Call for Paper - May 2019 Edition
IJCA solicits original research papers for the May 2019 Edition. Last date of manuscript submission is April 20, 2019. Read More

Consistent and Effective Data Acquisition in Wireless Sensor Networks in the Existence of Transfaulty Nodes

Print
PDF
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Year of Publication: 2017
Authors:
Chetan Ramnath Patil, M. D. Ingle, S. H. Patil
10.5120/ijca2017912833

Chetan Ramnath Patil, M D Ingle and S H Patil. Consistent and Effective Data Acquisition in Wireless Sensor Networks in the Existence of Transfaulty Nodes. International Journal of Computer Applications 158(7):4-7, January 2017. BibTeX

@article{10.5120/ijca2017912833,
	author = {Chetan Ramnath Patil and M. D. Ingle and S. H. Patil},
	title = {Consistent and Effective Data Acquisition in Wireless Sensor Networks in the Existence of Transfaulty Nodes},
	journal = {International Journal of Computer Applications},
	issue_date = {January 2017},
	volume = {158},
	number = {7},
	month = {Jan},
	year = {2017},
	issn = {0975-8887},
	pages = {4-7},
	numpages = {4},
	url = {http://www.ijcaonline.org/archives/volume158/number7/26918-2017912833},
	doi = {10.5120/ijca2017912833},
	publisher = {Foundation of Computer Science (FCS), NY, USA},
	address = {New York, USA}
}

Abstract

The sensors in the WSN sense the adjacent, collects the data and deliveries the data to the sink node. It has been noticed that the sensor nodes are deactivated or damaged when obvious to committed radiations or due to energy problems. This damage leads to the transient parting of the nodes from the network which procure in the building of the holes. These holes are dynamic in nature and can spread and pact dependent upon the features causing the damage to the sensor nodes. So a solution has been reachable in the base paper where the twin mode i.e. Radio frequency and the Acoustic mode are considered so that the data can be transferred smoothly. Grounded on this a survey has been done where some problems are considered so that the performance of the system can be enhanced.

References

  1. Pushpendu Kar, Student Member, IEEE and Sudip Misra, Senior Member, IEEE, “Reliable and Efficient Data Acquisition in Wireless Sensor Networks in the Presence of Transfaulty Nodes,” IEEE TRANSACTIONS ON NETWORK AND SERVICE MANAGEMENT, 8th Jan, 2016.
  2. Kealan McCusker, Noel E. O’Connor, “Low-energy symmetric key distribution in wireless sensor networks,” IEEE Transactions on Dependable and Secure Computing May/June 2011.
  3. Cesare Alippi, Fellow, IEEE, Giuseppe Anastasi, Mario Di Francesco, and Manuel Roveri, “Adaptive Sampling Algorithm for Effective Energy Management in Wireless Sensor Networks With Energy-Hungry Sensors,” IEEE TRANSACTIONS ON INSTRUMENTATION AND MEASUREMENT, VOL. 59, NO. 2, FEBRUARY 2010.
  4. Levente Buttya´ n, La´ szlo´ Czap, and Istva´n Vajda, “Detection and Recovery from Pollution Attacks in Coding-Based Distributed Storage Schemes,” IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, VOL. 8, NO. 6, NOVEMBER/DECEMBER 2011.
  5. Ing-Ray Chen, Member, IEEE, Anh Phan Speer, and Mohamed Eltoweissy, Senior Member, IEEE, “Adaptive Fault-Tolerant QoS Control Algorithms for Maximizing System Lifetime of Query-Based Wireless Sensor Networks,” IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, VOL. 8, NO. 2, MARCH-APRIL 2011.
  6. Masanori Miyazawa and Michiaki Hayashi Rolf Stadler, “vNMF: Distributed Fault Detection using Clustering Approach for Network Function Virtualization,” 2nd Jan, 2015.
  7. Steven S. McClure, L. D. Edmonds, R. Mihailovich, A. H. Johnston, Fellow, IEEE, P. Alonzo, J. DeNatale, Member, IEEE, J. Lehman, and C. Yui, “Radiation Effects in Micro-Electromechanical Systems (MEMS): RF Relays,” IEEE TRANSACTIONS ON NUCLEAR SCIENCE, VOL. 49, NO. 6, DECEMBER 2002.
  8. Erfan Soltanmohammadi, Student Member, IEEE, Mahdi Orooji, Student Member, IEEE, and Mort Naraghi-Pour, Member, IEEE, “Decentralized Hypothesis Testing in Wireless Sensor Networks in the Presence of Misbehaving Nodes,” IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, VOL. 8, NO. 1, Jan 2013.
  9. Tapas Kanungo, Senior Member, IEEE, David M. Mount, Member, IEEE, Nathan S. Netanyahu, Member, IEEE, Christine D. Piatko, Ruth Silverman, and Angela Y. Wu, Senior Member, IEEE, “An Efficient k-Means Clustering Algorithm: Analysis and Implementation,” IEEE TRANSACTIONS ON PATTERN ANALYSIS AND MACHINE INTELLIGENCE, VOL. 24, NO. 7, JULY 2002.
  10. Vibha Paradkar, Gajendra Singh Chandel, Kailash Patidar, “Fault Node Discovery and Efficient Route Repairing Algorithm for Wireless Sensor Network” (IJCSIT) International Journal of Computer Science and Information Technologies, Vol. 6 (2), 2015, 1710-1715.
  11. Saad Ahmad Khan, Ladislau Bölöni, Damla Turgut, “Bridge protection algorithms – A technique for fault-
  12. tolerance in sensor networks” Ad Hoc Networks 24 (2015) 186–199.
  13. Anasane, Aboli Arun, and Rachana Anil Satao. "A Survey on Various Multipath Routing Protocols in Wireless Sensor Networks." Procedia Computer Science 79 (2016): 610-615.
  14. Kudale, Roma, and Rachana Satao. "STESA: Self Transmission Energy Saving Algorithm for road surveillance." 2013 Tenth International Conference on Wireless and Optical Communications Networks (WOCN). IEEE, 2013.
  15. Amit Sharma, Kshitij Shinghal , Neelam Srivastava, Raghuvir Singh, “Energy management for wireless sensor network nodes” International Journal of Advances in Engineering & Technology, Vol. 1, Mar 2011.

Keywords

Energy hole problem, Sensor deployment, Wireless Sensor Network.