Você está na página 1de 4

International Journal of Emerging Trends & Technology in Computer Science (IJETTCS)

Web Site: www.ijettcs.org Email: editor@ijettcs.org


Volume 3, Issue 6, November-December 2014

ISSN 2278-6856

Shortest Path in WSN to detect the Abnormal


Packet for saving Energy and Efficient Data
Collection using AODV
Rajan kakkar#1, Surender Singh*2
1

M.Tech Student, 2Asstt. Prof. in CSE Department, Om Institutes of Tech & Mgt

Abstract
The main motive of this research is to study energy-efficient
data-gathering mechanisms to abnormal packet data for
saving the energy. To detect the abnormal packet
irregularities is useful for saving energy, as well as for
management of network, because the patterns found can be
used for both decision making in applications and system
performance tuning. Node distribution in WSNs is either
deterministic or self-organizing and application dependant.
The sensor nodes in WSNs have minimum energy and they
use their energy for communication and sensing.

Keywords: - AODV (Ad-hoc on demand distance vector),


WSN (Wireless Sensor Network), DSDV (Destination
sequence distance vector), SPACO (Shortest Path Ant
Colony Optimization)

1. INTRODUCTION
1.1. Wireless Sensor Network
A Wireless sensor network is composed of tens to
thousands of sensor nodes which are densely deployed in a
sensor field and have the capability to collect data and
route data back to its base station. Wireless Sensor
Network is used in different application now a days [1],
such as detecting and tanks on a battlefield, measuring
traffic flow on roads, measuring humidity and other
factors in fields, tracking in buildings. Sensors nodes
consist of sensing unit, processing unit, and power unit.
The many - tiny principle: wireless networks of
thousands of inexpensive miniature devices capable of
computation, communication and sensing A WSN
application there are two types of nodes: source node the
node which actually sense and collect data and sink
node the node to which the collected data is sent. The
sinks can be part of the network or outside the wireless
sensor networks. Usually, there is great number of source
nodes than sink nodes. Therefore the two disciple sensor
network and data mining can be combined. Knowledge
from sensor data (Sensor-KDD) is important. Clustering
of sensory data act as a nucleus job of data mining in
KDD.
1.2 Challenges for WSN
The main aim of WSN is to transmit data by increasing
the lifetime of the network and by employing energy
efficient routing protocols. WSN face rigorous resource
constraints in communication bandwidth, power supply,
and storage and processor capacity. Again, the

Volume 3, Issue 6, November-December 2014

performance of a routing protocol depends on the


architecture and design of the network, so the architecture
and design of the network is very important features in
WSNs. The pattern of the wireless sensor network is affect
by many factors which must be overcome before an
effective network can be achieved in WSNs.
Node Distribution: Higher-capability mobile robots may
be dispatched to gather more accurate temperature or
humidity readings Node distribution [12] in WSNs is
either deterministic or self-organizing and application
based. The uniformity of the cluster head directly affects
the performance of the routing protocol used for this
network. In case of deterministic node distribution, the
sensor nodes are differently placed and gathered data is
transmitted through pre-defined areas. The sensor nodes
are distributed over the area of interest randomly thus
creating an infrastructure in an ad hoc manner. Each
sensor node consists of four major components: sensor,
processing unit, power unit and transceiver.
Energy efficiency: The sensor nodes in WSNs have
minimum energy and they use their energy for
communication and sensing, so energy consumption is an
important point in WSNs. According to various routing
protocols nodes take part in data fusion and expend more
energy. In this regard, direct communication is efficient.
Since most of the times sensor nodes are distributed
randomly, multi-hop routing is preferable.
Data Fusion: Data fusion [13] is a process of combining
of data from different sources according to some function.
This is achieved by signal processing methods. This
technique is used by some routing protocols for energy
efficiency and data transfer optimization.

2. RELATED WORK
In [2], S. Nithyakalyani and S. Suresh Kumar in 2012
proposed that nowadays sensors are very essential for
today life to monitor environment where human cannot
get involved very often. Wireless Sensor Networks (WSN)
are used in many real world applications like
environmental monitoring, traffic control, trajectory
monitoring. It is more challenging for sensor network to
sense and collect a large amount of data which are
continuous over time, which in turn need to be forwarded
to sink for further decision making process. In [3], Bo
Yuan, Maria Orlowska and Shazia Sadiq, in Sep 2007,
proposed that given a set of sparsely distributed sensors in
Page 29

International Journal of Emerging Trends & Technology in Computer Science (IJETTCS)


Web Site: www.ijettcs.org Email: editor@ijettcs.org
Volume 3, Issue 6, November-December 2014
the Euclidean plane, a mobile robot is required to visit all
sensors to download the data and finally return to its base.
The effective range of each sensor is specified by a disk,
and the robot must at least reach the boundary to start
communication. However it assumes the distribution of
sources are known. Another way to save energy is to
decrease data transmitting with some schemes. A new
distributed framework to achieve minimum energy datagathering was proposed in [4]. To minimize the total
energy for compressing and transporting information, the
problem of constructing a data-gathering tree over a WSN
was studied in [14]. To some extent, all those schemes
require the node has extra computation to optimize the
data transmission or compress and decompress data. For
the second thread, nodes in WSNs are in multi-hop and
mobile environment in general. The characteristic of each
link will change timely. In the content of the WSNs where
each node only has a partial view of the network, it is very
important for each node to estimate the system status by a
simple and accurate method [13]. Especially for data
transmission with less power consumption, a mobile data
collector is more perfectly suited to such applications, for
the collector can be equipped with a powerful transceiver
and battery. Instead, it is effective to collect data by
assisted mobile collector which can achieve better power
saving performance [11]. A new data-gathering
mechanism called M-collector for large-scale wireless
sensor networks was proposed in [14] by introducing
mobility into the network. However, it just considers the
single-hop data gathering problem. An adaptive datagathering protocol was proposed in [15] that employs
multiple mobile collectors (instead of sinks) to help an
existing WSN achieve such requirements, which adopts a
virtual elastic-force model to help mobile collectors adjust
their moving speed and direction while adapting to
changes within the network. In [7], Tzung-Cheng Chen,
Tzung-Shi Chen, and Ping-Wen Wu, in NOVEMBER
2011 proposed that a novel data-collecting algorithm
using a mobile robot to acquire sensed data from a
wireless sensor network (WSN) that possesses
partitioned/islanded WSNs is proposed in this paper. This
algorithm permits the improvement of data collecting
performance by the base station by identifying the
locations of partitioned/islanded WSNs and navigating a
mobile robot to the desired location. However, the number
of collectors can not be predefined, for the irregularity of
the information generation rate as well as the cost of
mobile collectors. A well-planned adaptive moving
strategy (AMS) for a mobile sink in large-scale,
hierarchical sensor networks was presented. The mobile
sink traverses the entire network uploading the sensed
data from cluster heads in time-driven scenarios.
However, it just tries to minimize the whole tour length to
save energy. An efficient hybrid method for message
relaying and load balancing was proposed in low-mobility
wireless sensor networks in [14]. The system uses either a
single hop transmission to a nearby mobile sink or a
multi-hop transmission to a far-away fixed node
depending on the predicted sink mobility pattern.

Volume 3, Issue 6, November-December 2014

ISSN 2278-6856

Recently, many research efforts have appeared in the


literature to explore the mobility in wireless sensor
networks for data collection, we only survey the most
related ones here [12]. The mobility-assisted data
collection was classified into three categories in [12]: with
random mobility, predictable mobility, and controlled
mobility respectively. The mobile entities, referred to as
Data Mobile Ubiquitous LAN Extensions (MULEs), lie in
the middle tier on top of the stationary sensor nodes, move
around in the network to collect data from sensor nodes,
and ultimately upload the data to the sink. The term Data
MULEs was widely used in the literature since then. In
[10], the data collection process with predictable mobility
was modeled as a queuing system, and the success of data
collection was analyzed based on it. In [7], a mobile data
observer, called SenCar, was used as a mobile base-station
in the network. It also showed that the design of the
travelling tour is critical for SenCar to accomplish data
collection jobs successfully. Observing the importance of
the travelling tour, a lot of efforts were put into its optimal
design,[2].In [15] Y. Revah and M. Segal (2009)
presented the problem of gathering information in WSNs,
the work in took into account the fact that interference can
occur at the reception of a message at the receiver sensor.
However it assumes the distribution of sources are known.
Another way to save energy is to decrease data
transmitting with some schemes.In [16] Bolin Ding,
Jiawei Han (2010) discussed the problem of mining
periodic behaviors for moving objects. It involves two subproblems: how to detect the periods in complex
movement, and how to mine periodic movement
behaviors. Our main assumption is that the observed
movement is generated from multiple interleaved periodic
behaviors associated with certain reference locations.
Based on this assumption, they propose a two stage
algorithm, Periodic, to solve the problem. At the first
stage, the notion of reference spot is proposed to capture
the reference locations. Through reference spots, multiple
periods in the movement can be retrieved using a method
that combines Fourier transform and autocorrelation. At
the second stage, a model is proposed to characterize the
probabilistic periodic behaviors. For a specific period,
periodic behaviors are statistically generalized from
partial movement sequences through hierarchical
clustering. Empirical studies on both synthetic and real
data sets demonstrate the effectiveness of our method. In
[17] Daniel Angus (2011) presented the existing Ant
System Meta heuristic by including three parameters: cost,
visibility and pheromone. Based on this a new algorithm
for the Shortest Path Ant Colony Optimization (SPACO)
was developed. The most important parameter included in
this algorithm to solve shortest path problem is visibility.
The visibility is the parameter that is intended to influence
each ant to move towards the target vertex in a minimum
straight line distance. Initially each edge is assigned with
a particular pheromone value. The pheromone
concentration evaporates with time and is updated after
each tour in accordance with given formulas. Initially it is
required for the ants to search the entire space and finally
Page 30

International Journal of Emerging Trends & Technology in Computer Science (IJETTCS)


Web Site: www.ijettcs.org Email: editor@ijettcs.org
Volume 3, Issue 6, November-December 2014
converge to an optimum solution [18]. The total data
collection time has two components: the robots travel
time and the download time. The time to download data
from a sensor s is a function of the locations of the robot
and s: If the robot is a distance run away from s, it can
download the sensors data in Tin units of time. If the
distance is greater than rin but less than rout, the
download time is Tout > Tin. Ad-hoc networks are
basically self organizing and self configuring multi-hop
mobile wireless network in which the information packets
are transmitted in a store and forward manner from a
source to an arbitrary destination via intermediate nodes.
The main objective of this paper is to performance
evaluation of AODV (Ad-hoc on demand distance vector)
and DSDV (Destination sequence distance vector) routing
protocols on the basis of different performance metrics. In
this paper, an attempt has been made to evaluate the
performance of two well known routing protocols AODV,
DSDV by using three performance metrics such as
throughput, packet delivery ratio and Routing overheads.
The Performance evaluation has been done by using
simulation tool NS2 (Network Simulator) which is the
main simulator.

3. RESULT
It shows graph between simulation time & total number of
packets. Red line shows the total number of packets with
anomalies which are transmitted during simulation &
green line shows the total number of packets without
anomalies. Red line carry 1000 packets & green line carry
only 500 packets which contains irregularity. So it can
drop these 500 packets that contain the anomalies and
mobile robot collects the packet from those nodes that
contain the normal packet. Packets that contain the
anomalies automatically drop by robot.

Volume 3, Issue 6, November-December 2014

ISSN 2278-6856

4. CONCLUSION
Some distinct characteristics of WSNs such as large node
density, unattended operation mode, high dynamicity and
severe resource constraints pose a number of design
challenges on sensor data-gathering schemes. Many
research activities have been studied on the research issue.
Since the fundamental task of WSN is to gather data
efficiently with less resource consumption, to address the
problem, there are two threads of research to improve the
performance of data collecting: optimized data-gathering
schemes and mobile collector assisted data-gathering in
WSNs. Most data-gathering algorithms aim to prolong
lifetime with some optimized schemes.

REFERENCES
[1] A. Boukerche and X. Fei (2008),Adaptive datagathering protocols with mobile collectors for
vehicular ad-hoc and sensor networks, in
Proceedings of the 4th IEEE International Conference
on Wireless and Mobile Computing, Networking and
Communication (WiMob 08), pp. 712.
[2] A. Chakrabarti, A. Sabharwal, and B. Aazhang
(2003),Using predictable observer mobility for power
efficient design of sensor networks, in Proc
ACM/IEEE IPSN, vol. 2634, pp. 552-568.
[3] A. D. Wood and J. A. Stankovi (2002), Denial of
service
in
sensor
networks
Computers,
35(10):54{62}.
[4] A. Galstyan, B. Krishnamachari, K. Lerman, and S.
Pattem (2004),Distributed online localization in
sensor networks using a moving target, in
Proceedings of the 3rd International Symposium on
Information Processing in Sensor Networks, pp. 6170.
[5] A. Howard, M. J. Mataric, and G. S. Sukhatme
(2007), An incremental self-deployment algorithm
for mobile sensor networks, Autonomous Robots,
vol. 13.
[6] A. K. H. Tung, J. Han H. Lu, and L. Feng. (2003),
Efficient mining of intertransaction association
rules, IEEE Transactions on Knowledge and Data
Engineering, 15(1):43{56}.
[7] Bolin Ding, Jiawei Han. (2010), Mining Periodic
Behaviors for Moving Objects KDDWashington,
DC, USA. Copyright 2010 ACM 978-1-4503-00551/10/07.
[8] R., Krawczyk, H. (1996), Keying hash functions for
message authentication, In Proceedings of Advances
in Cryptology (CRYPTO96). Lecture Notes in
Computer Science, vol. 1109, Springer. 115.
[9] B.
Parno,
A.
Perrig,
and
V.
Gligor
(2005),Distributed detection of node replication
attacks in sensor networks, In Proceedings of the
IEEE Symposium on Security and Privacy, pages
49{63}.
[10] B. Yuan, M. Orlowska, and S. Sadiq (2007), On the
optimal robot routing problem in wireless sensor
networks,IEEE Trans. on Knowledge and Data
Engineering, vol. 19, no 9, pp. 1252-1261.
Page 31

International Journal of Emerging Trends & Technology in Computer Science (IJETTCS)


Web Site: www.ijettcs.org Email: editor@ijettcs.org
Volume 3, Issue 6, November-December 2014

ISSN 2278-6856

[11] Bounded Relay Hop Mobile Data Gathering in


WSN,IEEE TRANSACTIONS ON COMPUTERS,
VOL. 61, NO. 2, FEBRUARY 2012
[12] On Data Collection Using Mobile Robot in WSN,
IEEE TRANSACTIONS ON SYSTEMS, MAN,
AND CYBERNETICSPART A: SYSTEMS AND
HUMANS, VOL. 41, NO. 6, NOVEMBER 2011
[13] E. Elnahrawy and B. Nath (2003), Cleaning and
querying noisy sensors In Proceedings of the 2nd
ACM international conference on Wireless sensor
networks and applications (WSNA03), pages 78{87}.
[14] G. Wang, G. Cao, and T. LaPorta(2003),A bidding
protocol for deploying mobile sensors, in
Proceedings of the 11th IEEE International
Conference on Network Protocols, pp. 315-324.
[15] G. Zhou, T. He, S. Krishnamurthy, and J. A.
Stankovic (2004), Impact of radio irregularity on
wireless sensor networks. In Proceedings of the 2nd
international conference on Mobile systems,
applications, and services (MobiSys04), pages
125{138}.
[16] H. Mannila, H. Toivonen, and A. I. Verkamo
(1995),Discovering frequent episodes in sequences,
In Proceedings of the First International Conference
on Knowledge Discovery and Data Mining (KDD'95),
pages 210{215}.
[17] H. Zhang and H. Shen (2009),Balancing energy
consumption to maximize network lifetime in datagathering sensor networksIEEE Transactions on
Parallel and Distributed Systems, vol. 20, no. 10, pp.
15261539.
[18] I. F. Akyildiz, W. Su, Y. Sankarasubramaniam, and
E. Cayirci. (2002), Wireless sensor networks: A
surveyComputer Networks, 38(4):393 {422}.
[19] J. N. Al-Karaki and A. E. Kamal (2004), Routing
techniques in wireless sensor networks survey.
IEEE Transactions on Wireless Communications,
11(6):6 {28}.
[20] Jen-Wei Huang, Chi-Yao Tseng, Jian-Chih Ou, and
Ming-Syan Chen, Fellow (2008),A General Model
for Sequential Pattern Mining with a Progressive
Database.IEEETransactions On Knowledge And
Data Engineering, Vol. 20, No. 9.

Volume 3, Issue 6, November-December 2014

Page 32

Você também pode gostar