III. Problem Statement
This paper focuses on modeling and calculating trust between nodes in WSNs, based on sensed continuous data to address security issues and deal with malicious and misbehavior nodes and for assisting the decision-making process. A new trust model and a reputation system for WSNs can be proposed. The trust model establishes the continuous version of the reputation system applied to binary events and presents a new trust and reputation system for sensor Networks. This approach for mixing of second hand information from neighboring nodes with directly observed information to calculate trust between nodes in WSNs. Trust metrics can be used to evaluate the trust value of each node in the clusters. Behaviors are monitored by monitoring node (MN). Monitoring node selected at the next higher level of CH, this can also be changed dynamically along with CH. The main focus of this paper is to develop a fuzzy theory based trust and reputation model for WSNs environment. IV. System Model
A. Architecture
The architecture of our proposed system, consists of four major blocks namely,
i. Cluster Formation and CH selection ii. Information Gathering iii. Trust Evaluation and Propagation iv. Misbehavior Detection
The detailed description about the architecture is as follows.
Fig. 2. Overall Architecture of the Proposed System
Fig.2. shows the overall architecture of the proposed work. In wireless sensor networks, the sensor nodes are densely deployed in the
A WSN is a type of wireless networks that consists of collection sensor nodes which are tiny devices. Each sensor node of the network has different processing capability. It may contain multiple types of memory (program, data and flash memories), have a RF transceiver, have a power source (e.g., batteries and solar cells), and accommodate various sensors and actuators. The nodes communicate wirelessly and often self-organize after being deployed in an ad hoc fashion [13, 14]. Optimum need of each sensor node is to maximize its own utility function. Also the whole network requires resource assignments balance to perform in a useful and efficient way. This chapter presents a brief survey on WSNs showing its types, characterizing features, protocols and applications.
The mobile computing technology is an emerging technology, which consist of wireless sensor networks. The wireless sensor is the smallest unit of a network and some of the features supports large scale deployment, mobility, reliability and other applications. According to (Hoon-Jae, 2011), the main goals of WSNs are to deploy a number sensor devices over an unattended area and transmit to certain locations.
One application example of the proposed system is illustrated in Fig. 1 (b). In this scenario, multiple mobile sensors distributed over a geographical area need to transmit data to a remote destination node. Here
Wireless sensor networks are often referred to as self-adaptable or self-organizing and self-mending or self-healing networks. The self-organizing property of the network facilitates for a node to join the network without any intervention automatically. The nodes in a network can reconstruct their link organizations and can form an alternative paths whenever a node in that link fails or gets damaged. The implementation of these two properties are very precise to the network topology and the network characteristics like scalability, cost, performance and various other issues are decided by the implementation capability of the properties. The sensor nodes in the wireless sensor networks does not require any engineering and are easily deployable. The sensor nodes often with multi hop connections are responsible for
Threshold sensitive Energy Efficient sensor Network protocol (TEEN) [31] was the first protocol that was developed for reactive networks. In this protocol, at every cluster change time, in addition to the attributes, the cluster-head broadcasts to its members. It uses two thresholds namely hard and soft thresholds. The hard threshold is a threshold value for the sensed attribute, it is the absolute value of the attribute beyond which, the node senses this value must switch on its transmitter and report to its cluster head. The soft threshold is a minute change in the value of the sensed attribute that triggers the node to switch on its transmitter and transmit. The nodes sense their environment continuously. The first time a parameter from the attribute set reaches its hard threshold value, the node switches on its transmitter and sends the sensed data. The sensed value is stored in an internal variable in the node, known as the sensed value. The nodes will next transmit data in the current cluster period, only when both the following conditions are
The centralized approach is to recognize the most frequently used approach and to diagnose abnormal data readouts caused by a monitoring process, malfunctions of the components of the sensor node, or environmental events. In the centralized failure detection, each sensor node periodically collects its read and sends a packet on the radio to the central base node responsible for identifying faulty sensor nodes in WSN. In this concern, there are many research activities were reported. Gupta and Younis tried to provide a tolerant grouping mechanism to fail to provide the sensor by performing a sensor recovery in the runes in which the bridge has recovered. The mechanism is separated into two phases: 1) detection
In computer science, wireless sensor networks are an active research area with numerous workshops and conferences arranged each year.
Scalable and flexible architecture: In the sensor network the quantity of sensor nodes conveyed might be request of hundred, thousands or millions
A wireless sensor network (WSN) is a network consisting of spatially distributed autonomous sensors to monitor physical or environmental conditions, such as temperature, sound, vibration, pressure, humidity, motion or pollutants and to cooperatively pass their data through the network to a main location. The WSN is built of nodes from a few to several hundreds or even thousands, where each node is connected to one (or sometimes several) sensors. Each such sensor network node has typically several parts: a radio transceiver with an internal antenna or connection to an external antenna, a microcontroller, an electronic circuit for interfacing with the sensors and an energy source, usually a battery or an embedded form of energy harvesting [23].
The most essential building element in a WSN is routing. Routing is the collection of sensor nodes information which is used for updating and communication among sensor nodes. WSN should take into consideration two basic steps. First is, fault detection that detects the fault in a particular functionality and the second is, fault recovery that take care of a faulty system. There are two types of fault detection methods: self-diagnosis and the other one is cooperative diagnosis. If a sensor node can determine faults by itself, it can adopt the self-diagnosis method. If a node does not get an acknowledgement from a neighboring node within a fixed interval of time then the sensor node possibly will identify that there are some link
ABSTRACT: Wireless sensor networks is a self-configured network means any node can join it or leave it at any time. it is a self-healing and self-organizing. Self-healing networks allow nodes to reconfigure their link associations and find other pathways around powered-down nodes or failed nodes. Self-organizing allows a network automatically join new node without the need for manual interference. In this paper, we are using actor nodes to solve energy hole problem so that we can reduce energy consumption and can enhance throughput of network.
A sensor network has large number of sensor nodes, which are appropriately deployed or place either inside the experiment or very near to it. A sensor network is a network consisting of distributed wireless automatic devices using sensors to coordinately monitor physical or surrounding conditions, such as temperature, sound, stress/ pressure, movements or pollutants etc at different locations and time. The development of wireless sensor networks was originally motivated by military applications such as battlefield surveillance. The wireless sensor networks nowadays can be used in many more application areas, including environment and domain monitoring, medical applications, intelligent home systems, and traffic commanding.
When a sensor node has new data, it advertises it using the ADV messages to its neighbors. When a neighboring node receives this message, it checks whether it has already received or requested the advertised data. If not, it sends an REQ message back to the broadcast address requesting the data item. Upon receiving a REQ message, only the originating node sends the actual data to the requesting nodes. One advantage of this protocol is its simplicity and does not require any other topology information.
The collection of sensor nodes by enabling cooperation, coordination and collaboration among sensor nodes is formed Wireless Sensor Network (WSN); the WSN consists of multiple autonomous nodes with a base station.
Abstract— The ultimate aim of a wireless sensor network is to provide accurate and reliable information regarding the environment in which the sensors are deployed. Among the various applications of a sensor network, target tracking is the one of the key application of WSNs. In existing system To design a Face Track for detecting the movement of a target in polygon. Develop a brink detection algorithm used to reconstruct another conceptual polygon. Optimal node selection algorithm to select which sensor of spatial region to track data. All wireless sensors are activated and idle listening is a major source of energy waste. Once an active sensor runs out of energy, that sensors are not present in the network. So communication is not fully completed. We enhance the proposed algorithm Probability-Based Prediction and Sleep Scheduling (PPSS) to overcome this problem also it improve the power efficiency and increase the network life time.