SlideShare una empresa de Scribd logo
1 de 4
Descargar para leer sin conexión
100 International Journal for Modern Trends in Science and Technology
Volume: 2 | Issue: 09 | September 2016 | ISSN: 2455-3778IJMTST
Reliable and Efficient Data Acquisition
in Wireless Sensor Network
Harshada Sonawane1
| Prof. Rachana Satao2
1Department of Computer Engineering Computer Network, Smt.Kashibai Navale College of Engineering,
Pune, Maharashtra, India.
2Assistant Professor, Department of Computer Engineering Computer Network, Smt.Kashibai Navale
College of Engineering, Pune, Maharashtra, India.
The sensors in the WSN sense the surrounding, collects the data and transfers the data to the sink node. It
has been observed that the sensor nodes are deactivated or damaged when exposed to certain radiations or
due to energy problems. This damage leads to the temporary isolation of the nodes from the network which
results in the formation of the holes. These holes are dynamic in nature and can grow and shrink depending
upon the factors causing the damage to the sensor nodes. So a solution has been presented in the base paper
where the dual mode i.e. Radio frequency and the Acoustic mode are considered so that the data can be
transferred easily. Based on this a survey has been done where several factors are studied so that the
performance of the system can be increased.
KEYWORDS: Wireless Sensor Network, Sensor deployment, Energy hole problem.
Copyright © 2016 International Journal for Modern Trends in Science and Technology
All rights reserved.
I. INTRODUCTION
WSN is the collection of several nodes which
transfers the data. There are several factors which
affect the performance of the sensor nodes and may
even damage them.As long as there is no damage to
the sensor nodes, it continues to work in the radio
frequency mode, when there occurs the node
failure, the acoustic mode is activated. The data is
then extracted and transferred further. The
elimination of the faulty nodes from the system
cannot be the solution since all the resources and
the services associated with the sensor node can be
used again when they are recovered. It also helps in
increasing the lifetime of a network. Thus the
working of the model in dual mode proves to be
better, since we switch to the other sleeping nodes
and transfer the data through them. Also the range
of the node plays the equal important role while the
data is transferred from one node to the other. The
motivating factors related to this are increasing the
lifetime of the Wireless sensor network using the
fault tolerance and the fault node detection, also
active cooperative communication has to be there
amongst the nodes so that the change in the
topology can be reflected immediately and data can
be sent with minimum delay. The architecture
diagram of the system shown below helps us to
understand the system.
II. LITERATURE SURVEY
The paper presented by the Pushpendu Kar and
Sudip Misra Jan 2016 provides us with the details
of how the dual mode i.e. radio frequency and the
acoustic mode can be implemented for the effective
and efficient data transfer. Also emphasized on the
data extraction process. Due to the proposed
system the data can be sent more efficiently [1].
In the paper presented by Kealan McCusker, Noel
E. O’Connor May/June 2011 a solution for
ABSTRACT
101 International Journal for Modern Trends in Science and Technology
Reliable and Efficient Data Acquisition in Wireless Sensor Network
distributing symmetric keys and network access
control in a WSN using IBC is proposed. The
proposed scheme was evaluated against
well-known attacks on a WSN and found to
perform well. Several groups implement for Tate
pairing in hardware but are targeting the latency
metric and also Field Programmable Gate Arrays
(FPGAs) rather than energy and an ASIC, therefore
these contributions lack over the suggested theory
which is several magnitudes higher than what is
achieved by implementing the pairing in hardware,
and too high for the limited energy available to a
node. Work is needed in order to implement other
components of the scheme such as the elliptic
curve point multiplication and exponentiation in
the field [2].
Cesare Alippi, Giuseppe Anastasi, Mario Di
Francesco, and Manuel Roveri Feb 2011. In this
paper authors proposed an adaptive sampling
algorithm that estimates online the optimal
samplingfrequencies for sensors. This approach,
which requires the designof adaptive measurement
systems, minimizes the energy consumptionof the
sensors and, incidentally, that of the radio while
maintaininga very high accuracy of collected
data.It can perform similar to a fixed-rate scheme
where the samplingfrequency is known in
advance.This approach resultsin a corresponding
energy saving of both the sensor and
theradio.Conclusion strongly depends on the
specific sensor, whosepower consumption is
significantly larger than that of the radio [3].
Levente Buttya´ n, La´ szlo´ Czap, and Istva´n
Vajda Nov/Dec 2011In a pollution attack, the
adversary maliciously alters some of the stored
encoded packets, which results in the incorrect
decoding of a large part of the original data upon
retrieval. Authors proposed algorithms to detect
and recover from such attacks. This paper can be
applied in any coding-based distributed storage
systems, be it in the domain of P2P file distribution
or in wireless sensor networks. In particular, this
approach does not require the storage nodes to
perform additional coding on or to add additional
information to the encoded packets. Proposed
algorithm is effective and extremely efficient both
in terms of communication and computational
overhead. It does not scale up to very large systems
in terms of computational complexity [4].
Ing-Ray Chen, Anh Phan Speer, and Mohamed
Eltoweissy March/April 2011
Authors developed adaptive fault-tolerant quality
of service (QoS) control algorithms based on
hop-by-hop data delivery utilizing “source” and
“path” redundancy, with the goal to satisfy
application QoS requirements while prolonging the
lifetime of the sensor system. Algorithm which
incorporates path and source redundancy
mechanisms to satisfy query QoS requirements
while maximizing the lifetime of query-based
sensor networks. Future work: provide a more
detailed analysis of the effect of network dynamics
on MTTF, such as more energy may be consumed
by some SNs over others or some SNs may fail
earlier than others [5].
Masanori Miyazawa and Michiaki Hayashi Rolf
Stadler2nd Jan, 2015 The paper proposes a
distributed managementfunction, called
virtualized network management function(vNMF),
to detect failures related to virtualized services.
vNMF detects the failures by monitoring
physical-layer statistics that are processed with a
self-organizing map algorithm. Memory leaks and
network congestion failures can be successfully
detected and that and the accuracy of failure
detection can be significantly improved compared
to common k-means clustering. The proposed
vNMF is expected to facilitate scalable network
management toward more complex network
virtualization environments in the future work [6].
Steven S. McClure, L. D. Edmonds, R.
Mihailovich, A. H. Johnston, P. Alonzo, J.
DeNatale, Member, IEEE, J. Lehman, and C. Yui
Dec 2002 A mechanism for dielectric charge
trapping and its effect on the electrostatic force is
proposed. Of notable significance is the
susceptibility of GaAS MEMS devices to radiation
effects, as found in this work. Such effects, if
present, may be eliminated with proper design
techniques, as demonstrated in the alternate RSC
switch configuration. It is strongly recommended
that devices of this type be thoroughly
characterized for radiation effects prior to use in
systems with a space or nuclear radiation
environments. [7].
Erfan Soltanmohammadi, Mahdi Orooji, Mort
Naraghi-Pour Jan 2013 The problem of
decentralized detection in wireless sensor networks
in the presence of one or more classes of
misbehaving nodes. Binary hypothesis testing is
considered where the honest nodes transmit their
binary decisions to the fusion center (FC), while the
misbehaving nodes transmit fictitious messages
the problem of decentralized detection in wireless
sensor networks in the presence of one or more
classes of misbehaving nodes. Binary hypothesis
testing is considered where the honest nodes
transmit their binary decisions to the fusion center
102 International Journal for Modern Trends in Science and Technology
Volume: 2 | Issue: 09 | September 2016 | ISSN: 2455-3778IJMTST
(FC), while the misbehaving nodes transmit
fictitious messages[8].
Tapas Kanungo, David M. Mount, Nathan S.
Netanyahu, Christine D. Piatko, Ruth Silverman,
and Angela Y. Wu July 2002 Proposed in 2 ways:
First, authors present a data-sensitive analysis of
the algorithm's running time, which shows that the
algorithm runs faster as the separation between
clusters increases. Second, a number of empirical
studies both on synthetically generated data and
on real data sets from applications in colour
quantization, data compression, and image
segmentation.A simple and efficient
implementation of Lloyd's k-means clustering
algorithm, which we call the filtering algorithm.
The advantage of this algorithm is it requires a
kd-tree as the only major data structure.This
algorithm is quite complex and does not provide
significantly faster running time in practice [9].
Vibha Paradkar, Gajendra Singh Chandel,
Kailash Patidar,2015 proposes a new routing
algorithm (Master/Slave) for discovery and
recovery of the routing path efficiently. The primary
path, secondary path and the segmentation
process helps to navigate the data from the
non-faulty nodes [10]. Also multipath routing helps
transfer data simultaneously thus by reducing
delay and congestion in the network [12].
Saad Ahmad Khan, Ladislau Bölöni, Damla
Turgut, 2015 the paper proposes a theory where
the bridge nodes are protected by giving some of
the responsibilities of the sink nodes to the other
nodes. It prevents the apparition of the additional
bridge nodes. The disadvantage is that the
algorithm sacrifices the length of some routes in
order to distribute the routes away from the critical
area [11].
Amit Sharma, Kshitij Shinghal, Neelam
Srivastava, Raghuvir Singh, Mar 2011 in this work
analysis of the energy consumption of a WSN node
is analysed with proposed node. With the help of
this the estimated lifetime of the battery can be
increased significantly [14]. It is observed that
sensors are used for forwarding data to sink
directly so as to reduce energy consumption,
packet loss and delay [13].
III. CONCLUSION
Reliable and efficient WSN is the need of the
today’s communication technology and has been
able to capture the attention of several researchers.
The dual mode working of the sensor nodes in the
WSN has been able to reduce the delay. Also the
lifetime is increased by not eliminating the nodes
directly when then go in the isolation state. Energy
of the node being one of the several important
factors, has to be worked upon by monitoring and
with the help of the knowledge acquired by the
survey. It also motivates to consider the mobile
nodes and not just the stationary nodes and we can
improve the computational power by optimal
sensor deployment in wireless sensor network.
REFERENCES
[1] Pushpendu Kar, Student Member, IEEE and Sudip
Misra, Senior Member, IEEE, “Reliable and Efficient
Data Acquisition in Wireless Sensor Networks in the
Presence of Transfaulty Nodes,” IEEE
TRANSACTIONS ON NETWORK AND SERVICE
MANAGEMENT, 8th Jan, 2016.
[2] Kealan McCusker, Noel E. O’Connor, “Low-energy
symmetric key distribution in wireless sensor
networks,” IEEE Transactions on Dependable and
Secure Computing May/June 2011.
[3] Cesare Alippi, Fellow, IEEE, Giuseppe Anastasi,
Mario Di Francesco, and Manuel Roveri, “Adaptive
Sampling Algorithm for Effective Energy
Management in Wireless Sensor Networks With
Energy-Hungry Sensors,” IEEE TRANSACTIONS ON
INSTRUMENTATION AND MEASUREMENT, VOL.
59, NO. 2, FEBRUARY 2010.
[4] Levente Buttya´ n, La´ szlo´ Czap, and Istva´n Vajda,
“Detection and Recovery from Pollution Attacks in
Coding-Based Distributed Storage Schemes,” IEEE
TRANSACTIONS ON DEPENDABLE AND SECURE
COMPUTING, VOL. 8, NO. 6,
NOVEMBER/DECEMBER 2011.
[5] Ing-Ray Chen, Member, IEEE, Anh Phan Speer, and
Mohamed Eltoweissy, Senior Member, IEEE,
“Adaptive Fault-Tolerant QoS Control Algorithms for
Maximizing System Lifetime of Query-Based
Wireless Sensor Networks,” IEEE TRANSACTIONS
ON DEPENDABLE AND SECURE COMPUTING,
VOL. 8, NO. 2, MARCH-APRIL 2011.
[6] Masanori Miyazawa and Michiaki Hayashi Rolf
Stadler, “vNMF: Distributed Fault Detection using
Clustering Approach for Network Function
Virtualization,” 2nd Jan, 2015.
[7] Steven S. McClure, L. D. Edmonds, R. Mihailovich,
A. H. Johnston, Fellow, IEEE, P. Alonzo, J. DeNatale,
Member, IEEE, J. Lehman, and C. Yui, “Radiation
Effects in Micro-Electromechanical Systems
(MEMS): RF Relays,” IEEE TRANSACTIONS ON
NUCLEAR SCIENCE, VOL. 49, NO. 6, DECEMBER
2002.
[8] Erfan Soltanmohammadi, Student Member, IEEE,
Mahdi Orooji, Student Member, IEEE, and Mort
Naraghi-Pour, Member, IEEE, “Decentralized
Hypothesis Testing in Wireless Sensor Networks in
the Presence of Misbehaving Nodes,” IEEE
TRANSACTIONS ON INFORMATION FORENSICS
AND SECURITY, VOL. 8, NO. 1, Jan 2013.
103 International Journal for Modern Trends in Science and Technology
Reliable and Efficient Data Acquisition in Wireless Sensor Network
[9] Tapas Kanungo, Senior Member, IEEE, David M.
Mount, Member, IEEE, Nathan S. Netanyahu,
Member, IEEE, Christine D. Piatko, Ruth Silverman,
and Angela Y. Wu, Senior Member, IEEE, “An
Efficient k-Means Clustering Algorithm: Analysis
and Implementation,” IEEE TRANSACTIONS ON
PATTERN ANALYSIS AND MACHINE
INTELLIGENCE, VOL. 24, NO. 7, JULY 2002.
[10]Vibha Paradkar, Gajendra Singh Chandel, Kailash
Patidar, “Fault Node Discovery and Efficient Route
Repairing Algorithm for Wireless Sensor Network”
(IJCSIT) International Journal of Computer Science
and Information Technologies, Vol. 6 (2), 2015,
1710-1715.
[11]Saad Ahmad Khan, Ladislau Bölöni, Damla Turgut,
“Bridge protection algorithms – A technique for
fault-tolerance in sensor networks” Ad Hoc Networks
24 (2015) 186–199.
[12]Anasane, Aboli Arun, and Rachana Anil Satao. "A
Survey on Various Multipath Routing Protocols in
Wireless Sensor Networks." Procedia Computer
Science 79 (2016): 610-615.
[13]Kudale, Roma, and Rachana Satao. "STESA: Self
Transmission Energy Saving Algorithm for road
surveillance." 2013 Tenth International Conference
on Wireless and Optical Communications Networks
(WOCN). IEEE, 2013.
[14]Amit Sharma, Kshitij Shinghal , Neelam Srivastava,
Raghuvir Singh, “Energy management for wireless
sensor network nodes” International Journal of
Advances in Engineering & Technology, Vol. 1, Mar
2011.

Más contenido relacionado

La actualidad más candente

Bidirectional data centric routing protocol to improve the energy efficiency ...
Bidirectional data centric routing protocol to improve the energy efficiency ...Bidirectional data centric routing protocol to improve the energy efficiency ...
Bidirectional data centric routing protocol to improve the energy efficiency ...prj_publication
 
An Approach of Mobile Wireless Sensor Network for Target Coverage and Network...
An Approach of Mobile Wireless Sensor Network for Target Coverage and Network...An Approach of Mobile Wireless Sensor Network for Target Coverage and Network...
An Approach of Mobile Wireless Sensor Network for Target Coverage and Network...IRJET Journal
 
Wireless Sensor Network Based Clustering Architecture for Cooperative Communi...
Wireless Sensor Network Based Clustering Architecture for Cooperative Communi...Wireless Sensor Network Based Clustering Architecture for Cooperative Communi...
Wireless Sensor Network Based Clustering Architecture for Cooperative Communi...ijtsrd
 
Characterization of directed diffusion protocol in wireless sensor network
Characterization of directed diffusion protocol in wireless sensor networkCharacterization of directed diffusion protocol in wireless sensor network
Characterization of directed diffusion protocol in wireless sensor networkijwmn
 
A Fault tolerant system based on Genetic Algorithm for Target Tracking in Wir...
A Fault tolerant system based on Genetic Algorithm for Target Tracking in Wir...A Fault tolerant system based on Genetic Algorithm for Target Tracking in Wir...
A Fault tolerant system based on Genetic Algorithm for Target Tracking in Wir...Editor IJCATR
 
A NOVEL ROUTING PROTOCOL FOR TARGET TRACKING IN WIRELESS SENSOR NETWORKS
A NOVEL ROUTING PROTOCOL FOR TARGET TRACKING IN WIRELESS SENSOR NETWORKSA NOVEL ROUTING PROTOCOL FOR TARGET TRACKING IN WIRELESS SENSOR NETWORKS
A NOVEL ROUTING PROTOCOL FOR TARGET TRACKING IN WIRELESS SENSOR NETWORKSIJCNCJournal
 
A Review Study on Shortest Path in WSN to detect the Abnormal Packet for savi...
A Review Study on Shortest Path in WSN to detect the Abnormal Packet for savi...A Review Study on Shortest Path in WSN to detect the Abnormal Packet for savi...
A Review Study on Shortest Path in WSN to detect the Abnormal Packet for savi...Editor IJMTER
 
AN ENERGY EFFICIENT DISTRIBUTED PROTOCOL FOR ENSURING COVERAGE AND CONNECTIVI...
AN ENERGY EFFICIENT DISTRIBUTED PROTOCOL FOR ENSURING COVERAGE AND CONNECTIVI...AN ENERGY EFFICIENT DISTRIBUTED PROTOCOL FOR ENSURING COVERAGE AND CONNECTIVI...
AN ENERGY EFFICIENT DISTRIBUTED PROTOCOL FOR ENSURING COVERAGE AND CONNECTIVI...ijasuc
 
Performance evaluation of data filtering approach in wireless sensor networks...
Performance evaluation of data filtering approach in wireless sensor networks...Performance evaluation of data filtering approach in wireless sensor networks...
Performance evaluation of data filtering approach in wireless sensor networks...ijmnct
 
V.KARTHIKEYAN PUBLISHED ARTICLE
V.KARTHIKEYAN PUBLISHED ARTICLEV.KARTHIKEYAN PUBLISHED ARTICLE
V.KARTHIKEYAN PUBLISHED ARTICLEKARTHIKEYAN V
 
Wireless sensor networks, clustering, Energy efficient protocols, Particles S...
Wireless sensor networks, clustering, Energy efficient protocols, Particles S...Wireless sensor networks, clustering, Energy efficient protocols, Particles S...
Wireless sensor networks, clustering, Energy efficient protocols, Particles S...IJMIT JOURNAL
 
A survey on Object Tracking Techniques in Wireless Sensor Network
A survey on Object Tracking Techniques in Wireless Sensor NetworkA survey on Object Tracking Techniques in Wireless Sensor Network
A survey on Object Tracking Techniques in Wireless Sensor NetworkIRJET Journal
 
THRESHOLD BASED DATA REDUCTION FOR PROLONGING LIFE OF WIRELESS SENSOR NETWORK
THRESHOLD BASED DATA REDUCTION FOR PROLONGING LIFE OF WIRELESS SENSOR NETWORKTHRESHOLD BASED DATA REDUCTION FOR PROLONGING LIFE OF WIRELESS SENSOR NETWORK
THRESHOLD BASED DATA REDUCTION FOR PROLONGING LIFE OF WIRELESS SENSOR NETWORKpijans
 
A COST EFFECTIVE COMPRESSIVE DATA AGGREGATION TECHNIQUE FOR WIRELESS SENSOR N...
A COST EFFECTIVE COMPRESSIVE DATA AGGREGATION TECHNIQUE FOR WIRELESS SENSOR N...A COST EFFECTIVE COMPRESSIVE DATA AGGREGATION TECHNIQUE FOR WIRELESS SENSOR N...
A COST EFFECTIVE COMPRESSIVE DATA AGGREGATION TECHNIQUE FOR WIRELESS SENSOR N...ijasuc
 
Proactive Data Reporting of Wireless sensor Network using Wake Up Scheduling ...
Proactive Data Reporting of Wireless sensor Network using Wake Up Scheduling ...Proactive Data Reporting of Wireless sensor Network using Wake Up Scheduling ...
Proactive Data Reporting of Wireless sensor Network using Wake Up Scheduling ...ijsrd.com
 
Machine Learning Based Watchdog Protocol for Wormhole Attack Detection in Wir...
Machine Learning Based Watchdog Protocol for Wormhole Attack Detection in Wir...Machine Learning Based Watchdog Protocol for Wormhole Attack Detection in Wir...
Machine Learning Based Watchdog Protocol for Wormhole Attack Detection in Wir...IJCSIS Research Publications
 

La actualidad más candente (19)

Bidirectional data centric routing protocol to improve the energy efficiency ...
Bidirectional data centric routing protocol to improve the energy efficiency ...Bidirectional data centric routing protocol to improve the energy efficiency ...
Bidirectional data centric routing protocol to improve the energy efficiency ...
 
Ijetcas14 469
Ijetcas14 469Ijetcas14 469
Ijetcas14 469
 
An Approach of Mobile Wireless Sensor Network for Target Coverage and Network...
An Approach of Mobile Wireless Sensor Network for Target Coverage and Network...An Approach of Mobile Wireless Sensor Network for Target Coverage and Network...
An Approach of Mobile Wireless Sensor Network for Target Coverage and Network...
 
Wireless Sensor Network Based Clustering Architecture for Cooperative Communi...
Wireless Sensor Network Based Clustering Architecture for Cooperative Communi...Wireless Sensor Network Based Clustering Architecture for Cooperative Communi...
Wireless Sensor Network Based Clustering Architecture for Cooperative Communi...
 
Characterization of directed diffusion protocol in wireless sensor network
Characterization of directed diffusion protocol in wireless sensor networkCharacterization of directed diffusion protocol in wireless sensor network
Characterization of directed diffusion protocol in wireless sensor network
 
Ijetcas14 591
Ijetcas14 591Ijetcas14 591
Ijetcas14 591
 
1104.0355
1104.03551104.0355
1104.0355
 
A Fault tolerant system based on Genetic Algorithm for Target Tracking in Wir...
A Fault tolerant system based on Genetic Algorithm for Target Tracking in Wir...A Fault tolerant system based on Genetic Algorithm for Target Tracking in Wir...
A Fault tolerant system based on Genetic Algorithm for Target Tracking in Wir...
 
A NOVEL ROUTING PROTOCOL FOR TARGET TRACKING IN WIRELESS SENSOR NETWORKS
A NOVEL ROUTING PROTOCOL FOR TARGET TRACKING IN WIRELESS SENSOR NETWORKSA NOVEL ROUTING PROTOCOL FOR TARGET TRACKING IN WIRELESS SENSOR NETWORKS
A NOVEL ROUTING PROTOCOL FOR TARGET TRACKING IN WIRELESS SENSOR NETWORKS
 
A Review Study on Shortest Path in WSN to detect the Abnormal Packet for savi...
A Review Study on Shortest Path in WSN to detect the Abnormal Packet for savi...A Review Study on Shortest Path in WSN to detect the Abnormal Packet for savi...
A Review Study on Shortest Path in WSN to detect the Abnormal Packet for savi...
 
AN ENERGY EFFICIENT DISTRIBUTED PROTOCOL FOR ENSURING COVERAGE AND CONNECTIVI...
AN ENERGY EFFICIENT DISTRIBUTED PROTOCOL FOR ENSURING COVERAGE AND CONNECTIVI...AN ENERGY EFFICIENT DISTRIBUTED PROTOCOL FOR ENSURING COVERAGE AND CONNECTIVI...
AN ENERGY EFFICIENT DISTRIBUTED PROTOCOL FOR ENSURING COVERAGE AND CONNECTIVI...
 
Performance evaluation of data filtering approach in wireless sensor networks...
Performance evaluation of data filtering approach in wireless sensor networks...Performance evaluation of data filtering approach in wireless sensor networks...
Performance evaluation of data filtering approach in wireless sensor networks...
 
V.KARTHIKEYAN PUBLISHED ARTICLE
V.KARTHIKEYAN PUBLISHED ARTICLEV.KARTHIKEYAN PUBLISHED ARTICLE
V.KARTHIKEYAN PUBLISHED ARTICLE
 
Wireless sensor networks, clustering, Energy efficient protocols, Particles S...
Wireless sensor networks, clustering, Energy efficient protocols, Particles S...Wireless sensor networks, clustering, Energy efficient protocols, Particles S...
Wireless sensor networks, clustering, Energy efficient protocols, Particles S...
 
A survey on Object Tracking Techniques in Wireless Sensor Network
A survey on Object Tracking Techniques in Wireless Sensor NetworkA survey on Object Tracking Techniques in Wireless Sensor Network
A survey on Object Tracking Techniques in Wireless Sensor Network
 
THRESHOLD BASED DATA REDUCTION FOR PROLONGING LIFE OF WIRELESS SENSOR NETWORK
THRESHOLD BASED DATA REDUCTION FOR PROLONGING LIFE OF WIRELESS SENSOR NETWORKTHRESHOLD BASED DATA REDUCTION FOR PROLONGING LIFE OF WIRELESS SENSOR NETWORK
THRESHOLD BASED DATA REDUCTION FOR PROLONGING LIFE OF WIRELESS SENSOR NETWORK
 
A COST EFFECTIVE COMPRESSIVE DATA AGGREGATION TECHNIQUE FOR WIRELESS SENSOR N...
A COST EFFECTIVE COMPRESSIVE DATA AGGREGATION TECHNIQUE FOR WIRELESS SENSOR N...A COST EFFECTIVE COMPRESSIVE DATA AGGREGATION TECHNIQUE FOR WIRELESS SENSOR N...
A COST EFFECTIVE COMPRESSIVE DATA AGGREGATION TECHNIQUE FOR WIRELESS SENSOR N...
 
Proactive Data Reporting of Wireless sensor Network using Wake Up Scheduling ...
Proactive Data Reporting of Wireless sensor Network using Wake Up Scheduling ...Proactive Data Reporting of Wireless sensor Network using Wake Up Scheduling ...
Proactive Data Reporting of Wireless sensor Network using Wake Up Scheduling ...
 
Machine Learning Based Watchdog Protocol for Wormhole Attack Detection in Wir...
Machine Learning Based Watchdog Protocol for Wormhole Attack Detection in Wir...Machine Learning Based Watchdog Protocol for Wormhole Attack Detection in Wir...
Machine Learning Based Watchdog Protocol for Wormhole Attack Detection in Wir...
 

Similar a Reliable and Efficient Data Acquisition in Wireless Sensor Network

Mobile Agents based Energy Efficient Routing for Wireless Sensor Networks
Mobile Agents based Energy Efficient Routing for Wireless Sensor NetworksMobile Agents based Energy Efficient Routing for Wireless Sensor Networks
Mobile Agents based Energy Efficient Routing for Wireless Sensor NetworksEswar Publications
 
Energy Proficient and Security Protocol for WSN: A Review
Energy Proficient and Security Protocol for WSN: A ReviewEnergy Proficient and Security Protocol for WSN: A Review
Energy Proficient and Security Protocol for WSN: A Reviewtheijes
 
IRJET- Chaos based Secured Communication in Energy Efficient Wireless Sensor...
IRJET-	 Chaos based Secured Communication in Energy Efficient Wireless Sensor...IRJET-	 Chaos based Secured Communication in Energy Efficient Wireless Sensor...
IRJET- Chaos based Secured Communication in Energy Efficient Wireless Sensor...IRJET Journal
 
Wide-band spectrum sensing with convolution neural network using spectral cor...
Wide-band spectrum sensing with convolution neural network using spectral cor...Wide-band spectrum sensing with convolution neural network using spectral cor...
Wide-band spectrum sensing with convolution neural network using spectral cor...IJECEIAES
 
Computational Analysis of Routing Algorithm for Wireless Sensor Network
Computational Analysis of Routing Algorithm for Wireless Sensor NetworkComputational Analysis of Routing Algorithm for Wireless Sensor Network
Computational Analysis of Routing Algorithm for Wireless Sensor NetworkIRJET Journal
 
Paper id 28201419
Paper id 28201419Paper id 28201419
Paper id 28201419IJRAT
 
An Improved Enhanced Real Time Routing Protocol (IERT) for Mobile Wireless Se...
An Improved Enhanced Real Time Routing Protocol (IERT) for Mobile Wireless Se...An Improved Enhanced Real Time Routing Protocol (IERT) for Mobile Wireless Se...
An Improved Enhanced Real Time Routing Protocol (IERT) for Mobile Wireless Se...IRJET Journal
 
LIFETIME IMPROVEMENT USING MOBILE AGENT IN WIRELESS SENSOR NETWORK
LIFETIME IMPROVEMENT USING MOBILE AGENT IN WIRELESS SENSOR NETWORKLIFETIME IMPROVEMENT USING MOBILE AGENT IN WIRELESS SENSOR NETWORK
LIFETIME IMPROVEMENT USING MOBILE AGENT IN WIRELESS SENSOR NETWORKJournal For Research
 
EVENT DRIVEN ROUTING PROTOCOLS FOR WIRELESS SENSOR NETWORK- A SURVEY
EVENT DRIVEN ROUTING PROTOCOLS FOR  WIRELESS SENSOR NETWORK- A SURVEYEVENT DRIVEN ROUTING PROTOCOLS FOR  WIRELESS SENSOR NETWORK- A SURVEY
EVENT DRIVEN ROUTING PROTOCOLS FOR WIRELESS SENSOR NETWORK- A SURVEYijcsa
 
DEVELOPMENT OF SOM NEURAL NETWORK BASED ENERGY EFFICIENT CLUSTERING HIERARCHI...
DEVELOPMENT OF SOM NEURAL NETWORK BASED ENERGY EFFICIENT CLUSTERING HIERARCHI...DEVELOPMENT OF SOM NEURAL NETWORK BASED ENERGY EFFICIENT CLUSTERING HIERARCHI...
DEVELOPMENT OF SOM NEURAL NETWORK BASED ENERGY EFFICIENT CLUSTERING HIERARCHI...ijassn
 
Fault Diagonosis Approach for WSN using Normal Bias Technique
Fault Diagonosis Approach for WSN using Normal Bias TechniqueFault Diagonosis Approach for WSN using Normal Bias Technique
Fault Diagonosis Approach for WSN using Normal Bias TechniqueIDES Editor
 
Survey of Wireless Sensor Network Application
Survey of Wireless Sensor Network ApplicationSurvey of Wireless Sensor Network Application
Survey of Wireless Sensor Network Applicationijsrd.com
 
Current issue- International Journal of Advanced Smart Sensor Network Systems...
Current issue- International Journal of Advanced Smart Sensor Network Systems...Current issue- International Journal of Advanced Smart Sensor Network Systems...
Current issue- International Journal of Advanced Smart Sensor Network Systems...ijassn
 
A Comparative Review on Reliability and Fault Tolerance Enhancement Protocols...
A Comparative Review on Reliability and Fault Tolerance Enhancement Protocols...A Comparative Review on Reliability and Fault Tolerance Enhancement Protocols...
A Comparative Review on Reliability and Fault Tolerance Enhancement Protocols...IRJET Journal
 

Similar a Reliable and Efficient Data Acquisition in Wireless Sensor Network (20)

SDSFLF: fault localization framework for optical communication using softwar...
SDSFLF: fault localization framework for optical  communication using softwar...SDSFLF: fault localization framework for optical  communication using softwar...
SDSFLF: fault localization framework for optical communication using softwar...
 
C1804011117
C1804011117C1804011117
C1804011117
 
Mobile Agents based Energy Efficient Routing for Wireless Sensor Networks
Mobile Agents based Energy Efficient Routing for Wireless Sensor NetworksMobile Agents based Energy Efficient Routing for Wireless Sensor Networks
Mobile Agents based Energy Efficient Routing for Wireless Sensor Networks
 
Energy Proficient and Security Protocol for WSN: A Review
Energy Proficient and Security Protocol for WSN: A ReviewEnergy Proficient and Security Protocol for WSN: A Review
Energy Proficient and Security Protocol for WSN: A Review
 
DESIGN AND IMPLEMENTATION OF ADVANCED MULTILEVEL PRIORITY PACKET SCHEDULING S...
DESIGN AND IMPLEMENTATION OF ADVANCED MULTILEVEL PRIORITY PACKET SCHEDULING S...DESIGN AND IMPLEMENTATION OF ADVANCED MULTILEVEL PRIORITY PACKET SCHEDULING S...
DESIGN AND IMPLEMENTATION OF ADVANCED MULTILEVEL PRIORITY PACKET SCHEDULING S...
 
IRJET- Chaos based Secured Communication in Energy Efficient Wireless Sensor...
IRJET-	 Chaos based Secured Communication in Energy Efficient Wireless Sensor...IRJET-	 Chaos based Secured Communication in Energy Efficient Wireless Sensor...
IRJET- Chaos based Secured Communication in Energy Efficient Wireless Sensor...
 
D0606032413 Paper
D0606032413 PaperD0606032413 Paper
D0606032413 Paper
 
Wide-band spectrum sensing with convolution neural network using spectral cor...
Wide-band spectrum sensing with convolution neural network using spectral cor...Wide-band spectrum sensing with convolution neural network using spectral cor...
Wide-band spectrum sensing with convolution neural network using spectral cor...
 
Computational Analysis of Routing Algorithm for Wireless Sensor Network
Computational Analysis of Routing Algorithm for Wireless Sensor NetworkComputational Analysis of Routing Algorithm for Wireless Sensor Network
Computational Analysis of Routing Algorithm for Wireless Sensor Network
 
Paper id 28201419
Paper id 28201419Paper id 28201419
Paper id 28201419
 
An Improved Enhanced Real Time Routing Protocol (IERT) for Mobile Wireless Se...
An Improved Enhanced Real Time Routing Protocol (IERT) for Mobile Wireless Se...An Improved Enhanced Real Time Routing Protocol (IERT) for Mobile Wireless Se...
An Improved Enhanced Real Time Routing Protocol (IERT) for Mobile Wireless Se...
 
LIFETIME IMPROVEMENT USING MOBILE AGENT IN WIRELESS SENSOR NETWORK
LIFETIME IMPROVEMENT USING MOBILE AGENT IN WIRELESS SENSOR NETWORKLIFETIME IMPROVEMENT USING MOBILE AGENT IN WIRELESS SENSOR NETWORK
LIFETIME IMPROVEMENT USING MOBILE AGENT IN WIRELESS SENSOR NETWORK
 
EVENT DRIVEN ROUTING PROTOCOLS FOR WIRELESS SENSOR NETWORK- A SURVEY
EVENT DRIVEN ROUTING PROTOCOLS FOR  WIRELESS SENSOR NETWORK- A SURVEYEVENT DRIVEN ROUTING PROTOCOLS FOR  WIRELESS SENSOR NETWORK- A SURVEY
EVENT DRIVEN ROUTING PROTOCOLS FOR WIRELESS SENSOR NETWORK- A SURVEY
 
DEVELOPMENT OF SOM NEURAL NETWORK BASED ENERGY EFFICIENT CLUSTERING HIERARCHI...
DEVELOPMENT OF SOM NEURAL NETWORK BASED ENERGY EFFICIENT CLUSTERING HIERARCHI...DEVELOPMENT OF SOM NEURAL NETWORK BASED ENERGY EFFICIENT CLUSTERING HIERARCHI...
DEVELOPMENT OF SOM NEURAL NETWORK BASED ENERGY EFFICIENT CLUSTERING HIERARCHI...
 
Fault Diagonosis Approach for WSN using Normal Bias Technique
Fault Diagonosis Approach for WSN using Normal Bias TechniqueFault Diagonosis Approach for WSN using Normal Bias Technique
Fault Diagonosis Approach for WSN using Normal Bias Technique
 
Survey of Wireless Sensor Network Application
Survey of Wireless Sensor Network ApplicationSurvey of Wireless Sensor Network Application
Survey of Wireless Sensor Network Application
 
Current issue- International Journal of Advanced Smart Sensor Network Systems...
Current issue- International Journal of Advanced Smart Sensor Network Systems...Current issue- International Journal of Advanced Smart Sensor Network Systems...
Current issue- International Journal of Advanced Smart Sensor Network Systems...
 
A Comparative Review on Reliability and Fault Tolerance Enhancement Protocols...
A Comparative Review on Reliability and Fault Tolerance Enhancement Protocols...A Comparative Review on Reliability and Fault Tolerance Enhancement Protocols...
A Comparative Review on Reliability and Fault Tolerance Enhancement Protocols...
 
B05630814
B05630814B05630814
B05630814
 
F33022028
F33022028F33022028
F33022028
 

Último

Processing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxProcessing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxpranjaldaimarysona
 
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Dr.Costas Sachpazis
 
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxMicroscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxpurnimasatapathy1234
 
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )Tsuyoshi Horigome
 
(TARA) Talegaon Dabhade Call Girls Just Call 7001035870 [ Cash on Delivery ] ...
(TARA) Talegaon Dabhade Call Girls Just Call 7001035870 [ Cash on Delivery ] ...(TARA) Talegaon Dabhade Call Girls Just Call 7001035870 [ Cash on Delivery ] ...
(TARA) Talegaon Dabhade Call Girls Just Call 7001035870 [ Cash on Delivery ] ...ranjana rawat
 
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINEMANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINESIVASHANKAR N
 
UNIT-III FMM. DIMENSIONAL ANALYSIS
UNIT-III FMM.        DIMENSIONAL ANALYSISUNIT-III FMM.        DIMENSIONAL ANALYSIS
UNIT-III FMM. DIMENSIONAL ANALYSISrknatarajan
 
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...ranjana rawat
 
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escortsranjana rawat
 
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCall Girls in Nagpur High Profile
 
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
UNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and workingUNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and workingrknatarajan
 
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝soniya singh
 
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service NashikCall Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service NashikCall Girls in Nagpur High Profile
 
Extrusion Processes and Their Limitations
Extrusion Processes and Their LimitationsExtrusion Processes and Their Limitations
Extrusion Processes and Their Limitations120cr0395
 
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Serviceranjana rawat
 
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130Suhani Kapoor
 

Último (20)

Processing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxProcessing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptx
 
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
 
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxMicroscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptx
 
Roadmap to Membership of RICS - Pathways and Routes
Roadmap to Membership of RICS - Pathways and RoutesRoadmap to Membership of RICS - Pathways and Routes
Roadmap to Membership of RICS - Pathways and Routes
 
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )
 
(TARA) Talegaon Dabhade Call Girls Just Call 7001035870 [ Cash on Delivery ] ...
(TARA) Talegaon Dabhade Call Girls Just Call 7001035870 [ Cash on Delivery ] ...(TARA) Talegaon Dabhade Call Girls Just Call 7001035870 [ Cash on Delivery ] ...
(TARA) Talegaon Dabhade Call Girls Just Call 7001035870 [ Cash on Delivery ] ...
 
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINEMANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
 
UNIT-III FMM. DIMENSIONAL ANALYSIS
UNIT-III FMM.        DIMENSIONAL ANALYSISUNIT-III FMM.        DIMENSIONAL ANALYSIS
UNIT-III FMM. DIMENSIONAL ANALYSIS
 
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
 
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
 
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
 
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
 
UNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and workingUNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and working
 
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
 
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINEDJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
 
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
 
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service NashikCall Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
 
Extrusion Processes and Their Limitations
Extrusion Processes and Their LimitationsExtrusion Processes and Their Limitations
Extrusion Processes and Their Limitations
 
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
 
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
 

Reliable and Efficient Data Acquisition in Wireless Sensor Network

  • 1. 100 International Journal for Modern Trends in Science and Technology Volume: 2 | Issue: 09 | September 2016 | ISSN: 2455-3778IJMTST Reliable and Efficient Data Acquisition in Wireless Sensor Network Harshada Sonawane1 | Prof. Rachana Satao2 1Department of Computer Engineering Computer Network, Smt.Kashibai Navale College of Engineering, Pune, Maharashtra, India. 2Assistant Professor, Department of Computer Engineering Computer Network, Smt.Kashibai Navale College of Engineering, Pune, Maharashtra, India. The sensors in the WSN sense the surrounding, collects the data and transfers the data to the sink node. It has been observed that the sensor nodes are deactivated or damaged when exposed to certain radiations or due to energy problems. This damage leads to the temporary isolation of the nodes from the network which results in the formation of the holes. These holes are dynamic in nature and can grow and shrink depending upon the factors causing the damage to the sensor nodes. So a solution has been presented in the base paper where the dual mode i.e. Radio frequency and the Acoustic mode are considered so that the data can be transferred easily. Based on this a survey has been done where several factors are studied so that the performance of the system can be increased. KEYWORDS: Wireless Sensor Network, Sensor deployment, Energy hole problem. Copyright © 2016 International Journal for Modern Trends in Science and Technology All rights reserved. I. INTRODUCTION WSN is the collection of several nodes which transfers the data. There are several factors which affect the performance of the sensor nodes and may even damage them.As long as there is no damage to the sensor nodes, it continues to work in the radio frequency mode, when there occurs the node failure, the acoustic mode is activated. The data is then extracted and transferred further. The elimination of the faulty nodes from the system cannot be the solution since all the resources and the services associated with the sensor node can be used again when they are recovered. It also helps in increasing the lifetime of a network. Thus the working of the model in dual mode proves to be better, since we switch to the other sleeping nodes and transfer the data through them. Also the range of the node plays the equal important role while the data is transferred from one node to the other. The motivating factors related to this are increasing the lifetime of the Wireless sensor network using the fault tolerance and the fault node detection, also active cooperative communication has to be there amongst the nodes so that the change in the topology can be reflected immediately and data can be sent with minimum delay. The architecture diagram of the system shown below helps us to understand the system. II. LITERATURE SURVEY The paper presented by the Pushpendu Kar and Sudip Misra Jan 2016 provides us with the details of how the dual mode i.e. radio frequency and the acoustic mode can be implemented for the effective and efficient data transfer. Also emphasized on the data extraction process. Due to the proposed system the data can be sent more efficiently [1]. In the paper presented by Kealan McCusker, Noel E. O’Connor May/June 2011 a solution for ABSTRACT
  • 2. 101 International Journal for Modern Trends in Science and Technology Reliable and Efficient Data Acquisition in Wireless Sensor Network distributing symmetric keys and network access control in a WSN using IBC is proposed. The proposed scheme was evaluated against well-known attacks on a WSN and found to perform well. Several groups implement for Tate pairing in hardware but are targeting the latency metric and also Field Programmable Gate Arrays (FPGAs) rather than energy and an ASIC, therefore these contributions lack over the suggested theory which is several magnitudes higher than what is achieved by implementing the pairing in hardware, and too high for the limited energy available to a node. Work is needed in order to implement other components of the scheme such as the elliptic curve point multiplication and exponentiation in the field [2]. Cesare Alippi, Giuseppe Anastasi, Mario Di Francesco, and Manuel Roveri Feb 2011. In this paper authors proposed an adaptive sampling algorithm that estimates online the optimal samplingfrequencies for sensors. This approach, which requires the designof adaptive measurement systems, minimizes the energy consumptionof the sensors and, incidentally, that of the radio while maintaininga very high accuracy of collected data.It can perform similar to a fixed-rate scheme where the samplingfrequency is known in advance.This approach resultsin a corresponding energy saving of both the sensor and theradio.Conclusion strongly depends on the specific sensor, whosepower consumption is significantly larger than that of the radio [3]. Levente Buttya´ n, La´ szlo´ Czap, and Istva´n Vajda Nov/Dec 2011In a pollution attack, the adversary maliciously alters some of the stored encoded packets, which results in the incorrect decoding of a large part of the original data upon retrieval. Authors proposed algorithms to detect and recover from such attacks. This paper can be applied in any coding-based distributed storage systems, be it in the domain of P2P file distribution or in wireless sensor networks. In particular, this approach does not require the storage nodes to perform additional coding on or to add additional information to the encoded packets. Proposed algorithm is effective and extremely efficient both in terms of communication and computational overhead. It does not scale up to very large systems in terms of computational complexity [4]. Ing-Ray Chen, Anh Phan Speer, and Mohamed Eltoweissy March/April 2011 Authors developed adaptive fault-tolerant quality of service (QoS) control algorithms based on hop-by-hop data delivery utilizing “source” and “path” redundancy, with the goal to satisfy application QoS requirements while prolonging the lifetime of the sensor system. Algorithm which incorporates path and source redundancy mechanisms to satisfy query QoS requirements while maximizing the lifetime of query-based sensor networks. Future work: provide a more detailed analysis of the effect of network dynamics on MTTF, such as more energy may be consumed by some SNs over others or some SNs may fail earlier than others [5]. Masanori Miyazawa and Michiaki Hayashi Rolf Stadler2nd Jan, 2015 The paper proposes a distributed managementfunction, called virtualized network management function(vNMF), to detect failures related to virtualized services. vNMF detects the failures by monitoring physical-layer statistics that are processed with a self-organizing map algorithm. Memory leaks and network congestion failures can be successfully detected and that and the accuracy of failure detection can be significantly improved compared to common k-means clustering. The proposed vNMF is expected to facilitate scalable network management toward more complex network virtualization environments in the future work [6]. Steven S. McClure, L. D. Edmonds, R. Mihailovich, A. H. Johnston, P. Alonzo, J. DeNatale, Member, IEEE, J. Lehman, and C. Yui Dec 2002 A mechanism for dielectric charge trapping and its effect on the electrostatic force is proposed. Of notable significance is the susceptibility of GaAS MEMS devices to radiation effects, as found in this work. Such effects, if present, may be eliminated with proper design techniques, as demonstrated in the alternate RSC switch configuration. It is strongly recommended that devices of this type be thoroughly characterized for radiation effects prior to use in systems with a space or nuclear radiation environments. [7]. Erfan Soltanmohammadi, Mahdi Orooji, Mort Naraghi-Pour Jan 2013 The problem of decentralized detection in wireless sensor networks in the presence of one or more classes of misbehaving nodes. Binary hypothesis testing is considered where the honest nodes transmit their binary decisions to the fusion center (FC), while the misbehaving nodes transmit fictitious messages the problem of decentralized detection in wireless sensor networks in the presence of one or more classes of misbehaving nodes. Binary hypothesis testing is considered where the honest nodes transmit their binary decisions to the fusion center
  • 3. 102 International Journal for Modern Trends in Science and Technology Volume: 2 | Issue: 09 | September 2016 | ISSN: 2455-3778IJMTST (FC), while the misbehaving nodes transmit fictitious messages[8]. Tapas Kanungo, David M. Mount, Nathan S. Netanyahu, Christine D. Piatko, Ruth Silverman, and Angela Y. Wu July 2002 Proposed in 2 ways: First, authors present a data-sensitive analysis of the algorithm's running time, which shows that the algorithm runs faster as the separation between clusters increases. Second, a number of empirical studies both on synthetically generated data and on real data sets from applications in colour quantization, data compression, and image segmentation.A simple and efficient implementation of Lloyd's k-means clustering algorithm, which we call the filtering algorithm. The advantage of this algorithm is it requires a kd-tree as the only major data structure.This algorithm is quite complex and does not provide significantly faster running time in practice [9]. Vibha Paradkar, Gajendra Singh Chandel, Kailash Patidar,2015 proposes a new routing algorithm (Master/Slave) for discovery and recovery of the routing path efficiently. The primary path, secondary path and the segmentation process helps to navigate the data from the non-faulty nodes [10]. Also multipath routing helps transfer data simultaneously thus by reducing delay and congestion in the network [12]. Saad Ahmad Khan, Ladislau Bölöni, Damla Turgut, 2015 the paper proposes a theory where the bridge nodes are protected by giving some of the responsibilities of the sink nodes to the other nodes. It prevents the apparition of the additional bridge nodes. The disadvantage is that the algorithm sacrifices the length of some routes in order to distribute the routes away from the critical area [11]. Amit Sharma, Kshitij Shinghal, Neelam Srivastava, Raghuvir Singh, Mar 2011 in this work analysis of the energy consumption of a WSN node is analysed with proposed node. With the help of this the estimated lifetime of the battery can be increased significantly [14]. It is observed that sensors are used for forwarding data to sink directly so as to reduce energy consumption, packet loss and delay [13]. III. CONCLUSION Reliable and efficient WSN is the need of the today’s communication technology and has been able to capture the attention of several researchers. The dual mode working of the sensor nodes in the WSN has been able to reduce the delay. Also the lifetime is increased by not eliminating the nodes directly when then go in the isolation state. Energy of the node being one of the several important factors, has to be worked upon by monitoring and with the help of the knowledge acquired by the survey. It also motivates to consider the mobile nodes and not just the stationary nodes and we can improve the computational power by optimal sensor deployment in wireless sensor network. REFERENCES [1] Pushpendu Kar, Student Member, IEEE and Sudip Misra, Senior Member, IEEE, “Reliable and Efficient Data Acquisition in Wireless Sensor Networks in the Presence of Transfaulty Nodes,” IEEE TRANSACTIONS ON NETWORK AND SERVICE MANAGEMENT, 8th Jan, 2016. [2] Kealan McCusker, Noel E. O’Connor, “Low-energy symmetric key distribution in wireless sensor networks,” IEEE Transactions on Dependable and Secure Computing May/June 2011. [3] Cesare Alippi, Fellow, IEEE, Giuseppe Anastasi, Mario Di Francesco, and Manuel Roveri, “Adaptive Sampling Algorithm for Effective Energy Management in Wireless Sensor Networks With Energy-Hungry Sensors,” IEEE TRANSACTIONS ON INSTRUMENTATION AND MEASUREMENT, VOL. 59, NO. 2, FEBRUARY 2010. [4] Levente Buttya´ n, La´ szlo´ Czap, and Istva´n Vajda, “Detection and Recovery from Pollution Attacks in Coding-Based Distributed Storage Schemes,” IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, VOL. 8, NO. 6, NOVEMBER/DECEMBER 2011. [5] Ing-Ray Chen, Member, IEEE, Anh Phan Speer, and Mohamed Eltoweissy, Senior Member, IEEE, “Adaptive Fault-Tolerant QoS Control Algorithms for Maximizing System Lifetime of Query-Based Wireless Sensor Networks,” IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, VOL. 8, NO. 2, MARCH-APRIL 2011. [6] Masanori Miyazawa and Michiaki Hayashi Rolf Stadler, “vNMF: Distributed Fault Detection using Clustering Approach for Network Function Virtualization,” 2nd Jan, 2015. [7] Steven S. McClure, L. D. Edmonds, R. Mihailovich, A. H. Johnston, Fellow, IEEE, P. Alonzo, J. DeNatale, Member, IEEE, J. Lehman, and C. Yui, “Radiation Effects in Micro-Electromechanical Systems (MEMS): RF Relays,” IEEE TRANSACTIONS ON NUCLEAR SCIENCE, VOL. 49, NO. 6, DECEMBER 2002. [8] Erfan Soltanmohammadi, Student Member, IEEE, Mahdi Orooji, Student Member, IEEE, and Mort Naraghi-Pour, Member, IEEE, “Decentralized Hypothesis Testing in Wireless Sensor Networks in the Presence of Misbehaving Nodes,” IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, VOL. 8, NO. 1, Jan 2013.
  • 4. 103 International Journal for Modern Trends in Science and Technology Reliable and Efficient Data Acquisition in Wireless Sensor Network [9] Tapas Kanungo, Senior Member, IEEE, David M. Mount, Member, IEEE, Nathan S. Netanyahu, Member, IEEE, Christine D. Piatko, Ruth Silverman, and Angela Y. Wu, Senior Member, IEEE, “An Efficient k-Means Clustering Algorithm: Analysis and Implementation,” IEEE TRANSACTIONS ON PATTERN ANALYSIS AND MACHINE INTELLIGENCE, VOL. 24, NO. 7, JULY 2002. [10]Vibha Paradkar, Gajendra Singh Chandel, Kailash Patidar, “Fault Node Discovery and Efficient Route Repairing Algorithm for Wireless Sensor Network” (IJCSIT) International Journal of Computer Science and Information Technologies, Vol. 6 (2), 2015, 1710-1715. [11]Saad Ahmad Khan, Ladislau Bölöni, Damla Turgut, “Bridge protection algorithms – A technique for fault-tolerance in sensor networks” Ad Hoc Networks 24 (2015) 186–199. [12]Anasane, Aboli Arun, and Rachana Anil Satao. "A Survey on Various Multipath Routing Protocols in Wireless Sensor Networks." Procedia Computer Science 79 (2016): 610-615. [13]Kudale, Roma, and Rachana Satao. "STESA: Self Transmission Energy Saving Algorithm for road surveillance." 2013 Tenth International Conference on Wireless and Optical Communications Networks (WOCN). IEEE, 2013. [14]Amit Sharma, Kshitij Shinghal , Neelam Srivastava, Raghuvir Singh, “Energy management for wireless sensor network nodes” International Journal of Advances in Engineering & Technology, Vol. 1, Mar 2011.