ResearchBib Share Your Research, Maximize Your Social Impacts
Sign for Notice Everyday Sign up >> Login

Idleness Scheming and Intrusion Tolerance using Acknowledgement through Multipath Routing in Heterogeneous Wireless Sensor Network?

Journal: International Journal of Computer Science and Mobile Computing - IJCSMC (Vol.3, No. 8)

Publication Date:

Authors : ; ; ;

Page : 162-169

Keywords : Idleness Scheming; Energy Conservation; Heterogeneous Wireless Sensor Network; Intrusion Tolerance with Acknowledgement; Multipath Routing; Reliability; Timeliness; Security;

Source : Downloadexternal Find it from : Google Scholarexternal

Abstract

In this research, we propose the controlling of duplication of Components or data to provide survival of the total system in case of failure of single component in HWSN, by using dynamic multipath routing to send data to sink( base station) in the presence of unreliable and malicious nodes. Normally for transmission the path is formed while initialization of network like in case of TCP/IP protocol. The research that we are formulating focuses on redundancy controlling to exploit the tradeoff between energy consumption vs the gain in reliability, timeliness by dynamic multipath routing to maximize the system useful lifetime. For these reasons, we formulate the acknowledgement system in between nodes, cluster heads, processing center and sink. When cluster heads sends data to the processing center and then to sink at that time sink will keep that path as reliable path in its logs and again sends acknowledgement to the senders end and considers this path as reliable for further transmission. What it yields is the reliability, security, timeliness. If this acknowledgement is not available in HWSN then the data will be sent repeatedly to malicious cluster by the sender if any present in the network. Thus it will consume more energy because of repeated transmission. So acknowledgement avoids this repeated transmission which results in conservation of energy by detecting and evicting malicious node in HWSN. Furthermore, we consider this optimization problem for the case in which voting based distributed intrusion detection algorithm is applied. We then apply the logs obtained at base station to design dynamic redundancy controlling algorithm to formulate and implement the best design parameters settings at runtime in response to environmental changes to maximize HWSN lifetime.

Last modified: 2014-08-13 01:34:47