Energy Efficient Protocol for Multipath Transmission in Wireless Sensor Networks

Main Article Content

Roshani Talmale
Pranita Chaudhary
Sheetal Mungale

Abstract

Energy has been a major challenge in practically all networks, particularly in terms of consumption and efficient energy utilization. Many experiments and proposals for flaw detection have been made in the past, including relevant evidence. However, academics have yet to discover the absolute solution to the pre-”fault tolerance and prevention” routing protocol. using energy efficient awareness. Therefore, there is a need to explain the definition of importance of energy efficient pre-fault detection in WSNs. We propose a disseminated important productive steering calculation for WSNs that takes mind adaptation to internal failure of the network. At that point, we propose a circulated steering calculation called “Dispersed Blame Transmission Multipath Cluster Based Protocol (DBTMCP)” approach takes into account the CHs’ important use as well as their adaptation to non-critical failure. In this research, we present a protocol that selects a succeeding node in an energy-efficient manner and, in the event of its failure, restores the connectivity of the cluster’s neighbours in a sensitive manner.

Downloads

Download data is not yet available.

Article Details

How to Cite
Talmale, R., Chaudhary, P., & Mungale, S. (2022). Energy Efficient Protocol for Multipath Transmission in Wireless Sensor Networks. SAMRIDDHI : A Journal of Physical Sciences, Engineering and Technology, 14(01 SPL), 6-12. https://doi.org/10.18090/samriddhi.v14spli01.2
Section
Research Article

References

[1] Imoize, A. L., Oyedare, T. R., Ezekafor, C. G., & Shetty, S. Deployment of an Energy Efficient Routing Protocol for Wireless Sensor Networks Operating in a Resource Constrained Environment. Transactions on Networks and Communications, 7 (1), 41. December 2019.
[2] Yongmei Wang1*, Min Zhang2 and Wanneng Shu3 An emerging intelligent optimization algorithm based on trust sensing model for wireless sensor networks. Wang et al. EURASIP Journal on Wireless Communications and Networking (2018) 2018:145.
[3] D. Ganesan, R. Govindan, S. Shenker, and D. Estrin. Highly-resilient, energy-ecient multipath routing in wireless sensor networks. ACMSIGMOBILE Mobile Computing and Communications Review, 5(4):11– 25, 2001.
[4] W. Heinzelman, A. Chandrakasan, , and H. Balakrishnan. Energy-e client communication protocols for wireless micro sensor networks. In Proc. 33rd IEEE Hawaii International Conference on System Sciences, volume vol.8, pages 4–7, January 2000.
[5] C. Hong-bing, Y. Geng, and H. Su-jun. Nhrpa: a novel hierarchical routing protocol algorithm for wireless sensor networks. The Journal of China Universities of Posts and Telecommunications, 15(3):75– 81,September 2008.
[6] C. Intanagonwiwat, R. Govindan, and D. Estrin. Directed di usion: a scalable and robust communication paradigm for sensor networks. In Proc. the 6th annual international conference on Mobile computing and networking (MobiCom’00), pages 56–67. ACM, 2000.
[7] K. Kurosawa and W. Ogata. E cientrabin-type digital signature scheme. Designs, Codes and Cryptography, 16(1):53–64, January 1999.
[8] Wenjing Lou. An efficientt n-to-1 multipath routing protocol in wireless sensor networks. In In: Proc. 2nd IEEE International Conference MASS, pages 665–672, Washington D.C., November 2005.
[9] N. Nasser and Y. Chen. Seem: Secure and energy-e cient multipath routing protocol for wireless sensor networks. Computer Communications, 20(11- 12):2401–2412, 2007.
[10] L. B. Oliveira, A. Ferreira, M. A. Vilaa, H. C. Wong,
M. Bern, R. Dahab, and A. A. F. Loureiro. Secleach- on the security of clustered sensor networks. Signal Processing, 87(12):2882–2895, December 2007.
[11] B. Parno, M. Luk, E. Gaustad, and A. Perrig. Secure sensor network routing: a clean-slate approach. In Proc. the 2006 ACM CoNEXT conference, pages 1– 13, Lisboa, Portugal, December 2006. ACM.
[12] A. Perrig, R. Szewczyk, J.D. Tygar, V. Wen, and D. E. Culler. Spins: Security protocols for sensor networks. Wireless Networks, 8(5):521– 534, September 2002.
[13] Z. Quan and J. Li. Secure routing protocol cluster- gene- based for wireless sensor networks. In Proc. The 1st International Conference onInformation Science and Engineering (ICISE2009), pages 4098– 4102,December 2009.
[14] J. G. Steiner, G. Neuman, and J. I. Schiller. Kerberos: An authenti-cation service for open network systems. In Proc. the Usenix Winter Conference, Berkeley, pages 191–202, February 1988.
[15] M. Tubaishat, J. Yin, B. Panja, and S. Madria. A secure hierarchical model for sensor network. ACM SIGMOD Record, 33(1):7–13, March 2004.
[16] M. Ye, C. Li, G. Chen, and J. Wu. Eecs: An energy e cient clustering scheme in wireless sensor networks. In Proc. of the IEEE International Performance Computing and Communications Conference, pages 535–540. IEEE Press, 2005.
[17] K. Zhang, C. Wang, and C. Wang. A secure routing protocol for cluster-based wireless sensor networks using group key management. In Proc. 4th IEEE International conference on Wireless Communications, Networking and Mobile Computing (WiCOM’08), pages 1–5, October2008.
[18] Haiying Shen, Ze Li, “A Kautz-Based Wireless Sensor and Actuator Network for Real-Time, Fault-Tolerant and Energy-Efficient Transmission”, IEEE TRANSACTIONS ON MOBILE COMPUTING, VOL. 15,
NO. 1, JANUARY 2016
[19] Haojun Huang, Hao Yin, Geyong Min, Junbao Zhang, Yulei Wu, and Xu Zhang, “Energy-aware Dual-path Geographic Routing to Bypass Routing Holes in Wireless Sensor Networks”, IEEE TRANSACTIONS ON MOBILE COMPUTING.
[20] L. Cheng, J. Niu, J. Cao, S. Das, and Y. Gu, “QoS Aware Geographic Opportunistic Routing in Wireless Sensor Networks,” IEEE Trans. Parallel Distrib. Syst., vol. 25, no. 7, pp. 1864-1875, Jul. 2014.
[21] C. Fraser, C. Kevin, S. Jose, and M. Sandra, “A Survey of Geographical Routing in Wireless Ad-Hoc Networks,” IEEE Commun. Surv. Tutor., vol. 15. no. 2, pp. 621-653, 2013.
[22] S. S. Lan and C. Qian, “Geographic Routing in d- Dimensional Spaces with Guaranteed Delivery and Low Stretch,” IEEE/ ACM Trans. Netw., vol. 21, no. 2, pp. 663-677, 2013.
[23] Nalluri, S. K., Parasaram, V. K. B., & Bathini, V. T. (2021). Autonomous Manufacturing Operations Using Intelligent MES and Cloud-Native Analytics. Journal of Multidisciplinary Knowledge, 1(1), 45–55. Retrieved from https://jmk.datatablets.com/index.php/j/article/view/127
[24] B. Karp and H. Kung, “GPSR: Greedy Perimeter Stateless Routing for Wireless Networks,” Proc. ACM MobiCom 2000, Boston, Massachusetts, USA, pp. 243-254, 2000.
[25] D. Chen and P.K. Varshney, “A Survey of Void Handling Techniques for Geographic Routing in Wireless Networks,” IEEE Commun. Surv. Tutor., vol. 9, no. 1, pp. 50-67, 2007.
[26] P. Bose, P. Morin, I. Stojmenovic, and J. Urrutia, “Routing with Guaranteed Delivery in Ad Hoc Wireless Networks,” ACM/Kluwer Wireless Netw., vol. 7, no. 6, pp. 609-616, 2001.
[27] W. Liu and K. Feng, “Greedy Routing with Anti-void Traversal for Wireless Sensor Networks,” IEEE Trans. Mob. Comput., vol. 8, no. 7, pp. 910-922, 2009.
[28] Q. Chen, S. S. Kanhere, and M. Hassan, “Adaptive Position Update for Geographic Routing in Mobile Ad Hoc Networks,” IEEE Trans. Mob. Comput., vol. 12, no. 3, pp. 489-501, Mar. 2013.
[29] H. Frey and I. Stojmenovic, “On Delivery Guarantees of Face and Combined Greedy Face Routing in Ad Hoc and Sensor Networks,” Proc. ACM MobiCom 2006, CA, USA, pp. 390-401, 2006.
[30] Q. Fang, J. Gao, and L. J. Guibas, “Located and Bypassing Routing Holes in Sensor Networks,” Proc. IEEE INFOCOM 2004, Hong Kong, China, pp. 2458- 2468, Mar. 2004.
[31] C. Petrioli, M. Nati, P. Casari, M. Zorzi, and S. Basagni, “ALBA-R: Load-balancing Geographic Routing Around Connectivity Holes in Wireless Sensor Networks,” IEEE Trans. Parallel Distrib. Syst., vol. 25, no. 3, pp. 529-539, Mar. 2014.
[32] X. Xiang, X. Wang, and Z. Zhou, “Self-Adaptive On- Demand Geographic Routing for Mobile Ad Hoc Networks,” IEEE Trans. Mob. Comput., vol. 11, no. 9, pp. 1572-1586, Sept. 2012.
[33] X. Li, J. Yang, A. Nayak, and I. Stojmenovic, “Localized Geographic Routing to a Mobile Sink with Guaranteed Delivery in Sensor Networks,” IEEE J. Selected Areas in Comm., vol. 30, no. 9, pp. 1719-1729, Oct. 2012.
[34] S. Ruhrup and I. Stojmenovic, “Optimizing Communication Overhead while Reducing Path Length in Beaconless Georouting with Guaranteed Delivery for Wireless Sensor Networks,” IEEE Trans. Comput., vol. 62, no. 12, pp. 2240-2253, Dec. 2013.
[35] X. Wang, J. Wang, K. Lu, and Y. Xu, “GKAR: A Novel Geographic K-anycast Routing for Wireless Sensor Networks,” IEEE Trans. Parallel Distrib. Syst., vol. 24, no. 5, pp. 916-925, 2013.
[36] Nalluri, S. K., & Parasaram, V. K. B. (2016). Early Approaches to Robotic Process Automation in Enterprise Systems. International Journal of Humanities and Information Technology, 1(01), 12-28. https://doi.org/10.21590/ijhit.01.01.06
[37] Parasaram, V. K. B., & Nalluri, S. K. (2016). A Comparative Analysis of Risk Management Frameworks in Enterprise IT Projects. SAMRIDDHI : A Journal of Physical Sciences, Engineering and Technology, 8(02), 147-155. https://doi.org/10.18090/samriddhi.v8i2.7149