Sunteți pe pagina 1din 6

International Journal of Computer Science Trends and Technology (IJCST) Volume 5 Issue 4, Jul Aug 2017

RESEARCH ARTICLE OPEN ACCESS


Optimal Scalable Dynamic Control and Selfish node
Identification of Packets in Wireless Sensor Network
K.Ravikumar [1], H.Bakyasri [2]
Assistant Professor [1], Research Scholar [2]
Department of Computer Science
Tamil University, Thanjavur 613010
Tamil Nadu India

ABSTRACT
This research examines the multiservice distribution between the sourcedestination pairs in dispersed selfish
wireless networks (SeWN), anywhere selfish relay nodes (RN) expose their self-centered behaviors, i.e., advancing
or dropping multi services. In wireless networks, the secure data announcement is needed to collect data from source
to destination. Collected data are communicated in a path containing of connected links. All existing end-to-end
routing procedures propose solutions in which each link uses a pair-wise shared key to defend data. Remaining to
the importanceof the RNs node-selfishness on the multi conveniences, a discretecontextual of the node-selfishness
organization is shaped to manage the RNs node-selfishness information (NSI) in terms of itsobtainablecapitals, the
workinginducementimplement and the quality-of-service (QoS) necessities, and the other RNs NSI in terms of their
traditional behaviors. In this framework, the RNs NSI includes the progression of node-selfishness (DeNS), the
degree of distinguishing selfishness (DeIS) and the degree of extrinsic self-centeredness (DeES).
Keywords:- End-to-End Multiservice Delivery, MANET, Node-selfishness, Extrinsic Selfishness

I. INTRODUCTION each system node may obtain the above-


mentionedevidence, directly collected by itself and/or
In recent years, we have witnessed a radical
indirectly conventional from its adjacent nodes.
growth in demand for hypermedia services such as
dissimilar styles of media streams (i.e., video, voice
and data streams) and different importance classes of II. RELATED WORK
one traffic brooks which are referred to as multiple
services having different quality of service (QoS) 2.1 Cross-Layer Resource Allocation for
supplies in wireless systems. Given the propagation Integrated Voice/Data Traffic in Wireless Cellular
of smart devices in distributed intelligent networks, Networks
each node is predictable to be brilliant with smart
autonomic functions. By instinct, the individual In this paper, we suggest a cross-layer
network nodes would prefer to act inconsiderately design arrangement to provide QoS for voice and
rather than altruistically in disseminated network. A data traffic in wireless cellular systems with
disseminated wireless system which comprises of differentiated services (DiffServ) backbone. The
nodes displaying a selfish comportment is referred to scheme syndicates the transport layer protocols and
as a distributed selfish wireless network (SeWN). In link layer reserve allocation to both agreement the
such network scenarios, the selfish behavior of QoS requirements in the conveyance layer and
network nodes, mentioned to as node selfishness, achieve efficient resource consumption in the link
may damagethe networkperformance, e.g., the layer. Optimal resource allocation problems for voice
network connectivity, the reliability of the designated and data flows are expressed to guarantee pre-
path and the probability of the productive End-to-End specified QoS with negligible required resources. For
(E2E) multiservice delivery. The node selfishness of combined voice/data traffic in a cell, a hybrid time-
the network node is affected by some intrinsic and division/code-division medium access control (MAC)
extrinsic factors, such as its own energy and arrangement is presented to achieve well-organized
bandwidth resources, the QoS necessities and the multiplexing. Theoretical analysis and simulation
employed incentive mechanisms. For improving the results demonstrate the efficiency of the proposed
network performance, the node persons need to cross-layer approach. Recently, the differentiated
obtain the information on the node-selfishness of the services (DiffServ) approach has appeared as an
other nodes and to determine the relationship efficient and ascendable solution to ensure QoS in
between the aforementionedfactors and the node- future IP networks. As a class-based traffic
selfishness. In such dispersed network scenarios, management mechanism, DiffServ does not use per-

ISSN: 2347-8578 www.ijcstjournal.org Page 60


International Journal of Computer Science Trends and Technology (IJCST) Volume 5 Issue 4, Jul Aug 2017

flow reserve reservation and per-flow gesturing in much more complex than that in the distribution
core routers, which makes DiffServ scalable. Current forward link. User Datagram Protocol (UDP) is used
investigation on DiffServ is mainly focused on the for voice traffic in our system, which does not use
wireline network. The blockage of such a network is retransmissions to guarantee reliable delivery. UDP
normally assumed to be in the core system. The link itself does not provide instruments to ensure timely
from users to the edge router is expected to have delivery or other QoS assurances, but relies on lower
sufficient resources. However, in a hybrid layer services to do so. When a voice user is on talk
wireless/wireline network, the above supposition spurt, the UDP packets will be generated
does not hold. The block for an end-to-end periodically. On the other hand, Transmission
application across a hybrid wireless/wireline province Control Protocol (TCP) can provide reliable end-to-
is usually the link amongst the base station (BS) and end transmission over unreliable IP service, which is
the mobile station (MS), due to the limited radio appropriate for the data traffic. Each transport layer
resources and the varying physiognomies of the radio (TCP or UDP) packet is segmented into anamount of
channel. On the other hand, current medium access link layer (LL) units for broadcast over the error-
control (MAC) schemes in CDMA wireless systems prone wireless link, and then reconvened at the BS.
usually deliver priority to voice users.
2.2 Correlation-Aware QoS Routing With
Differential Coding for Wireless Video Sensor
Voice traffic movements are scheduled for Networks
communication first, while data circulation flows use
the residual system dimensions and are not The spatial correlation of visual material
guaranteed with QoSgratification, nor are they retrieved from distributed camera sensors indications
differentiated from each other. So far, research on to considerable data redundancy in wireless video
QoSprovision for data traffic is very limited. radar networks, resulting in significant performance
deprivation in energy competence and quality-of-
In [5], [6], two packet-switching scheduling service (QoS) fulfillment. In this paper, a correlation-
schemes are planned for wireless CDMA aware QoS routing algorithm (CAQR) is proposed to
infrastructures. Both are based on per-packet efficiently deliver visual information under QoS
information, thus cumulative the scheduling burden constraints by exploiting the correlation of pictorial
and system above. Furthermore, the QoS information observed by different camera sensors.
provisioning for data traffic in these two First, a correlation-aware inter-node discrepancy
arrangements is limited up to the link coating, i.e., coding scheme is intended to reduce the amount of
only physical layer QoS and link layer QoS are traffic in the network. Then, an association aware
considered. To the best of our information, there is no load balancing arrangement is proposed to prevent
planned solution to provide data circulation with network congestion by splitting the Correlated flows
higher layer QoS, e.g., transmission rate guarantee that cannot be reduced to dissimilar paths. Finally,
atthe transport layer, which can be a main the correlation-aware schemes are integrated into an
apprehensionfrom the users point of view. To optimization QoS routing framework with an
address the above subjects, in this paper, we propose objective to minimalize energy consumption subject
a cross-layer enterprise scheme for wireless cellular to delay and dependability constraints. Simulation
networks with a DiffServ backbone to provide QoS results demonstrate that the proposed routing
to MSs. The proposed scheme associations the algorithm achieves efficient delivery of visual
transport layer protocols and link layer reserve material under QoS constraints in wireless video
allocation to both guarantee QoS requirements in the sensor networks. Many recent works have been
transport layer and achieve efficient resource proposed for providing QoS support at different
utilization in the link layer. We consider a hybrid layers of the communication stack, counting QoS
wireless/wireline IP-based network for providing routing algorithms [9], QoS MAC procedures [19],
hypermedia traffic to MSs, where the Internet and cross-layer QoS solutions [21]. These works,
mainstay is DiffServ based, and the wireless subnet is however, only try to meet QoS requirements by
a wideband time-division/code-division multiple properly regulating the linkage traffic, while the total
access (TD/CDMA) cellular organization with amount of data vaccinated into the network cannot be
frequency division duplexing (FDD). In the code reduced. Therefore, it is still resource-demanding to
domain, multi-code CDMA (MC-CDMA) is transport large amounts of visual material in WVSNs.
considered. Here, we focus on the resource To encounter this problem, cooperativehypermedia
management in the reverse link, as resource in-network processing [2] is suggested to reduce the
distribution in the multiple-access reverse link is traffic volume by allowing sensor nodes to filter out

ISSN: 2347-8578 www.ijcstjournal.org Page 61


International Journal of Computer Science Trends and Technology (IJCST) Volume 5 Issue 4, Jul Aug 2017

monotonous events locally or coordinate with each achievements multipath routing to assurance both
other to cumulative correlated data. dependability and delay QoS restraints in WSNs.
In WVSNs, correlation exists among the However, the multipath routing method
observations of video instruments with touched field suffers from a significant energy cost. Based on the
of views (FoVs) [6], leading to considerable data examination and observations of dissimilar routing
redundancy. It is highly desirable to remove such metrics in GOR, we then propose an Efficient QoS-
joblessness to improve the presentation of WVSNs aware GOR(EQGOR) procedure for QoS
[2]. To enhance energy efficiency, the joint provisioning in WSNs. EQGOR chooses and
compression/aggregation and routing approach has assembles the forwardingapplicant set in a well-
been studied for sensor networks that deal with scalar organized manner, which is appropriate for WSNs in
data. This method can be classified into three groups respect of energy efficiency, latency, and time
[22]: distributed source coding (DSC), routing driven complexity. We comprehensively evaluate EQGOR
compression (RDC), and density driven routing by likening it with the multipath routing approach
(CDR). DSC aims to allocate the optimum coding and other starting point protocols through simulation
rates to minimalize the total communication cost of and evaluate its time complication through
transporting interrelated information over shortest measurement on the MicaZ node. Assessment results
paths. In RDC, sensors send data along the preferred demonstrate the efficiency of the GOR approach for
paths to the sink while allowing for opportunistic QoS provisioning in WSNs. EQGOR significantly
combination wherever the paths overlap. In contrast, improves both the end-to-end energy efficiency and
CDR let nodes select the paths that allow for the latency, and it is characterized by the low time
maximum possible combination at each hop. These complexity. We argue that multipath direction-
works cannot provide QoS supports such as findingapproach may not be suitable to guarantee
timeliness and reliability, and thus are not appropriate both reliability and delay QoS constraints in WSNs.
to WVSNs. In this paper, we propose an association Correspondingly, we propose to exploit the
aware QoS routing algorithm (CAQR) for the unprincipled routing approach for multi unnatural
efficient delivery of visual information in QoS provisioning in WSNs. We find that current
WVSNs.First, based on the spatial correlation of GOR protocol cannot be directly applied for QoS
visual information in our previous work [6], a provisioning in WSNs. Therefore, we investigate the
correlation-aware inter-node difference coding problem of efficient GOR for multi constrained QoS
scheme is proposed to reduce the quantity of traffic in provisioning (EGQP) in WSNs, which is formulated
the network, where difference coding is performed as a multi objective multi constraint optimization
between intra coded edges generated by correlated problem. We provide awareness into the properties of
devices. Then, a correlation-aware load balancing multiple direction-finding metrics in GOR. Based on
scheme is proposed to prevent network congestion by the theoretical investigation and annotations, we
splitting the connected flows that cannot be reduced propose an Efficient QoS aware GOR(EQGOR)
to different paths. By mixing these association algorithm for QoS provisioning in WSNs. Through
conscious arrangements, an optimization QoS routing wide-ranging presentation comparisons, we
framework is proposed with an objective to minimize demonstrate the low time complication and efficiency
sensors energy ingesting under delay and of EQGOR for multi constrained QoS provisioning in
reliabilityrestraints. It is shown that by participating WSNs.
the correlation-aware schemes, the proposed
algorithm can achieve dynamism efficient QoS 2.3 Hierarchical Trust Management for Wireless
announcement in WVSNs. Sensor Networks and its Applications to Trust-
Based Routing and Intrusion Detection

QoS Aware Geographic Opportunistic We propose a highly climbable cluster-


based ranked trust management procedure for
Routing in Wireless Sensor Networks wireless sensor networks (WSNs) to effectively deal
with selfish or malevolent nodes. Unlike prior work,
QoS direction-finding is a significant we consider multidimensional trust qualities derived
investigation issue in wireless sensor networks from announcement and social networks to evaluate
(WSNs), predominantly for mission-critical the general trust of a sensor node. By means of a
monitoring and investigation systems which requires novel likelihood model, we describe a heterogeneous
suitable and reliable data distribution. Existing work WSN comprising a large number of instrument nodes
with massivelydifferent social and quality of service

ISSN: 2347-8578 www.ijcstjournal.org Page 62


International Journal of Computer Science Trends and Technology (IJCST) Volume 5 Issue 4, Jul Aug 2017

(QoS) behaviors with the objective to yield communication delay without incurring high message
groundtruth node status. This serves as a basis for or protocol conservation overhead.
authenticating our protocol design by comparing
subjective trust generated as a result of protocol 2.5 Group-Based Trust Management Scheme for
implementation at runtime against objective trust Clustered Wireless Sensor Networks
attained from actual node status. To demonstrate the
utility of our ranked trust management protocol, we In this work, we propose a new lightweight
apply it to trust-based physical routing and trust- Group based Trust Management Scheme (GTMS) for
based interruption detection. For each request, we wireless sensor networks, which employs gathering.
identify the best trust arrangement and formation to Our approach reduces the cost of trust evaluation.
maximize submission performance. Our results Also, theoretical as well as imitation results show that
indicate that trust-based topographical routing our scheme demands less reminiscence, energy, table
approaches the ideal presentation level achievable by for large-scale sensor networks.
flooding-based routing in communication delivery
ratio and message delay deprived of incurring 1. Trust solves the problem of providing
substantial message overhead. For trust-based corresponding access control founded on judging the
interruption detection, we discover that there exists quality of SNs and their services. This problematic
an optimum trust threshold for minimalizing false cannot be solved through outdated security
positives and false negatives. Furthermore, trust- instruments.
based intrusion detection outdoes traditional
anomaly-based interruption detection approaches in 2. Trust solves the problem of as long as
both the discovery probability and the false hopeful reliable routing paths that do not contain any
probability. malevolent, selfish, or faulty node(s).

2.4 Dynamic Trust Management for Delay 3. Trust makes the old-style security
Tolerant Networks and Its Application to services more robust and reliable by ensuring that all
Secure Routing the interactive nodes are trusted during
authentication, approval, or key management A
Delay tolerant networks (DTNs) are number of trust organization schemes have been
considered by high end-to-end inexpression, proposed for peer-to-peer networks, and ad hoc nets.
recurrentstrike, and opportunistic announcement over To the best of our knowledge, very few complete
unreliable wireless links. In this paper, we design and trust management schemes (e.g., Reputation-based
authenticate a dynamic trust organization protocol for Framework for Sensor Networks (RFSN), Agent-
secure routing optimization in DTN surroundings in based Trust and Reputation Management (ATRM),
the presence of well-behaved, selfish and hateful and Parameterized and Localized trust management
nodes. We develop a novel model-based Scheme have been future for sensor networks.
methodology for the analysis of our trust procedure Although, there are some other works available in the
and validate it via extensive imitation. Moreover, we literature and so forth, that deliberate trust but not in
address dynamic trust management, i.e., decisive and much detail. Within such complete works, only
applying the best working settings at runtime in reply ATRM scheme is specifically developed for the
to dynamically changing network conditions to gathered WSNs. However, this and other schemes
minimize trust bias and to exploit the routing request agonize from various limitations such as these
performance. We achieve a relative analysis of our arrangements do not meet the resource constraint
proposed routing procedure against Bayesian trust- requirements of the WSNs and, more exactly, for the
based and non-trust based (PROPHET and epidemic) large-scale WSNs. Also, these schemes suffer from
direction-finding protocols. The results demonstrate higher cost associated with trust assessmentespecially
that our procedure is able to deal with selfish of distant nodes. Furthermore, prevailing schemes
behaviors and is resilient in contradiction of trust- have some other limitations such as dependence on
related attacks. Additionally, our trust-based explicit routing scheme, like PLUS works on the top
direction-findingprocedure can effectively trade off of the PLUS_R routing scheme; dependence on
communicationabove and communication delay for a specific platform, like the ATRM arrangement
significant gain in delivery ratio. Our trust based requires.
routing procedure operating under identified best
settings outperforms Bayesian trust-based routing and III. EXISTING SYSTEM
PROPHET, and approaches the ideal performance of
epidemic direction-finding in delivery ratio and A main task in next peer group wireless

ISSN: 2347-8578 www.ijcstjournal.org Page 63


International Journal of Computer Science Trends and Technology (IJCST) Volume 5 Issue 4, Jul Aug 2017

cellular networks is provisioning of quality of service IV. CONCLUSION


(QoS) over the bandwidth incomplete and error-
prone wireless link. In this paper, we propose a cross- In this paper, we have created a distributed
layer design arrangement to provide QoS for voice framework of the node-selfishness organization,
and data traffic in wireless cellular systems with where every RN manages its NSI and other nodes
differentiated services (DiffServ) backbone. The NSI and every source achieves the RNs NSI in
scheme combines the transport layer protocols and distributed SeWNs.In this outline, the RNs models
connection layer resource allocation to both of intrinsic and extrinsic selfishness have been
guarantee the QoS supplies in the transport layer and industrialized to manage its DeIS and DeES, and the
attain efficient resource utilization in the link layer. other RNs NSI has been found in terms of the RNs
Optimal resource distribution problems for voice and past behaviors and their optional NSI. Underneath
data flows areexpressed to guarantee pre-specified this dispersed framework of the node-selfishness
QoS with negligible required resources. For mutual organization, the path selection criterion has been
voice/data traffic in a cell, a hybrid time- intended to select the most dependable and shortest
division/code-division medium access control (MAC) path for the multi-service distribution. Additionally,
scheme is presented to achieve well-organized the optimal inducements have been adjusted by the
multiplexing. source for upholding the path reliability of the E2E
multi-service distribution.
3.1 PROBLEMS IN EXISTING SYSTEM
This outline neglect the deep examination of REFERENCES
the node-selfishness from the standpoints of
all impact factors, i.e., the nodes available [1] J. Li, Q. Yang, and K. S. Kwak, Neural-
capitals, the QoS requirements of the multi- network based optimal dynamic control of
services and the influence of the employed delivering packets in selfish wireless
inducement mechanism networks,IEEECommun. Lett., Dec. 2015.
It does not provide exact security
construction for a network announcement [2] J. Li, Q. Yang, K. S. Kwak, and L. Hanzo,
process. The connectivity of selfish wireless
This algorithm has less dynamismingesting. networks,IEEE Access, vol. 3, pp. 2814
Here we want to achieve High energy ingesting and 2827, Nov. 2015.
more energy competence,
[3] Chen, F. Bao, M. Chang, and J. Cho,
3.2 OVERVIEW OF PROJECT Dynamic trust management for delay
tolerant networks and its application to
A dispersed wireless network which secure routing,IEEE Trans. Parallel Distrib.
comprises of nodes displaying a selfish conduct is May 2014.
referred to as a dispersed selfish wireless network
(SeWN). In such systemsituations, the selfish [4] L. Cheng, J. Niu, J. Cao, S. K. Das, and Y.
presentation of network protuberances, referred to as Gu, QoS aware geographic opportunistic
node selfishness, may damage the net performance, routing in wireless sensor networks,IEEE
e.g., the network connectivity, the reliability of the Trans. Parallel Distrib Jul. 2014.
selected pathway and the probability of the operative
End-to-End (E2E) multiservice distribution. The [5] F. Bao, I. Chen, M. Chang, and J. Cho,
node self-centeredness of the network node is Hierarchical trust management for wireless
pretentious by some inherent and extrinsic factors, sensor networks and its applications to trust-
such as its own liveliness and bandwidth resources, based routing and intrusion detection Jun.
the QoS supplies and the employed incentive 2012.
mechanisms. For improving the systempresentation,
the node persons need to obtain the info on the node- [6] R. Dai, P. Wang, and I. F. Akyildiz,
selfishness of the other nodes and to determine the Correlation-aware QoS routing with
relationship between the above-mentioned factors differential coding for wireless video sensor
and the node-selfishness. In such dispersed network networks,IEEE J. Multimedia,, Oct. 2012.
scenarios, each network node may obtain the above-
mentioned information, directly collected by itself [7] R. A. Shaikh, H. Jameel, B. J. dAuriol, H.
and/or circuitously received from its adjacent nodes. Lee, S. Lee, and Y. Song, Group-based
trust management scheme for clustered

ISSN: 2347-8578 www.ijcstjournal.org Page 64


International Journal of Computer Science Trends and Technology (IJCST) Volume 5 Issue 4, Jul Aug 2017

wireless sensor networks,IEEE Trans. Nov. 2006.


2009.
[10] P. Kyasanur and N. F. Vaidya, Selfish
[8] H. Jiang and W. Zhuang, Cross-layer MAC layer misbehavior in wireless
resource allocation for integrated voice/data networks,IEEE Trans. Mobile Comput.,
traffic in wireless cellular networks,IEEE vol.4, no. 5, pp. 502516, Sep. 2005.
Trans. Wireless Commun.,, Feb. 2006.
[11] Y. Xiao and H. Li, Voice and video
[9] M. v. d. Schaar, Y. Andreopoulos, and Z. transmissions with global data parameter
Hu, Optimized scalable video steaming control for the IEEE 802.11e enhance
overIEEE 802.11a/e HCCA wireless distributed channel access,IEEE Trans.
networks under delay constraints, Jun. Nov. 2004.

ISSN: 2347-8578 www.ijcstjournal.org Page 65

S-ar putea să vă placă și