Documente Academic
Documente Profesional
Documente Cultură
Web Site: www.ijettcs.org Email: editor@ijettcs.org, editorijettcs@gmail.com Volume 2, Issue 3, May June 2013 ISSN 2278-6856
[M.Tech], PBR Visvodaya Institute of Technology & Science, Kavali, A.P, India
Associate Professor, Dept of CSE, PBR Visvodaya Institute of Technology & Science, Kavali, A.P, India
Associate Professor, Dept of MCA, PBR Visvodaya Institute of Technology & Science, Kavali, A.P, India
4
[M.Tech], PBR Visvodaya Institute of Technology & Science, Kavali, A.P, India
5
Figure 1: Typical wireless sensor network Figure 1 shows the typical wireless sensor network that consist of multiple number of sensor nodes and one sink where data is collected are deployed in the sensing field. Recent years, WSNs have a great interest among researchers because of their potential in a wide variety of applications. However, there are some problem need to be overcome, for example, reliability data delivery, jamming control, energy conservation, security and management of a WSN itself. The most crucial requirement is reliable data transfer. The traffic will be bursty for multimedia application. Here huge amount of data is generated and which disseminated towards the base station. Depending on the application the data formats are different and there size of packets is also different. In that case the data traffic will not be same. The node must handle this traffic as well. All this different types of data will cause the jamming in the network. When the video traffic increases, then it may leads to jamming. Whenever a node detects that jamming is going to occur it will avoid further delay by forwarding the packets in an alternative path to the sink. 1.1 Root Cause of the Jamming The jamming may occur if the data transmission rate of previous node is high than the data processing rate of
Index Terms: Wireless Networks, Sensor, Jamming detection, jamming avoidance, reliable, Video, Delay.
1. INTRODUCTION
Wireless Sensor Networks (WSNs) have emerged as an important new area in wireless technology. WSNs can provide low cost solution to variety of real-world problems. Sensors are low cost tiny devices with limited storage, computational capability and power. A WSN consisting of tiny devices which monitor physical or environmental conditions such as temperature, pressure, motion or pollutants etc. Such sensor networks are expected to be widely deployed in a vast variety of environments for commercial, civil, and military applications such as surveillance, vehicle tracking, climate and habitat monitoring.
Page 293
2. LITERATURE SURVEY
There are different methods are existing to detect the jamming. 2.1 Reporting Rate
3. PROPOSED WORK
Jamming in the sensor network can be detected based on various parameters. Some of the parameters listed in the paper are internal queue length, service time of packets, load existing in channel, retransmission time of packet, delay, jitter etc. Jamming can be detected either at the sink or at intermediate nodes. Several protocols have been proposed based upon the location at which the jamming can be detected. Different protocols use different metrics as parameter for detection of jamming in the network. The different metrics used for selecting the best parameter for jamming detection are cost, impact on quality of video, locality or being global in the network, false positivity and speed of jamming detection. The work has concluded that delay is the best parameter for jamming detection for video and other multimedia traffic in Wireless Multimedia Sensor Networks. Here I will be using the delay parameter as a metric for jamming detection. Because it has been proved that it is the best suitable parameter for jamming detection. Further rather than detecting jamming at the sink, we will detect jamming at the intermediate nodes which are involved in forwarding the packets from source to destination. Also we can detect jamming faster at the early stage itself. Page 294
3.1.1 Cost of jamming detection One of the comparison metrics in jamming detection is the cost. Some methods have overhead cost. Method with lower cost is most convenient in sensor networks. This cost is evaluated in two aspects: power overhead and processing overhead. Processing overhead: According to Table 1 the parameters that are involved in intermediate nodes such as queue length, channel load or power variance have more processing overhead because of large amount of load on intermediate nodes. Power overhead: This cost is the amount of energy that is consumed for jamming detection. These parameters are classified in three categories: Sensing the channel Using extra packets. Low cost Some methods do not necessitate extra cost for jamming detection. These methods are the most suitable for jamming detection in WMSNs. In Table 2 all methods are classified based on cost. Jamming detection parameters that are classified under two first classes consume large amount of energy and so are not suitable for WMSNs. Some of jamming detection methods requires synchronization. In this paper we have not considered synchronization between sensor nodes.
Page 295
But source node in video traffics transmit packet in different intervals (packets belonging to different frame types) and so sink cannot determine whether the interval between receiving packets are due to jamming or for another reason. So this parameter is not convenient for our video network. 3.1.4 Speed of jamming detection Quick jamming control depends on two factors: quick jamming detection and suitable rate adjustment. Delay is accurate in jamming detection and it quickly detects jamming in network. The other advantage is that it can be used in either sink or in intermediate nodes. This leads to more flexibility in usage. 3.2 Jamming Avoidance Once the jamming detection is done by using delay parameter then jamming avoidance will be done by rerouting the packet by energy aware routing. We consider two situations .one is before applying dynamic routing how many packets are dropped and after applying dynamic routing how the packet drops are reduced and network life increases.
Jamming the more is convenient for this task. Misdetection occurs in two cases: upcoming jamming is not detected and a notified jamming is not an actual jamming that is going to occur. For investigating this issue firstly we should get traffic pattern and then we should consider change in jamming detection parameters so that accuracy or misdetection of them is recognized. Volume 2, Issue 3 May June 2013
Figure 2: Packets/sec dropped before and after applying Dynamic Routing Page 296
References
[1]. I.F. Akyildiz, T. Melodia, K. Chowdhury, "A survey on wireless multimedia sensor networks," Computer Networks 51 (2007) 921960. [2]. C.Y. Wan, S. B. Eisenman, A. T. Campbell, "CODA: Congestion detection and avoidance in sensor networks," In Proc. of the First International Conference on Embedded Networked Sensor Systems (Sensys) 2003 Los Angeles 266-279. [3]. Hemmat Sheikhi, Congestion Detection for Video Traffic in Wireless Sensor Networks. 978-1-61284459-6/11/$26.00 2011 IEEE [4]. Ying Ouyang, F. ren, Chuang lin, Tao He, Chao Li, Yada Hu, Hao Wen,A simple active congestion control in Wireless Sensor Network, MASS 07, IEEE conference on Mobile sensor adhoc system, Pisa. [5]. Jaewon KangTARA: Topology-Aware Resource Adaptation to Alleviate Congestion in Sensor Networks [6]. Iyer, Y.; Gandham, S. and Venkatesan, S. STCP:A Generic Transport Layer Protocol for Wireless Sensor Networks. Proceedings of IEEE ICCCN 2005, San Diego, CA, USA, October 2005. [7]. O.Akan, I.F. Akyildiz, "Event-to-sink reliable transport in wireless sensor networks," IEEE/ACM Transactions on Networking 13 (2005)10031017 [8]. The network simulator(ns2)is downloaded/available from http://www.isi.edu/nsnam/ns [9]. Upstream Hop-by-Hop Congestion Control in Wireless Sensor Networks Guangxue Wang and Kai Liu School of Electronics and Information Engineering Beijing University of Aeronautics and Astronautics, Beijing, 100191, China 2009. AUTHORS S. Srikanth Babu has received his MCA degree at A.V.S College of engineering &Technology, Venkatachelam affiliated to JNTUA in 2010 and pursuing M.Tech in computer Science and Engineering at PBR Visvodaya Institute of Technology & Science (20112013), Kavali affiliated to JNTUA. He worked as
1
Supriya sivapuja has received her MCA degree at Annamacharya Institute of Technology & Sciences, Rajampet affiliated to JNTUA in 2009 and pursuing M.Tech in computer Science and Engineering at PBR Visvodaya Institute of Technology & Science (20112013), Kavali affiliated to JNTUA. She worked as Assistant Professor in Audisankara College of Engineering and Technology, Gudur, Andhra Pradesh, India and had 2 years of experience in teaching.
5
Srikar Babu S.V. has received his B.Tech degree in Electronics and Communication Engineering at Priyadarshini College of engineering & Technology, Kanaparthipadu affiliated to JNTUA in 2012. Currently, he is working as Associate consultant in OFSS, Bangalore.
Page 297