International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
Open Access | Fully Refereed | Peer Reviewed

ISSN: 2319-7064

Downloads: 110

Survey Paper | Computer Science & Engineering | India | Volume 3 Issue 11, November 2014

To Enhance Lifetime of WSN Using Multi-Hop Routing and Trust-Based Intrusion Detection

Sanghavi Parkhi, Hemlata Dakhore

In this paper, we will propose redundancy management of heterogeneous wireless sensor networks (HWSNs), using multihop routing to answer user queries in the existence of unreliable and malicious nodes. The key concept behind of our redundancy management is to exploit the balancing between energy consumption vs. timeliness, and security to increase the system useful lifetime. We will use an algorithm for Redundancy Management for identifying the best redundancy level to apply to multihop routing for intrusion tolerance, to increase the query success probability and system lifetime. Then we will use a voting-based distributed intrusion detection algorithm to detect and evict malicious nodes in a HWSN. We will develop a new probability model to analyze the best redundancy level in terms of path redundancy and source redundancy, and also the best intrusion detection in terms of the number of voters under which the lifetime of a HWSN is increased. We will then apply the analysis results obtained to the design of a particular redundancy management algorithm to identify and apply the best design parameter settings at run time in response to environment changes, to increase the HWSN lifetime. A prototype implementation in the ns2click simulator will be used to demonstrate malicious attacks launched by intruder nodes.

Keywords: Wireless sensor networks, multi-hop routing, timeliness, security, energy conservation, Trust-Based Intrusion Detection

Edition: Volume 3 Issue 11, November 2014

Pages: 1292 - 1295

Share this Article

How to Cite this Article?

Sanghavi Parkhi, Hemlata Dakhore, "To Enhance Lifetime of WSN Using Multi-Hop Routing and Trust-Based Intrusion Detection", International Journal of Science and Research (IJSR), https://www.ijsr.net/search_index_results_paperid.php?id=OCT141145, Volume 3 Issue 11, November 2014, 1292 - 1295

Enter Your Email Address


Similar Articles with Keyword 'Wireless sensor networks'

Downloads: 155 | Weekly Hits: ⮙1 | Monthly Hits: ⮙2

Research Paper, Computer Science & Engineering, India, Volume 6 Issue 8, August 2017

Pages: 868 - 874

Study of Power Management in Adhoc Networks

Anandhi Giri, S. K. Srivatsa

Share this Article

Downloads: 1

Student Project, Computer Science & Engineering, India, Volume 10 Issue 5, May 2021

Pages: 475 - 485

Light Weight WSN Authentication Protocol Suite

Rahul K Drolia

Share this Article

Similar Articles with Keyword 'security'

Downloads: 1

Student Project, Computer Science & Engineering, India, Volume 10 Issue 5, May 2021

Pages: 475 - 485

Light Weight WSN Authentication Protocol Suite

Rahul K Drolia

Share this Article

Downloads: 1

Research Paper, Computer Science & Engineering, India, Volume 10 Issue 6, June 2021

Pages: 1240 - 1249

Secure Methods for Supplychain Management to Protect from Attacks in Blockchain

B. Ratnakanth, K. Venkata Ramana

Share this Article

Similar Articles with Keyword 'energy conservation'

Downloads: 111

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014

Pages: 679 - 682

Optimized Energy Conservation in WLAN Using Dynamic Sleep Scheduling

Ajesh. P. A, R. Gowthamani

Share this Article

Downloads: 113

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 268 - 271

Review on SME Routing Protocol for Asymmetric Wireless Network

Anuja H. Galphade, Dr. A. M. Dixit

Share this Article

Similar Articles with Keyword 'Wireless'

Downloads: 155 | Weekly Hits: ⮙1 | Monthly Hits: ⮙2

Research Paper, Computer Science & Engineering, India, Volume 6 Issue 8, August 2017

Pages: 868 - 874

Study of Power Management in Adhoc Networks

Anandhi Giri, S. K. Srivatsa

Share this Article

Downloads: 1

Student Project, Computer Science & Engineering, India, Volume 10 Issue 5, May 2021

Pages: 475 - 485

Light Weight WSN Authentication Protocol Suite

Rahul K Drolia

Share this Article

Similar Articles with Keyword 'sensor'

Downloads: 155 | Weekly Hits: ⮙1 | Monthly Hits: ⮙2

Research Paper, Computer Science & Engineering, India, Volume 6 Issue 8, August 2017

Pages: 868 - 874

Study of Power Management in Adhoc Networks

Anandhi Giri, S. K. Srivatsa

Share this Article

Downloads: 1

Student Project, Computer Science & Engineering, India, Volume 10 Issue 5, May 2021

Pages: 475 - 485

Light Weight WSN Authentication Protocol Suite

Rahul K Drolia

Share this Article

Similar Articles with Keyword 'networks'

Downloads: 155 | Weekly Hits: ⮙1 | Monthly Hits: ⮙2

Research Paper, Computer Science & Engineering, India, Volume 6 Issue 8, August 2017

Pages: 868 - 874

Study of Power Management in Adhoc Networks

Anandhi Giri, S. K. Srivatsa

Share this Article

Downloads: 0

Research Paper, Computer Science & Engineering, India, Volume 10 Issue 9, September 2021

Pages: 939 - 945

Load Balancing in Cloud Computing Using Optimization Algorithm

Manpreet Kaur, Dr. Amandeep Kaur

Share this Article

Similar Articles with Keyword 'multihop'

Downloads: 108

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014

Pages: 633 - 636

Performance Evaluation of AODV; DSR; TORA and OLSR in with Respect to End-to-End Delay

Kaushal Kishor, Parma Nand

Share this Article

Downloads: 115

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 3 Issue 7, July 2014

Pages: 707 - 711

Intrusion Secure Algorithm for AODV

Ekta, Nasib Singh Gill

Share this Article

Similar Articles with Keyword 'routing'

Downloads: 105 | Monthly Hits: ⮙1

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 5, May 2014

Pages: 1751 - 1754

Joining Delay; Packet Delivery and Limitations of EGMP

G. Anandhi, Dr. S. K. Srivatsa

Share this Article

Downloads: 1

Survey Paper, Computer Science & Engineering, India, Volume 10 Issue 5, May 2021

Pages: 991 - 996

Review on Various Data Gathering Techniques Using Artificial Intelligence

Varsha Kumari, Preeti Sondhi

Share this Article
Top