a network coding based
manner. Prove that the equivalent sensing matrix
can be constructed by the product of temporal and
spatial sensing matrices. Consequently, CS can be
employed to jointly recover the original sensor
reading block generated from the entire sensor node
across multiple time slots by visiting only an
arbitrary small subset of sensor nodes. In other
proposed scheme can jointly compress and recover
a spatiotemporal sensor reading block, whereas
existing DDS-CS schemes only repeat the previous
operation for data handling in each time slot.
However, the increased data dimension of the CS
framework could result in degraded recovery
performance. To solve this problem, we derive a
separable sensing operator that allows the spatial
matrix and temporal sensing matrix to be optimized
separately. Simulation results demonstrate that
compared with the conventional DDS schemes, the
proposed scheme can significantly reduce the
number of transmissions and receptions with almost
the same recovery performance, resulting in much
higher energy efficiency.[5][7]
Thanikonda Madhavi and Dr.ch.Balaswamy
A. SPATIOTEMPORAL DDS PROTOCOLS
The proposed ST-CNC scheme extends the
work in and considers a more realistic scenario,
where sensor readings across all the nodes exhibit
both spatial and temporal correlations. It starts with
the initialization of each node, and then encodes
and disseminates the sensor readings in a two
dimensional CS based manner. Finally, a Kronecker
structure based mathematical model is formulated
for data recovery. Next we describe the operation of
each stage in detail.
(S-I) Initialization.
Given a compressible sensor reading block
X ∈ RN×L and a temporal sensing matrix Φt ∈
RG×L(G_L), each node forms its initial
transmission packet. Specifically, the packet of the
n-th node, denoted by rn, has three independent
components given by
The first component in rn is a random
coefficient being +1 or −1 with equal probability,
the second one contains the node index n, and the
third one is linear projection of XTn ,: on Φt .
(S-II) Broadcasting.
Each sensor node randomly selects itself as
a source node with a probability P0, and it is
assumed that there are Ns(Ns < N) source nodes
and their packets are broadcast to neighboring
nodes. If a node p(p ∈ [1,N]) receives a packet from
a neighboring node q(q ∈ [1,N]), it will check
whether the received packet index (rq{2}) has a
common element as the stored packet index
(rp{2}).
ijesird, Vol. IV, Issue III, September 2017/122
International Journal of Engineering Science Invention Research & Development; Vol. IV, Issue III, SEPTEMBER 2017
www.ijesird.com, E-ISSN: 2349-6185
Introduce a weighted factor β to help
provide additional degree of freedom aiming for
further performance optimization, whose value in
detail will be determined in Section the third
component in rp is updated according to a network
coding based manner.[9]
(S-III) Intermediate Nodes Forwarding.
In the following, only the reception nodes in
Stage II which have implemented the update
operation in continue to broadcast their updated
packets to neighboring nodes with a probability Pf.
Again, if a node receives a packet from its
neighboring node and at the same time the
condition is satisfied, this node will update its
packet according to the broadcasting operation will
continue until there are no updated reception nodes
in the last iteration.
B. RECOVERY ACCURACY IMPROVEMENT
The proposed DDS scheme increases the
amount of data under the Kronecker product
framework and could result in degraded recovery
performance; therefore, we further improve this
framework to provide a good recovery
performance. A sensing matrix is crucial to CS,
because it determines the efficiency in recovering
the original compressible signal. In many CS
applications, a random measurement matrix such as
a Gaussian matrix is used. However it is shown in
that a well-designed measurement matrix helps
further improve the recovery accuracy compared
with a random matrix. According to a smaller value
of μ(A) will lead to a more accurate recovery of θ
and x. Thanks to the Kronecker structure in as and
At can be optimized separately according to the
following theorem.
Theorem 1: Consider two matrices As and
At , one has
{μ(As⊗At) = max{μ(As),μ(At )}.
Theorem 1 indicates that minimizing μ(As
⊗At ) is equivalent to minimize μ(As) and μ(At)
separately. To minimize μ(As), we know that Φs is
formulated by the transmission protocol, and the
weighted factor β in Φs can be adjusted aiming for
reducing μ(As). We adopt the method of numerical
search of β in the region [0,1]. Meanwhile, this
Thanikonda Madhavi and Dr.ch.Balaswamy
method also considers the numerical stability for
signal recovery. We adopt the algorithm in to
minimize μ(At ), where the temporal sensing matrix
which commonly uses a Gaussian matrix is
redesigned.
C. COMPOSITE BIT REPRESENTATION
An important backhaul rate reduction results
if a suitable composite representation of the
quantized signals is used. In fact, BS j may quantize
the signal on subcarrier n for two BSs i1 and i2
using b(i1,j) n and b(i2,j) n bits. However,
considering that both quantized signals are sent to
the RNC and are obtained from the same signal Y
(j) n , we can provide both quantization
representations with fewer bits than b(i1,j) n +
b(i2,j) n .
For instance, if b(i1,j) n = b(i2,j) n , only
one of the two signals is sufficient to reconstruct
both and thus only one can be sent to the RNC.
Note that if we were to represent a given signal
with the maximum number of bits required by the
other BSs, I would increase the backhaul rate in
some links during phase two. In this section we
illustrate this composite representation. With
reference to subcarrier n, instead of simply sending
i∈J\{j} b(i,j) n bits to the RNC, BS j defines a new
composite quantizer that still allows the RNC to a)
reconstruct each quantized signal Y (i,j) n , i ∈ J \
{j}, and b) send the corresponding bits to each
cooperative BS in the second phase.[10]
D. NETWORK THROUGHPUT
MAXIMIZATION
First formulate the network throughput
maximization problem that is solved at the RNC to
schedule the backhaul transmissions. Then, we
propose an iterative greedy solution to the resulting
optimization problem.
E. PROBLEM FORMULATION
The RNC has got CSI from the BSs.
However, to reduce the scheduler complexity and
by assuming that the coherence bandwidth of the
channel is larger than the FSB bandwidth, the RNC
makes decisions by assuming
G(j,k) s = H(j,k) n , n∈ Ns
ijesird, Vol. IV, Issue III, September 2017/123
International Journal of Engineering Science Invention Research & Development; Vol. IV, Issue III, SEPTEMBER 2017
www.ijesird.com, E-ISSN: 2349-6185
Scheduler allocates the same number of
quantization bits to all the subcarriers n ∈ Ns of the
same FSB, i.e., b(i,j) n constant for n ∈ Ns .
III. PROPOSED SYSTEM
A wireless sensor network (WSN) consists
of spatially distributed autonomous sensors to
monitor physical or environmental conditions, such
as temperature, sound, pressure, etc. A WSN
typically has little or no infrastructure. It consists of
a number of sensor nodes working together to
monitor a region to obtain data about the
environment. Today such networks are used in
many industrial and consumer applications, such as
industrial process monitoring and control, machine
health monitoring and soon. In such applications
one of the major challenge is where and how to
store the sensed data. Data storage in WSNs mainly
falls into two categories, namely centralized data
storage and distributed data storage Data
availability, security, query processing and data
retrieval, network lifetime, energy efficiency are the
major challenges faced by data storage in wireless
sensor networks. Then about various distributed
data storage where information is stored on more
than one node, often in a replicated fashion in
wireless sensor network. There are two main
approaches: data-centric storage and fully
distributed data storage. In a fully distributed data
storage approach, all nodes contribute equally to
sensing and storing. In data- centric storage
approach some distinguished storage nodes are
responsible for collecting data.[1][2]
Thanikonda Madhavi and Dr.ch.Balaswamy
Figure 1. Distributed Storage
Both the schemes make use of various
techniques for distributed data storage and each
technique is characterized by different properties
like topology, security, load-balancing and
reliability. Data availability, security, query
processing and data retrieval, network lifetime,
energy efficiency are the major challenges faced by
data storage in wireless sensor networks.
A. FULLY DISTRIBUTED DATA STORAGE
[FDDS]
In this approach, all nodes contribute
equally to sensing and storing. All nodes try to store
the sensor readings locally and, then, delegate other
nodes in the WSN to store newly collected data as
soon as their local memories are full. Fully
distributed data storage can be categorized into
mainly four classes as such as 1) Topology based
FDDS, 2) Security based FDDS 3) Load- balancing
based FDDS, and 4) Reliability based FDDS.
B. TOPOLOGY BASED FDDS
In this approach data storage in wireless
sensor networks are based on the topology of the
network. Most commonly tree topologies are
adopted. Mesh topology are also introduced in
some special cases. Some examples are given as
follows.
C. Pro Flex
The main objective of ProFlex is to
introduce distributed data storage for heterogeneous
wireless sensor networks with mobile sink. It is a
probabilistic and flexible data storage schemes.
ProFlex constructs multiple data replication
structures. When compare with related protocols,
ProFlex has an acceptable performance under
ijesird, Vol. IV, Issue III, September 2017/124
International Journal of Engineering Science Invention Research & Development; Vol. IV, Issue III, SEPTEMBER 2017
www.ijesird.com, E-ISSN: 2349-6185
message loss scenarios, decreases the overhead of
transmitted messages, and decreases the occurrence
of the energy hole problem. The protocol is
composed of three phases: tree construction,
importance factor distribution and data distribution.
Tree topology is responsible for making multiple
replication structures. Advantages of ProFlex
include 1.Reduced message loss, 2.Decrease the
overhead of transmitted messages, 3.Decrease
occurrence of energy whole problem and
4.Applicable to large scale WSN. Guarantee to
security of data is the main disadvantage of
ProFLex.
D. SECURITY BASED FDDS
Security based fully distributed data storage
perform distributed data storage by considering
security and privacy of data as the main constraint.
Several research papers are there which focus on
security while data storing. Some examples are
given as follows.
E. C&R-DS (CONFIDENTIAL AND RELIABLE
DATA STORAGE)
The objective of C&R-DS is to introduce a
technique that prevents attackers from gain
information from sensor collected data. To preserve
confidentiality
introduce
some
encryption
mechanism, so that data at the storage node is not
available to attacker. A Two-tiered sensor network
consists of three types of nodes: sensors, storage
nodes, and a sink. Sensors are inexpensive sensing
devices with limited storage and computing power.
They are often massively distributed in a field for
collecting data.
Storage nodes are powerful wireless devices that
are equipped with much more storage capacity and
computing power than sensors. Each sensor
periodically sends collected data to its nearby
storage node. Attackers are more motivated to
compromise storage nodes thus algorithm to
provide confidentiality and Algorithm to provide
reliability are introduced for secure data storage.
The
advantages
include
1.Confidentiality,
2.Reliability, 3.Splitting of data gives a) network
band width b) network overhead c) increase
efficiency and 4.Autherization[4][5]
Thanikonda Madhavi and Dr.ch.Balaswamy
F. LOAD-BALANCING BASED FDDS
These schemes perform fully distributed
data storage based on load-balancing using different
approaches. Such schemes address the problem of
low-memory capacity of sensor nodes in WSN.
Some examples which provide load-balancing is
given as follows.
(i)
Steady State Phase
After the set up phase, the compressed
values of the data packets are sent by all the C-Ms.
Here, they do not send the sensed value CMi they
rather send the difference between the sensed data
value and the data value of the corresponding C-H.
Let the compressed value denoted as Δi. The i-th
C-Ms data value denoted as value CMi and the
corresponding C-H data value denoted as value CH.
Therefore, ΔI = |value_CMi − value_CH|.
Note that, at the binging of each occurrence, the CH sends the complete set of the sample data values
of all the C-Ms and based on the information the
compression becomes achievable.
Figure 2. (a) The proposed protocol (b) The classical protocol
Region range is Revent. In the case of the
proposed protocol, nodes transmit their values to
the BS. Upon receiving the values from the nodes
the BS then calculates Si for each ni. Therefore BS
may select either node n1 or node n4 as a C-H as
both nodes minimize the total difference value
measured. Other nodes in turn become C-Ms. And
during the steady state phase the all the C-Ms
transit only the Δi value to the C-H rather than the
complete temperature values. As a result a
compressed value with less coded bits compared to
the complete data in the classical clustering scheme.
ijesird, Vol. IV, Issue III, September 2017/125
International Journal of Engineering Science Invention Research & Development; Vol. IV, Issue III, SEPTEMBER 2017
www.ijesird.com, E-ISSN: 2349-6185
With is reduction on transmitting bits energy saving
is achieved in a great extent demonstrated in
simulation results.[6][8] The LQE algorithm is
shown in Algorithm 1
(ii)_Algorithm 1. Link Quality Estimation
Algorithm
1: if receiving an ACK then
2: update ETl1] at the rates used for to last packet;
3: update average RSSls of recent ACKs measured
on RX antennas RSSI;
4: timer + +; error = 0; succ[ratecur] + +;
5: if receiving a "complete ACK" then
6: success + +;failure = 0;
7: failure V = O;failureH = 0;
8: successV + =Fsiperfect tx(rate), last tx(rate));
9: successH+ = Fsh(minRSSI, maxRSSI);
10: else if receiving a "partial ACK" then
11: success = O;failure + +;
12: successV = 0; successH = 0;
13: failure V + = Fjv(perfect tx(rate), last tx(rate));
14: failureH+ = FjJlminRSSI, maxRSSI);
15: end if
16: else ifmissing an ACK but tries < retry limit
then
17: fail[ratecur] + +;
18: ratecur = Lookup (multirate retry);
19: else if missing an ACK and tries >= retry limit
then
20: timer + +; failure = 0; success = 0;
21: error + +; err [rate] + +;
22: end if
G. PROTOTYPES AND TEST BEDS
The feasibility of cooperative techniques has
been demonstrated in “over-the-air" networks of
limited size. The proposed system showed
significant gains in mean sum-rate capacity (as a
function of measured SINR) compared to a
conventional time-multiplexed baseline. Two
outdoor testbeds for implementing network
coordination have been developed under the EASYC project (Enablers for Ambient Services and
Systems Part C- Cellular networks), a collaboration
between academia and industry for the research and
development of LTE-Advanced technologies. One
testbed in Berlin, Germany, consists of four base
Thanikonda Madhavi and Dr.ch.Balaswamy
station sites (seven sectors) connected through a
high-speed optical fiber network. An even larger
testbed consists of ten base station sites (28 sectors)
distributed in downtown. Network coordination has
been recently demonstrated over limited portions of
each testbed. Using two distributed base antennas
and two users, the Berlin testbed demonstrated
downlink network coordination for an FDD LTE
trial system. It accounted for many practical
implementation aspects including synchronization,
CSI uplink feedback, limited modulation and
coding schemes, and a finite-bandwidth backhaul
connection between the bases. Zero-forcing
precoding based on limited CSI feedback was
implemented jointly across the two bases. The
Dresden testbed demonstrated a similarly detailed
field trial for an LTE uplink system, also consisting
of two bases and two users.[5][8][9]
IV. NETWORK SIMULATOR (NS2)
● NS is an object oriented discrete event
simulator
– Simulator maintains list of events and executes
one event after another
– Single thread of control: no locking or race
conditions
● Back end is C++ event scheduler
– Protocols mostly
– Fast to run, more control
● Front end is OTCL
– Creating scenarios, extensions to C++ protocols
– fast to write and change
A. EVENT SCHEDULAR
In this Event scheduler while we processing
many data’s at a time it will process one by one
(i.e) FIFO concept , so there is no congestion while
transferring the packets.
B. PACKETS
It is the collection of data, whether header is
called or not all header files where present in the
stack registers.
Cmn header
ijesird, Vol. IV, Issue III, September 2017/126
International Journal of Engineering Science Invention Research & Development; Vol. IV, Issue III, SEPTEMBER 2017
www.ijesird.com, E-ISSN: 2349-6185
Ip header
Tcp header
Rtp header
Trace header
Figure 3. Packets Size
(i)
Turn on Tracing
Trace packets on individual link Trace file
format
Figure 4. Turn on Tracing
(ii)
Create Network Topology (Physical
Layer)
The Physical Layer is the first and
lowest layer in the seven-layer OSI model of
computer networking. The implementation of this
layer is often termed PHY. The Physical Layer
consists of the basic hardware transmission
technologies of a network. It is a fundamental layer
underlying the logical data structures of the higher
level functions in a network. Due to the plethora of
available hardware technologies with widely
varying characteristics, this is perhaps the most
complex layer in the OSI architecture
(iii)
Transport Connection (Transport Layer)
Transport layers are contained in both the
TCP/IP. This is the foundation of the INTERNET.
Thanikonda Madhavi and Dr.ch.Balaswamy
The OSI model of general networking. The
definitions of the Transport Layer are slightly
different in these two models. This article primarily
refers to the TCP/IP model, in which TCP is largely
for a convenient application programming interface
to internet hosts, as opposed to the OSI model of
definition interface. The most well-known transport
protocol is the (TCP). It lent its name to the title of
the entire internet protocol suite TCP/IP. It is used
qwwwwwwwwwwwwwwwwwwwwwwwwa4344.f
or connection-oriented transmissions, whereas the
connectionless user datagram suite (UDP) is used
for simpler messaging transmissions. TCP is the
more complex protocol, due to its stateful design
incorporating reliable transmission and data stream
services.
C. GENERATE TRAFFIC (APPLICATION
LAYER)
In TCP/IP, the Application Layer
contains all protocols and methods that fall into the
realm of process-to-process communications via an
Internet Protocol (IP) network using the Transport
layer protocols to establish underlying host-to-host
connections.
In the OSI model, the definition of its
Application Layer is narrower in scope, explicitly
distinguishing additional functionality above the
Transport Layer at two additional levels: session
layer and presentation layer OSI specifies strict
modular separation of functionality at these layers
and provides protocol for each layer.
D. CODE OVERVIEW
In this document, we use the term
“interpreter” to be synonymous with the OTcl
interpreter. The code to interface with the
interpreter resides in a separate directory, tclcl. The
rest of the simulator code resides in the directory,
ns-2. We will use the notation ~tclcl/hfilei to refer
to a particular hfilei in the Tcl directory. Similarly,
we will use the notation, ~ns/hfilei to refer to a
particular hfilei in the ns-2 directory. There are a
number of classes defined in ~tclcl/. We only focus
on the six that are used in ns: The Class Tcl
contains the methods that C++ code will use to
access the interpreter. The class Tcl Object is the
ijesird, Vol. IV, Issue III, September 2017/127
International Journal of Engineering Science Invention Research & Development; Vol. IV, Issue III, SEPTEMBER 2017
www.ijesird.com, E-ISSN: 2349-6185
base class for all simulator objects that are also
mirrored in the compiled hierarchy. The class
TclClass defines the interpreted class hierarchy, and
the methods to permit the user to instantiate Tcl
Objects. The class Tcl Command is used to define
simple global interpreter commands. The class
Embedded Tcl contains the methods to load higher
level built in commands that make configuring
simulations easier. Finally, the class Instance
contains methods to access C++ member variables
as OTcl instance variables.
E. Class Tcl
The class Tcl encapsulates the actual instance of
the OTcl interpreter, and provides the methods to
access and communicate with that interpreter. The
methods described in this section are relevant to the
ns programmer who is writing C++ code. The class
provides obtain a reference to the Tcl instance;
• invoke OTcl procedures through the
interpreter;
• retrieve, or pass back results to the
interpreter;
• report error situations and exit in an uniform
manner,
• Store and lookup “TclObjects”.
• Acquire direct access to the interpreter. We
describe each of the methods in the
following subsections.
Essentially, we are trying to make this
random bipartite graph as sparse as possible, while
keeping the flow high enough and also allowing
each data node to act independently. All the good
codes described in previous sections have the
property that they have very few edges ((ns2))
connecting the data nodes and the storage nodes but
can still guarantee very good connectivity between
the any two subsets. Such bipartite graphs are called
expanders and are fundamental combinatorial
objects for coding theory.
Figure 6. Comparison for Exist and proposed method packet drop
V. SIMULATION AND RESULTS
Figure 7. Comparison for Exist and proposed method packet delivery
ratio
Figure 5. Source to destination node communication
Thanikonda Madhavi and Dr.ch.Balaswamy
ijesird, Vol. IV, Issue III, September 2017/128
International Journal of Engineering Science Invention Research & Development; Vol. IV, Issue III, SEPTEMBER 2017
www.ijesird.com, E-ISSN: 2349-6185
accessibility, protection, energy efficiency and
network lifetime.
REFERENCES
Figure 8. Comparison for Exist and proposed method Energy
consumptions
VI. CONCLUSION AND FUTURE WORK
In different distributed data storage schemes
in wireless sensor networks and classified these
techniques into mainly two types namely fully
distributed data storage (FDDS) and data centric
storage (DCS). In FDDS all nodes contribute
equally to sensing and storing while in DCS some
distinguished storage nodes are responsible for
collecting a certain data. In every of these
classifications the technique can be all over again
confidential into topology base, safety based, loadbalancing based and dependability based distributed
data storage space schemes.
The topology based data storage performs
distributed data storage based on the topology of
the network and the security based data storage
adopts some data storage schemes that support
security features. The load-balanced based
distributed data storage uses grid like architecture to
achieve load balancing and can achieve robustness
in distributed storage through reliability based
distributed data storage. At last we complete a
comparison among different distributed data storage
scheme under a variety of constraints like data
Thanikonda Madhavi and Dr.ch.Balaswamy
[1] J. Yick, B. Mukherjee, and D. Ghosal, “Wireless sensor
network survey,” Comput. Netw., vol. 52, no. 12, pp. 2292–
2330, Aug. 2008.
[2] R. Zeng, Y. Jiang, C. Lin, Y. Fan, and X. Shen, “A
distributed fault/ intrusion-tolerant sensor data storage
scheme based on network coding and homomorphic
fingerprinting,” IEEE Trans. Parallel Distrib. Syst., vol.
23, no. 10, pp. 1819–1830, Oct. 2012.
[3] Z. Kong, S. Aly, and E. Soljanin, “Decentralized coding
algorithms for distributed storage in wireless sensor
networks,” IEEE J. Sel. Areas Commun., vol. 28, no. 2, pp.
261–267, Feb. 2010.
[4] M. Duarte and Y. Eldar, “Structured compressed sensing:
From theory to applications,” IEEE Trans. Signal Process.,
vol. 59, no. 9, pp. 4053–4085, Sep. 2011.
[5] A. Talari and N. Rahnavard, “CStorage: Distributed data
storage in wireless sensor networks employing
compressive sensing,” in Proc. IEEE GLOBECOM,
Houston, TX, USA, Dec. 2011, pp. 1–5.
[6] X. Yang et al., “Energy-efficient distributed data storage
for wireless sensor networks based on compressed sensing
and network coding,” IEEE Trans. Wireless Commun., vol.
12, no. 10, pp. 5087–5099, Oct. 2013.
[7] B. Ali, N. Pissinou, and K.Makki, “Identification and
validation of spatiotemporal associations in wireless sensor
networks,” in Proc. SENSORCOMM, Athens, Greece, Jun.
2009, pp. 496–501.
[8] M. Leinonen, M. Codreanu, and M. Juntti, “Distributed
correlated data gathering in wireless sensor networks via
compressed sensing,” in Proc. ACSSC, Pacific Grove, CA,
USA, Nov. 2013, pp. 418–422.
[9] Y. Rivenson and A. Stern, “Compressed imaging with a
separable sensing operator,” IEEE Signal Process. Lett.,
vol. 16, no. 6, pp. 449–452, Jun. 2009.
[10] V. Abolghasemi, S. Ferdowsi, and S. Sanei, “A gradientbased alternating minimization approach for optimization
of the measurement matrix in compressive sensing,” Signal
Process., vol. 92, no. 4, pp. 999–1009, Apr. 2012.
[11] S. Jokar and V. Mehrmann, “Sparse solutions to
underdetermined Kronecker product systems,” Linear
Algebra Appl., vol. 431, no. 12, pp. 2437–2447, Dec. 2009.
[12]
J. Duarte-Carvajalino and G. Sapiro, “Learning
to sense sparse signals: Simultaneous sensing matrix and
sparsifying dictionary optimization,” IEEE Trans. Image
Process., vol. 18, no. 7, pp. 1395–1408, Jul. 2009.
ijesird, Vol. IV, Issue III, September 2017/129