Vous êtes sur la page 1sur 3

Bonfring International Journal of Networking Technologies and Applications, Vol. 5, No.

1, March 2018 9

Using of Bellman Ford's Algorithm in WSN to


Identify the Shortest Path and Improve the Battery
Power & Control the DDOS Attackers and Monitor
the System Environment
Dr.A. Mummoorthy, B. Bhasker and T. Jagadish Kumar

Abstract--- Wireless sensor network is also called as can be routing or flooding. The majority of WSNs described in
group of ad-hoc network and use many number of mobility the literature exhibit a (source, sink) architecture, which may
sensor nodes. It consists of sensing, controlling & monitoring include any number of: Source nodes: which generate data,
capability. This article provide shortest path communicate usually by using sensors to measure environmental factors
between the source and designation and measure the such as temperature, humidity or radiation, Sink nodes: which
performance. The shortest path routing algorithm used for collect the data gathered by source nodes and Intermediate
distance vector routing. The distance vector is the distinction nodes: which may include source nodes that aid the
of bellman-ford algorithm. Here the nodes are created transmission from source to sink. These two challenges and
dynamic to avoid the loop formation, malicious nodes and discuss them in detail in the following sections.
intrusion attacks and also improving the performance of
distance vector by initializing variable randomly and II. LITERATURE SURVEY
generating graphs. In smart environments, wireless sensor networks will play
Keywords--- Wireless Sensor Networks, Dijkstra’s, a key role in sensing, collecting, and disseminating
Bellman-Ford, Distance Vector Algorithm, Random, information about environmental phenomena. Sensing
MATLAB. applications represent a new paradigm for network operation,
one that has different goals from more traditional wireless
networks. This paper examines this emerging field to classify
I. INTRODUCTION
wireless micro-sensor networks according to different

T HE WSN is built of "nodes" – from a few to several


hundreds or even thousands, where each node is
connected to one (or sometimes several) sensors. Each such
communication functions, data delivery models, and network
dynamics. This taxonomy will aid in defining appropriate
communication infrastructures for different sensor network
sensor network node has typically several parts: a radio application subspaces, allowing network designers to choose
transceiver with an internal antenna or connection to an the protocol architecture that best matches the goals of their
external antenna, a microcontroller, an electronic circuit for application. In addition, this taxonomy will enable new sensor
interfacing with the sensors and an energy source, usually a network models to be defined for use in further research in this
battery or an embedded form of energy harvesting. A sensor area.
node might vary in size from that of a shoebox down to the
size of a grain of dust, although functioning "motes" of III. ROUTING CHALLENGES AND DESIGN ISSUES IN WSN
genuine microscopic dimensions have yet to be created. The
Despite the innumerable applications of WSNs, these
cost of sensor nodes is similarly variable, ranging from a few
networks have several restrictions, e.g., limited energy supply,
to hundreds of dollars, depending on the complexity of the
limited computing power, and limited bandwidth of the
individual sensor nodes. Size and cost constraints on sensor
wireless links connecting sensor nodes. One of the main
nodes result in corresponding constraints on resources such as
design goals of WSNs is to carry out data communication
energy, memory, computational speed and communications
while trying to prolong the lifetime of the network and prevent
bandwidth. The topology of the WSNs can vary from a simple
connectivity degradation by employing aggressive energy
star network to an advanced multi-hop wireless mesh network.
management techniques. The design of routing protocols in
The propagation technique between the hops of the network
WSNs is influenced by many challenging factors. These
factors must be overcome before efficient communication can
Dr.A. Mummoorthy, Associate Professor, Department of IT, Malla Reddy be achieved in WSNs. In the following, we summarize some
College of Engineering & Technology, Secundrabad, India.
E-mail:amummoorthy@gmail.com of the routing challenges and design issues that affect routing
B. Bhasker, Assistant Professor, Department of IT, Malla Reddy College process in WSNs.
of Engineering & Technology, Secundrabad, India.
E-mail:bhasker.b90@gmail.com Node deployment: Node deployment in WSNs is
T. Jagadish Kumar, Assistant Professor, Department of CSE, Malla application dependent and affects the performance of the
Reddy College of Engineering & Technology, Secundrabad, India. routing protocol. The deployment can be either deterministic
E-mail:jagadish.tlgp@gmail.com or randomized. In deterministic deployment, the sensors are
DOI:10.9756/BIJNTA.8369

ISSN 2320-5377 | © 2018 Bonfring


Bonfring International Journal of Networking Technologies and Applications, Vol. 5, No. 1, March 2018 10

manually placed and data is routed through pre-determined V. SELECTION OF ROUTE


paths. However, in random node deployment, the sensor nodes If a router receives new information, then it uses the latest
are scattered randomly creating an infrastructure in an ad hoc sequence number. If the sequence number is the same as the
manner. If the resultant distribution of nodes is not uniform, one already in the table, the route with the better metric is
optimal clustering becomes necessary to allow connectivity used. Stale entries are those entries that have not been updated
and enable energy efficient network operation for a while. Such entries as well as the routes using those
Energy consumption: without losing accuracy: sensor nodes as next hops are deleted.
nodes can use up their limited supply of energy performing The availability of paths to all destinations in network
computations and transmitting information in a wireless always shows that less delay is required in the path set up
environment. As such, energy conserving forms of process.
communication and computation are essential.
The method of incremental update with sequence number
Data Reporting Model: Data sensing and reporting in labels, marks the existing wired network protocols adaptable
WSNs is dependent on the application and the time criticality to Ad-hoc wireless networks. Therefore, all available wired
of the data reporting. Data reporting can be categorized as network protocol can be useful to ad hoc wireless networks
either time-driven (continuous), event-driven, query-driven, with less modification.
and hybrid
DSDV requires a regular updates of its routing tables,
Node/Link Heterogeneity: In many studies, all sensor which uses up battery power and a small amount of bandwidth
nodes were assumed to be homogeneous, i.e., having equal even when the network is idle.
capacity in terms of computation, communication, and power.
However, depending on the application a sensor node can Whenever the topology of the network changes, a new
have different role or capability. The existence of sequence number is necessary before the network re-
heterogeneous set of sensors raises many technical issues converges; thus, DSDV is not suitable for highly dynamic or
related to data routing. large scale networks. (As in all distance-vector protocols, this
does not perturb traffic in regions of the network that are not
Fault Tolerance: Some sensor nodes may fail or be concerned by the topology change.
blocked due to lack of power, physical damage, or
environmental interference. The failure of sensor nodes should VI. RESULT & CONCLUSION
not affect the overall task of the sensor network. If many
nodes fail, MAC and routing protocols must accommodate Simulation parameter assumptions or analysis that is
formation of new links and routes to the data collection base considered, when building the TCL script, the simplicity to all
stations. This may require actively adjusting transmit powers packet massages flows in the system are assumed to have the
and signaling rates on the existing links to reduce energy same type of traffic source node.
consumption, or rerouting packets through regions of the
network where more energy is available.

IV. DESTINATION-SEQUENCED DISTANCE VECTOR


ROUTING
Destination-Sequenced Distance-Vector Routing
(DSDV) is a table-driven routing scheme for ad hoc mobile
networks based on the Bellman–Ford algorithm. It was
developed by C. Perkins and P. Bhagwat in 1994.The main
contribution of the algorithm was to solve the routing loop
problem. Each entry in the routing table contains a sequence
number, the sequence numbers are generally even if a link is AD-Hoc Routing Protocol
present; else, an odd number is used. The number is generated
by the destination, and the emitter needs to send out the next
REFERENCES
update with this number. Routing information is distributed
between nodes by sending full dumps infrequently and smaller [1] A. Mummoorthy, “A Detailed Study on the Evolution of Recent
Jammers in Wireless Sensor Networks”, International Journal of
incremental updates more frequently. Engineering Research and Development, Pp. 12-15, 2012.
[2] T. He, C. Huang, B.M. Blum, J.A. Stankovic and T. Abdelzaher,
Table 1: Routing Table “Range-Free Localization Schemes for Large Scale Sensor Networks”,
Designation Next No.of Sequence Install time Proceedings of the 9th Annual International Conference on Mobile
Hop Hops number Computing and Networking, San Diego, Pp. 81-95, 2003.
A A 0 A46 002000 [3] W. Dargie and C. Poellabauer, “Fundamentals of Wireless Sensor
B B 1 B36 002200 Networks: Theory and Practice”, John Wiley & Sons, Hoboken, 2010.
C B 2 C28 002500
[4] A. Kumar, V. Kumar and V. Kapoor, “Range Free Localization Schemes
For example, the routing table of Node A in this network is for Wireless Sensor Networks”, 10th WSEAS International Conference
Naturally the table contains description of all possible paths on Software Engineering, Cambridge, Pp. 101-106, 2011.
reachable by node A, along with the next hop, number of hops [5] H. Karl and A. Willig, “Protocols and Architectures for Wireless Sensor
Networks”, John Wiley & Sons, Hoboken, 2007.
and sequence number.

ISSN 2320-5377 | © 2018 Bonfring


Bonfring International Journal of Networking Technologies and Applications, Vol. 5, No. 1, March 2018 11

[6] S.Y. Kim and O.H. Kwon, “Location Estimation Based on Edge
Weights in Wireless Sensor Networks”, The Journal of Korean Institute
of Communications and Information Sciences, Vol.30, Pp. 938-948,
2005
[7] L. Lazos and R. Poovendran, “Serloc: Secure Range-Independent
Localization for Wireless Sensor Networks”, Proceedings of the 3rd
ACM Workshop on Wireless Security, Philadelphia, Pp. 21-30, 2004.
[8] R. Nagpal, H. Shrobe and J. Bachrach, “Organizing a global coordinate
system from local information on an ad hoc sensor network”,
Information processing in sensor networks. Springer, Berlin, Heidelberg,
Pp. 333-348, 2003.
[9] F. Zhao and L. Guibas, “Information Processing in Sensor Networks”,
Springer, Berlin, Pp. 333-348, 2003.
[10] A. Mummoorthy and S Suresh Kumar, “Energy Aware Routing Protocol
Poisson Process using Diffusion Update Algorithm in Wireless Sensor
Networks”, Asian Journal of Research in Social Sciences and
Humanities, Vol. 6, No. 6, Pp. 130-147, 2016.
[11] N. Bulusu, J. Heidemann and D. Estrin, “Gps-Less Low-Cost Outdoor
Localization for Very Small Devices”, IEEE Personal Communications,
Vol.7, Pp. 28-34, 2000.
[12] S. Long, F. Wang, W. Duan and F. Ren, “Range-Free Self-Localization
Mechanism and Algorithm for Wireless Sensor Networks”, Computer
Engineering and Applications, 2004.
[13] T. He, C. Huang, B.M. Blum, J.A. Stankovic and T.F. Abdelzaher,
“Range-Free Localization and Its Impact on Large Scale Sensor
Networks”, ACM Transactions on Embedded Computing Systems,
Vol.4, Pp. 877-906, 2005.
[14] T.S. Rappaport, “Wireless Communications: Principles and Practice.,
Prentice Hall”, Upper Saddle River, Vol. 2, 1996.

ISSN 2320-5377 | © 2018 Bonfring

Vous aimerez peut-être aussi