Information credibility modeling in a wsn via leach routing protocol
Keywords:
Wireless Sensor Network, Routing Protocol, LEACH, Credibility Index of Node (CIN), Fault ToleranceAbstract
The purpose of wireless sensor networks is to transmit physical quantities from the sensor node to the base station. This requires collaboration between the various devices for proper operation. In this work, we propose a model to evaluate the credibility of information exchanged in a wireless sensor network. Indeed, the credibility evaluation of the data is done at the level of the sensor node and at the cluster head. This model has been realized in respect of the topology of the LEACH routing protocol. We also propose an improvement for LEACH routing protocol and the detection of Dead Node, based on residual energy and on the calculation of the credibility index CIN for each sensor node.
References
K.Lahma, M.Hamraoui, H.Belhadaoui. Study of the credibility of the information shared by a wireless sensor network. 2015 5th World Congress on Information and Communication Technologies (WICT), (pp. 113-116). IEEE.
K.Lahma, M.Hamraoui, Evaluation de la crédibilité de l’information d’une chaine de nœuds de capteurs : RCSF. Mediterranean Telecommunications Journal, Vol. 8, N° 2, July 2018.
E. Rahm and H.H. Do,Data Cleaning: Problems and Current Approaches, IEEE Data Eng. Bull., vol. 23, no. 4, pp. 3-13, Dec. 2000.
E.Elnahrawy, B.Nath, Cleaning and querying noisy sensors, WSNA 03 Second ACM International Workshop on Wireless Sensor Networks and Applications, San Diego, CA, USA, Sep. 2003.
M.P. Singh, Prabhat Kumar, An Efficient Forward Error Correction Scheme for Wireless Sensor Network, 2nd International Conference on Computer, Communication, Control and Information Technology (C3IT-2012) on February 25 - 26, 2012.
QiumingZhang. A Reliability Optimization Algorithm for Wireless Sensor Network. International Journal of Online Engineering iJOE, Vol. 14, No. 6, 2018
Yang Xiao. Dynamic Fault Tolerant Topology Control for Wireless Sensor Network Based on Node Cascading Failure. International Journal of Online Engineering iJOE, Vol. 14, No. 5, 2018.
Y. Yousef, Routage pour la gestion de l’energie dans les réseaux de capteurs sans fil, Universite De Haute Alsace Faculté des Sciences et Techniques, 2010, France.
Yaye M. Sarr, Réduction des clusters singletons dans le protocole LEACH pour les réseaux de capteurs sans fil, CNRIA-2015 , Sénégal.
Heinzelman, W. Application-Specific Protocol Architectures for Wireless Networks. Ph.D. Thesis,Massachusetts Institute of Technology, Cambridge, MA, USA, 2000.
Mohsin Raza Jafri, Nadeem Javaid, AkmalJavaid, Zahoor Ali Khan, Maximizing the Lifetime of Multichain PEGASIS using Sink Mobility, World Applied Sciences Journal 21 (9): 1283-1289, 2013.
AratiManjeshwar, Agrawal and D.P., TEEN: A Routing Protocol for Enhanced Efficiency in Wireless Sensor Networks Proceedings, 15th International on Parallel and Distributed Processing Symposium, 2000.
Senouci, M.R.; Melouk, A.; Senouci, H.; Aissani, A. Performance evaluation of network lifetime spatial-temporal distribution for WSN routing protocols. J. Netw. Comput. Appl. Elsevier 2012, 35, 1317–1328.
Ko, Y.-B.; Choi, J.-M.; Kim, J.-H. A new directional flooding protocol for wireless sensor networks. In Information Networking. Networking Technologies for Broadband and Mobile Networks , Springer: Berlin/Heidelberg, Germany, 2004; pp. 93–102.
A. Dâmaso, N. Rosa, P. Maciel, Reliability of Wireless Sensor Networks ,Sensors 2014, 14(9), 15760-15785.
J.Mu-jing, Q. Zhao-wei, Efficient neighbor collaboration fault detection in WSN, The Journal of China Universities of Posts and Telecommunications, Elsevier, 118-121, 2011.
H.Dhawan ,S.Waraich, A Comparative Study on LEACH Routing Protocol and its Variants in Wireless Sensor Networks: A Survey,International Journal of Computer Applications Volume 95– No.8, June 2014.
K. Lahma, M. Hamraoui, H. BelhadaouI‘Characterization of the information exchanged within a wireless sensor network by a credibility index’,International Journal of Computer Science and Information Security, Vol. 15, No. 6, JUN 2017.
Downloads
Published
How to Cite
Issue
Section
License
Copyright (c) 2018 COMPUSOFT: An International Journal of Advanced Computer Technology
This work is licensed under a Creative Commons Attribution 4.0 International License.
©2023. COMPUSOFT: AN INTERNATIONAL OF ADVANCED COMPUTER TECHNOLOGY by COMPUSOFT PUBLICATION is licensed under a Creative Commons Attribution 4.0 International License. Based on a work at COMPUSOFT: AN INTERNATIONAL OF ADVANCED COMPUTER TECHNOLOGY. Permissions beyond the scope of this license may be available at Creative Commons Attribution 4.0 International Public License.