In wireless sensor network, there are many hurdles takes place in providing quality of service routing to a desired level. The majority of routing protocols in wireless sensor networks concentrates only on energy efficiency as a prime factor, and only very few approaches focus on Quality of Service (QoS). Even few protocols provides QoS routing takes traditional parameters like bandwidth, delay and jitter . This proposed protocol provides an approach in a different way such that QoS routing can be a blend of some modern metrics. A novel protocol named Coverage Preserving Routing (CPR), has been designed which provides a complete and effective coverage of the network with minimum active nodes for a expected lifetime. This coverage based routing protocol consists of three phases namely cluster head selection , node self-scheduling and optimal routing. Cluster head selection phase preserves the coverage area of the network using a coverage preserving cluster head selection algorithm. This algorithm finds the node with minimum sensitivity area in a cluster has been elected as cluster head for every round. Node self-scheduling phase takes care of off-duty eligibility nodes of a round and performs a coordinated sleeping among nodes. Optimal routing phase has been developed based on multi path routing algorithm and it finds multiple shortest paths and performs each round of routing depends upon the energy levels of the nodes. Simulation results shows that the protocol provides a better coverage of the network. The lifetime is assured due to coordinative sleeping and multi path routing to some extent.
With the use of smart sensor technology, any electronics devices or appliances can be designed to connect to internet.Most of the people thinks that life can be even better with new advancement in modern technology like IoT. Applying security in Internet of Things environments has been identified as one of the top hurdles for realizing the vision of smart, energy-efficient homes.The nature of smart homes unavoidably raises security and privacy concerns. As all the smart home appliances, industrial machinery, public sector services and many other devices all are connected to the Internet, a lot of information is available on it. This information is prone to attack by hackers.In this paper, we present a SURVEY of the privacy issues directed towards the smart home devices.Copy Right, IJAR, 2018,. All rights reserved. …………………………………………………………………………………………………….... Introduction:- Internet of ThingsThe internet of things (IoT) has been described as the infrastructure of the information society. All these "things" connect to the Internet via Wi-Fi and then "talk" to each other.It is the modern world network of device such as home appliances, vehicles, and other physical devices. These devices are interconnected over the network provided.They are embedded with required software, actuators, sensors, and network connectivity. Each of these devices are uniquely identified over the network and exchange data.IoT is an advanced automation and analytic system which exploits networking, sensing, big data, and artificial intelligence technology to deliver complete systems for a product or service. These systems allow greater transparency, control, and performance when applied to any industry or system.IoT systems have applications across industries through their unique flexibility and ability to be suitable in any environment. They enhance data collection, automation, operations, and much more through smart devices and powerful enabling technology.Traditionally, the ingredients necessary for IoT are sensors, Wi-Fi, and a control panel, which in the simplest of cases can be a smart phones or PC. The sensors pick up the information, the Wi-Fi transfers this information to a repository, while the control panel can respond when the data flag problems, either fixing them automatically, or the problems can be fixed manually.
Wireless sensor networks (WSN) have lot of interest in research due to their wide range of typical application areas such as environmental, military and commercial enterprises. Sensor network possesses unique challenges to protocol builders, because these tiny wireless devices are often deployed in unattended environment with limited capabilities. Hence these networks are vulnerable to different types of malicious attacks. This paper surveyed the different types of attacks and security related issues in WSN. Moreover an analysis about some of the security protocols in two major domains namely, cryptography based protocols and en-route filtering schemes have been done.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.
customersupport@researchsolutions.com
10624 S. Eastern Ave., Ste. A-614
Henderson, NV 89052, USA
This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.
Copyright © 2024 scite LLC. All rights reserved.
Made with 💙 for researchers
Part of the Research Solutions Family.