Faculty Publications
Permanent URI for this communityhttps://idr.nitk.ac.in/handle/123456789/18736
Publications by NITK Faculty
Browse
30 results
Search Results
Item Digital signature-based secure node disjoint multipath routing protocol for wireless sensor networks(2012) Shiva Murthy, G.; D'Souza, R.J.; Varaprasad, G.The objective of energy efficient routing protocol is to increase the operational lifetime of the wireless sensor networks. Multipath routing protocols enhance the lifetime of the wireless sensor networks by distributing traffic among multiple paths instead of a single optimal path. Transmission of secured data is also an important research concern in the wireless sensor networks. In this paper, a secure node disjoint multipath routing protocol for wireless sensor networks is proposed. Here, the data packets are transmitted in a secure manner by using the digital signature crypto system. It is compared with an ad hoc on-demand multipath distance vector routing protocol. It shows better results in terms of packet delivery fraction, energy consumption, and end-to-end delay compared to the ad hoc on-demand multipath distance vector routing. © 2012 IEEE.Item Network lifetime analytical model for node-disjoint multipath routing in wireless sensor networks(Inderscience Publishers, 2013) Murthy, S.G.; D'Souza, R.J.; Varaprasad, G.The objective of every sensor node in a sensor network is to send the sensed data in the phenomena to a sink node. The network lifetime is maximal, when the energy consumption of each node is uniform. Many routing protocols select an optimal path to increase the network lifetime in sensor networks. The energy of the nodes along this optimal path is consumed more, causing their early death. In the multipath routing, data traffic is distributed among the multiple paths, instead of a single optimal path. This work proposes a theoretical frame work to study the node-disjoint multipath wireless sensor network reliability. With higher reliability, higher network lifetime can be achieved. Simulation results show that when the data is transmitted through multiple paths with different data rates, the network lifetime increases. The node criticality factor enhances the network lifetime analysis effectively. © 2013 Inderscience Enterprises Ltd.Item Performance analysis of energy efficient modulation and coding schemes for wireless sensor networks(2013) Shivaprakasha, K.S.; Kulkarni, M.; Patkar, R.Sensor nodes of a typical wireless sensor network (WSN) are battery driven, so energy conservation is a critical factor for node's life time. Thus optimisation of energy consumption is a major objective in the area of WSNs. One such method is asymmetric communication which uses different channel codes and modulation schemes for downlink (base station (BS) to node link) and uplink (node to BS link). In this paper, a performance analysis of different channel code-modulation pair for energy efficient asymmetric communication is carried out followed by the field programmable gate array implementation of channel codes required at the node. The per information bit node energy for the uplink has been calculated for efficient channel code-modulation pair, for three different channels, viz. additive white gaussian noise, Rayleigh flat-fading and log-normal shadowing channels, resulting in reduction in energy consumption at sensor nodes. © 2013 Copyright Taylor and Francis Group, LLC.Item An Energy-Efficient Hybrid Clustering Mechanism for Wireless Sensor Network(World Scientific Publishing Co. Pte Ltd wspc@wspc.com.sg, 2015) Muni Venkateswarlu, K.; Kandasamy, A.; Chandrasekaran, K.Valuable energy resources of sensor network should be utilized wisely to prolong network's lifetime. Clustering technique helps wireless sensor network (WSN) to enhance its lifetime by reducing energy consumption on every individual sensor node in the network. In multi-hop data forwarding model, difference in energy consumption among cluster heads (HS) causes hot-spot problem in the network. While data is being transferred, the CH close to base station are burdened with heavy relay traffic from several data routes and tend to die early. Unequal clustering avoids this hot-spot problem by establishing different sized clusters at various levels in the network. Since unequal clustering technique does not control number of CHs it creates, it forms huge number of clusters in the network. This increases hop count between source and destination, and leads to impose more over head on each data forwarding route in the network. Also, rapid variation in cluster size causes imbalance in energy dissipation among clustered nodes in the network. This uneven energy consumption influences network performance and lifetime. In this paper, we present an energy-efficient hybrid clustering mechanism for wireless sensor network using equal and unequal clustering techniques to create limited number of clusters in varied sizes at various level of the network. This avoids hot-spot problem with minimum hop count between the source and destination and achieves uniform energy dissipation between intra-and inter-cluster communication. Simulation results show that the proposed clustering mechanism balances the energy consumption among clusters with its hybrid cluster formation mechanism and elevates sensor network lifetime. © 2015 World Scientific Publishing Company.Item Range adjustable hybrid multi path routing algorithm for WSNs(Inderscience Publishers, 2017) Nishant, J.D.; Kulkarni, M.; Shivaprakasha, K.S.Node disjoint multipath routing is an effectiveway to achieve reliability and load balancing in wireless sensor networks (WSNs). In this paper, an attempt has been made in proposing a novel node disjoint multipath routing algorithm, the range adjustable hybrid multipath (RAHM). RAHM uses hybrid routing approach. The centralised node disjoint path selection is based on the objective of minimising the end to end communication drain on each path. The localised distributed route reconfiguration initiates on the node failure events and the route re-establishment is based on the objective of residual energy of the nodes. The performance of the proposed algorithm is validated through simulations and compared with collection tree protocol (CTP) and multipath ring routing protocol. RAHM performs around 36% and 76% better in terms of network lifetime parameter compared to CTP and multipath ring routing protocol respectively. © 2017 Inderscience Enterprises Ltd.Item En-Route Filtering Techniques in Wireless Sensor Networks: A Survey(Springer New York LLC barbara.b.bertram@gsk.com, 2017) Kumar, A.; Pais, A.R.Majority of wireless sensor networks (WSNs) are deployed in unattended environments and thus sensor nodes can be compromised easily. A compromised sensor node can be used to send fake sensing reports to the sink. If undetected these reports can raise false alarms. To deal with the problem of fake report generation, a number of en-route filtering schemes have been proposed. Each of these schemes uses different cryptographic methods to check the authenticity of reports while they are being forwarded hop by hop toward base station. However, majority of these techniques can handle only limited compromised nodes or they either need node localization or statically configured routes for sending reports. Furthermore, majority of en-route filtering techniques are vulnerable to various denial of service attacks. Our main aims in this survey are: (a) to describe the major en-route filtering techniques, (b) to analyze these techniques on various parameters including security and (c) to outline main unresolved research challenges in en-route filtering in WSNs. © 2017, Springer Science+Business Media New York.Item Spatial–Temporal Aspects Integrated Probabilistic Intervals Models of Query Generation and Sink Attributes for Energy Efficient WSN(Springer New York LLC barbara.b.bertram@gsk.com, 2017) Kumar, P.; Chaturvedi, A.With advancement in device miniaturization and efficacy of network protocols, in a variety of civilian and military applications, wireless sensor networks (WSNs) architectures find room as viable network paradigm. Invariably, in all these WSN architectures, devising suitable algorithms for the efficient network resources utilization has been a challenging task. In certain events driven scenarios, random arrival pattern of queries generation; their geographical distribution (spatial aspect) and generation rate (temporal aspect) are hard to predict precisely. However, these phenomenons could be appropriately modelled using probabilistic framework while yielding adequate accuracy. Usually, in adopted probabilistic models, the associated control parameters are treated as crisp numbers, which fail to encompass uncertainties that are inevitably associated with the modeled parameters. To include impact of such uncertainties, we propose a modified Poisson PMF expressions in that dependency on spatial and temporal aspects is incorporated based on interval concepts. The paper also validates the dynamic fuzzy c-means algorithm as the most efficient clusters formation scheme. Sink node is an important entity/interface between end users and remotely located sensor nodes. To exploit implications of sink nodes attributes, three different case studies are presented. Wherein, we explore the network surveillance by a single stationary/portable sink and four stationary sinks. Obtained simulation results are analyzed for different scenarios which in principle governed by usage of four distinct clustering schemes and sink(s) attribute driven network surveillance. © 2017, Springer Science+Business Media New York.Item Effective integration of reliable routing mechanism and energy efficient node placement technique for low power IoT networks(IGI Global cust@igi-global.com, 2017) Sarwesh, P.; Shet, N.S.V.; Chandrasekaran, K.Internet of Things (IoT) is the emerging technology that links physical devices (sensor devices) with cyber systems and allows global sharing of information. In IoT applications, devices are operated by battery power and low power radio links, which are constrained by energy. In this paper, node placement technique and routing mechanism are effectively integrated in single network architecture to prolong the lifetime of IoT network. In proposed network architecture, sensor node and relay node are deployed, sensor nodes are responsible for collecting the environmental data and relay nodes are responsible for data aggregation and path computation. In node placement technique, densities of relay nodes are varied based on traffic area, to prevent energy hole problem. In routing technique, energy efficient and reliable path computation is done to reduce number of re transmissions. To adopt IoT scenario, we included IEEE 802.15.4 PHY/MAC radio and IPv6 packet structure in proposed network architecture. Proposed work result shows, proposed architecture prolongs network lifetime. © © 2017, IGI Global.Item A Hybrid Trust Management Scheme for Wireless Sensor Networks(Springer New York LLC barbara.b.bertram@gsk.com, 2017) Karthik, N.; Ananthanarayana, V.S.Wireless sensor network (WSN) consists of wireless small sensor nodes deployed in the terrain for continuous observation of physical or environmental conditions. The data collected from the WSN is used for making decisions. The condition for making critical decision is to assure the trustworthiness of the data generated from sensor nodes. However, the approaches for scoring the sensed data alone is not enough in WSN since there is an interdependency between node and data item. If the overall trust score of the network is based on one trust component, then the network might be misguided. In this work, we propose the hybrid approach to address the issue by assigning the trust score to data items and sensor nodes based on data quality and communication trust respectively. The proposed hybrid trust management scheme (HTMS) detects the data fault with the help of temporal and spatial correlations. The correlation metric and provenance data are used to score the sensed data. The data trust score is utilized for making decision. The communication trust and provenance data are used to evaluate the trust score of intermediate nodes and source node. If the data item is reliable enough to make critical decisions, a reward is given by means of adding trust score to the intermediate nodes and source node. A punishment is given by reducing the trust score of the source and intermediate nodes, if the data item is not reliable enough to make critical decisions. Result shows that the proposed HTMS detects the malicious, faulty, selfish node and untrustworthy data. © 2017, Springer Science+Business Media, LLC.Item Energy-efficient and reliable data collection in wireless sensor networks(Turkiye Klinikleri Journal of Medical Sciences Talapapa Bulvary no. 102 Hamammonu 1 06230, 2018) Puneeth, D.; Joshi, N.; Atrey, P.K.; Kulkarni, M.Ensuring energy efficiency, data reliability, and security is important in wireless sensor networks (WSNs). A combination of variants from the cryptographic secret sharing technique and the disjoint multipath routing scheme is an effective strategy to address these requirements. Although Shamir's secret sharing (SSS) provides the desired reliability and information-theoretic security, it is not energy efficient. Alternatively, Shamir's ramp secret sharing (SRSS) provides energy efficiency and data reliability, but is only computationally secure. We argue that both these approaches may suffer from a compromised node (CN) attack when a minimum number of nodes is compromised. Hence, we propose a new scheme that is energy efficient, provides data reliability, and is secure against CN attacks. The core idea of our scheme is to combine SRSS and a round-reduced AES cipher, which we call "split hop AES (SHAES)". Both the simulation results and the theoretical analysis are employed to validate the near-sink CN attack, and a secure reliable scheme using SHAES is proposed. © 2018 TÜBITAK.
- «
- 1 (current)
- 2
- 3
- »
