Home > Computer science essays > Error Detection and Reconstruction in Wireless Sensor Networks

Essay: Error Detection and Reconstruction in Wireless Sensor Networks

Essay details and download:

  • Subject area(s): Computer science essays
  • Reading time: 14 minutes
  • Price: Free download
  • Published: 15 October 2019*
  • Last Modified: 22 July 2024
  • File format: Text
  • Words: 3,884 (approx)
  • Number of pages: 16 (approx)

Text preview of this essay:

This page of the essay has 3,884 words.

Abstract-Wireless Sensor Networks are a group of specialized autonomous sensors and actuators with a wireless communications infrastructure intended to monitor and control physical or environmental conditions at diverse locations and to cooperatively pass the data to a main location through the network. A Wireless Sensor Network consists of multiple nodes, ranging from a several hundred’s or thousand’s where each node is connected to one or more other nodes. Nodes may be designed for carrying out functions such as sensing, relaying data or exchanging data with an outside network. The concept of Wireless Sensor Network is to collect the data from a sensor node and then transmit to a sink node which is connected to satellite or internet network through which the collected data is finally received by an application. Sensor nodes do not have a fixed location and are randomly deployed to monitor a sensor field and they usually communicate with each other.

I. INTRODUCTION

Wireless sensor network is a fast growing and exciting research area that has attracted considerable research attention in the recent past. This has been fueled by the recent tremendous technological advances in the development of low-cost sensor devices equipped with wireless sensor networks interconnecting several hundred to a few thousand sensor nodes open up several technical challenges and immense application possibilities. [1] Wireless Sensor Networks can be applied in many applications such as structural protection, eco system management, urban carbon dioxide monitoring. In wireless sensor network a number of self-organized sensor nodes report the sensing data. In order to

understand the networks complex internal behaviors we design an effective way by reconstructing the routing path at sink side an important feature of wireless sensor network application is the capability for the easy installation of a massive number of wireless sensor nodes.

Wireless sensor networks have moved from the research domain into the real world with the commercial availability of sensors with networking capabilities [5]. Companies have emerged as suppliers of the necessary hardware and software building blocks.

Some of the key challenges deal with the scalability of network protocols to large number of nodes, design of simple and efficient protocols for different network operations, design of data handling techniques data querying, data mining, data fusion and data dissemination, localization techniques, time synchronization and development of exciting new applications that exploit the potential of wireless sensor networks [2]. Wireless sensor networks are a new class of distributed systems that are an integral part of the physical space they inhibit. Unlike most computers, which work on the data created by humans, the reason about the state of the world that embodies them are sensor networks.

The memory hierarchy continues to have a substantial effect on application performance. Two orthogonal methods are first a system called DTrack that decomposes the dynamic reference stream of that the diverse patterns of behavior in realistic applications are represented, we explore the benefits of program understanding along two orthogonal dimensions – data structures and program phase – and shows how such insights can be combined to yield a rich picture of application behavior [9].

The first implementation of traceroute used a clever application of Time Exceeded error messages, by sending a test message to a destination first with a Time to Live (TTL) value of 1, then 2, then 3, and soon on, [2] each router in the path between the source and destination would successively discard the test messages and send back a Time Exceeded message. Each router would then display the sequence of routers between the two hosts. This bit of trickery works good enough in general terms, but is suboptimal in a couple of respects. For example, it requires the source device to send one test message for each router in the path, instead of just a single test message. It also does not take into account the possibility that the path between two devices may or may not change while the test is being done by the system [8].

II. LITERATURE SURVEY

Routing is a topic that arises almost immediately in any network as soon as it is a large enough to require multiple hops – that is, if there is a pair of nodes that are not directly interconnected [3]. In sensor networks, as in the Internet, this is of course the case. However, there is an important difference in the routing used by sensor network. The Internet, and much of the earlier research in ad-hoc wireless networks, was focused on building the network as a transport mechanism- that is, a way to route packets to a particular endpoint. In a sensor network, efficiency demands that we do as much in-network processing (example data reduction) as possible. Instead of blindly routing packets to a far-away endpoint, many applications do processing at each hop inside the network- aggregating similar data, filtering redundant information, and other processes.

The growth of Internet is similar to that of cellular mobile networks. The idea for Mobile Internet is salready widely accepted by the Internet service providers and cellular operators. In order to design a cost effective wireless IP network, however, we need to create many small network domains that should be interconnected. The introduction of mobility to the Internet requires the creation of mechanisms to deal with handovers, location management (that is tracking the users within the network), and location-dependent bit errors (they are much higher in wireless than in wired networks). Over the past several years a number of IP micro mobility protocols have been proposed, such as multicast-based intra-handover management. On the other hand, IP offers robustness, scalability, and flexibility as well as transparency to different services. Their convergence is the way towards future wireless mobile networks.

In sensor network, nodes rely on batteries with limited capacity. Therefore, the most important criteria when designing communication protocols is to reduce the communication overhead to optimize their energy consumption and extend the life of sensor device. Consequently, we extend the connectivity and reliability of the underlying network. In this framework, localized routing protocols based on the geographic information of the sensors have been proposed as a viable alternative to existing routing protocols for wireless networks in order to reduce the overhead of maintain routing tables in the sensors and to avoid the cost  (energy consumption) of flooding and route discovery.

Some of the most powerful benefits of a distributed network are due to the integration of information gleaned from multiple sensors into a larger world-view not detectable by any single sensor alone. Sink is involve in more in the sink-to-sensor data transport on the reverse path [4]. Hence, the sink with plentiful energy and communication resources can broadcast the data with its powerful antenna. This helps to reduce the amount of traffic forwarded in the multi-hop wireless sensor network infrastructure and hence, helps sensor nodes conserve energy. Therefore, data flows in the reverse path may experience less congestion in contrast to the forward path, which is totally based on multi-hop communication. This calls for less aggressive congestion control mechanisms for the reverse path as compared to the forward path in the wireless sensor networks.

III. EXISTING SYSTEM

Wireless sensor multi-hop networks are defined by nodes communicating without using a fixed infrastructure. Each mobile host can communicate with other hosts within its range. However, due to limited communication ranges, sending a message from a source to a destination which are not within range of each other, often requires the collaboration of intermediate forwarding nodes.

In wireless sensor network there is a routing path through which files are transmitted and the transmission is managed using many measurement and diagnostic approaches also there are a large number of unattended sensor nodes [7]. The network manager is the one who is responsible for generating and routing path through which files are transmitted and also has the complete information of this path using which the nodes through which the packets are forwarded using which the path is constructed, initially the network manager gathers the efficient nodes then selects a path for transmission the per packet information is used for finding out the capacity of the node that is whether it carry the packet forward or not.

Every individual sensor can be very simple, capable only of measuring chemical concentration and thereby detecting whether or not it is within the region [4]. However, by gathering the data from all sensors, ‘combined with knowledge about the sensors’ positions, the complete network can describe more than just a set of locations covered by the region it can also compute the region size, shape, speed and so forth.

In sensor networks, nodes rely on batteries with limited capacity. Therefore, the most important criteria when designing communication protocols is to reduce the communication overhead to optimize their energy consumption and extend the life of the sensor device. Consequently, we extend the connectivity and reliability of the underlying network. In this framework, localized routing protocols based on geographic information of the sensors have been proposed as a viable alternative to existing routing protocols for wireless networks in order to reduce the overhead of maintain routing tables in the sensors and to avoid the cost of flooding and route discovery.

IV. PROPOSED SYSTEM

One of the major challenging issue in sensor networks is that nodes rely on batteries with limited capacity. Hence, in order to extend the life span of the sensors and the reliability of the network, an efficient routing algorithm can reduce/optimize energy consumption by reducing routing overhead while maintaining a high delivery rate. Moreover, a good routing method should compute a routing path that is as close as possible to shortest path. We propose iPath, a localized energy efficient greedy routing scheme. To minimize the gap between the shortest path and the computed path, iPath computes its routing path by locally selecting the next hop node based on its orthogonal distance to the direction of the source/destination pair. Moreover, in its routing decision, iPath is biased towards its neighbors in the forward direction towards destination. We compare iPath to several routing protocols. We represent, through simulation, that our respective protocol improves significant energy consumption and achieves a high percentage of successful routings.

iPath is used for reconstruction paths depending on the issues occurred in the selected path, it also has higher reconstruction ratios and if there is a disturbance in between then the packet is retransmitted back to the initial node, the packet forwarding starts from the source and then iteratively the longer paths are generated from the shorter ones during this process the hash function records the data packet hash values during transmission and these are evaluated, the recorded hash values are compared with the calculated hash values in order to known whether the file is transmitted successfully or not if not then the path is reconstructed. iPath supports the addition of nodes in the path, verification is done during packet forwarding for improving the execution efficiency and the performance of the path during reconstruction we use bootstrapping algorithm.

On the other hand, sink is involved more in the sink-to server data transport on the reverse path. Hence, the sink with plentiful energy and communication resources can broadcast the data with its powerful antenna. This helps to reduce the amount of traffic forwarded in the multi-hop wireless sensor network infrastructure and hence, helps sensor nodes conserve energy. Therefore, data flows in the reverse path may experience less congestion in contrast to the forward path, which is totally based on multi-hop communication. This calls for less aggressive congestion control mechanisms for the reverse path as compared to the forward path in the wireless sensor networks.

The multi-hop and one-to-many nature of data flows in the reverse path of the wireless sensor networks prompt a review of reliable multicast solutions proposed in other wired/wireless networks. There exist many such schemes that address the reliable transport and congestion control for the case of single sender and multiple receivers. Although the communication structure of the reverse path, that is from sink to source, is an example of multicast schemes, these do not stand as directly applicable solutions rather, they need significant modifications/improvements to address the unique requirements of the wireless sensor network.

iPath a localized, greedy routing protocol shows through simulation that protocol improves significant energy consumption and achieves high percentage of successful routings in arbitrary network topology, it is the move based on the plain iPath routing algorithm it assumes that the traffic sent from the source to the destination is high and a computed path will be highly utilized for a long time. Therefore, the optimal path computed is on a straight line connecting the source to destination. iPath on the move further aligns nodes on the straight line in order to reduce the overall path length and consequently the overall routing energy is consumed.

V. IMPLEMENTATION

SOURCE

The sender browses the file requested by the receiver; initially he enters the file name and then send it to the iPath router and before sending the file is encrypted in order to maintain privacy.

iPath ROUTER

The router receives the file which is transmitted by the sender if the packet size is greater than then BW then there is possibility of occurrence of congestion and then path inference takes place so as to find an alternative path and it takes another node to reach the destination, then load balancing takes place and when congestion occurs node band width can be increased.

RECEIVER

The file is transmitted to destination that is receiver then we calculate the time delay during the transmission of the file from source to destination the file details are stored by the receiver. s

VI. BOOTSTRAPPING ALGORITHM

In the starting all the nodes go through bootstrapping process, where the BS floods a Hop-packet which comprises of a counter specifying the hop value. Then the counter is set to one during the starting stage. After receiving the packet, a sensor node stores the counter value, increments it by one and transmits it to their neighbor sensor nodes. This transmission will continue until all the sensor nodes are aware of their hop values for their use in data routing phase. As the communication is through the wireless link, the sensor node which have already transmitted their packet, will also receive packets from its neighbor sensor nodes. Therefore, after receiving the packet a sensor node will check the counter value with its own stored one. In case the counter value received is less compared to the stored value, then only the sensor node increments the counter value, restores and retransmits it; otherwise it will ignore the received packets. This will help to avoid the redundant transmission and loop creation. After fixed time out, the nodes set their hop value as final.

The iterative boosting algorithm

Input: An initial set of packets Pinit whose paths have been reconstructed and a set of others packets Px Output: The routing paths of packets.

1: ITERATIVE-BOOSTING

2: Pn   Pinit

3: while Pn not equal to { } do

4: Pnn   { }

5: for each packet K in Pn do

6: for each packet i in Px do

7: red = RECOVER (k , i )

8: if res = True then

9: Pnn  Pnn U i

10: Px  Px – i

11: Pn  Pnn

12: procedure RECOVER (K, i)

13: if len (i) – len (K)! = {1, 2} then

14: return False

15: if len (i) – len (K) ==2

16: if hash(o(i),p(i),path(K)) == h(i) then

17: path (i)  (o (i), p (i), path (K)) //Case2

18: return true

19: return False

20: if len (i) – len (K) == 1then

21: if hash (o (i), path (K)) == h (i)

22: hash (i)  (o (i), path (K)) //Case1

23: return true

24: if hash(o(i),p(i),path(K) – o(k)) == h(i) then

25: path (i)  (o (i), p (i), path (K) – o (K)) //Case3

26: return true

27: return False

Fig: Example to illustrate three cases of reconstructing long paths based on short paths in the iterative boosting algorithm. X, Y, etc., are nodes, and x1, y1, etc., are packets originated from different nodes.

There are two procedures, the Iterative-Boosting procedure (line 1) and the Recover procedure (line 12). The

Iterative-Boosting procedure includes the main logic of the algorithm that tries to reconstruct as many as possible packets iteratively. The input is an initial set of packets whose paths have been reconstructed and a set of other packets. During every iteration, a set of newly reconstructed packet paths, the algorithm tries to use each packet to reconstruct each packet’s path in (lines 5 10). The procedure ends when no new paths can be reconstructed (line 3).

The Recover procedure tries to reconstruct a long path with the help of a short path. Depending on the high path similarity observation, the below cases shoe how to reconstruct a long path.

PSP-Hashing

As mentioned in the iterative boosting algorithm, the PSP-Hashing

(i.e., path similarity preserving) plays a key role to make the sink be able to verify whether a short path is similar with another long path.

Key management is a challenging issue in WSNs due to the sensor node’s resource constraints. Various key management schemes in WSNs are still based on symmetric key techniques. The key sharing models for WSNs are used to compare the different relationships between the security and operation requirements for WSNs: accessibility, flexibility and scalability [9].

Like security, key management in WSNs is comprised of a cross-layered design, which can go from the link layer to application layer. An application link layer standard in a WSN, considers a key usage for secure data transmission, but it does not specify how to securely exchange keys. This opens the door to the key management problems that has been the focus of recent research. We sum up the benefits and problems for the three models-networking keying, pairwise keying and group keying.

VII. CONCLUSION

In this system we transmit the file using packet forwarding from a source to destination by preventing the occurrence of disturbance. We overcome the time delays by path reconstruction using bootstrapping algorithm which increases the efficiency and performance of the routing path. Verification is done in order to identify the disturbances occurring during file transmission. Also the routing path has higher reconstruction ratio which in turn helps us to transmit the file within a short span of time.

Recent advances in miniaturization and low-cost, low-power electronics have led to active research in large-scale netwroks of small, wireless, low-power sensors actuators. Sensor networks can open the eyes of a new generation of scientists to phenomena never before observable, paving the way to new eras of understanding in natural sciences.

iPath is a novel path inference approach for reconstructing the routing path for each received packet, it also exploits the path similarity and uses the iterative boosting algorithm to reconstruct the routing path effectively [10]. Further, the fast bootstrapping algorithm gives an initial set of paths for the iterative algorithm. Then we formally analyze the performance of the reconstructed iPath as well as two related approaches. Based on the analysis results we can say that iPath achieves higher reconstruction ratio when the network setting varies. We also implement iPath and evaluate its performance by a trace-driven study and extensive simulations. When we compare the states of the art to iPath then iPath only achieves much higher reconstruction ratio under different network settings.

VIII. EXPERIMENTAL RESULT

The file transmission takes place from sender to receiver when the receiver request for a file which he needs and it is sent by the sender, here we consider the sender as source and receiver as the destination. Initially whenever we want to send a file we must first check whether we have the desired file which is requested by the user or not then we must also check the attackers to maintain data confidentiality also check whether the desired user is blocked or not if the user is blocked then we cannot send the file hence, we need check before hand and unblock the user then we need to open the four popups which are source, receiver, iPath reconstructor, and WSN server then we need to check whether energy values(it is the capability of the node which specifies how much amount of data can be transmitted through that node) are specified for the all the nodes present in the reconstructor if not then we must specify or assign the energy values then go-to the source window and browse the required file which gets uploaded to the window only if we specify the IP address of the system which may be either an online or offline IP address, to know the IP address of the system type ipconfig in the command prompt. Then we get a popup message which says the file is uploaded successfully. In the iPath reconstructor window we can observe how the file transmission takes place from node to node, if any problem occurs in between then the path is reconstructed from the previous node to the destination by selecting new nodes. The details about the time delay and the efficiency of the file transmission can be known from the results window which are displayed in the form of graphs. To know whether the file is successfully transmitted or not we check for the status in the server window if the file is transferred then the time of transmission is mentioned, then type the username, filename and the secret key in the receiver window then press the request button where we need to enter the IP address so as to obtain the required file then the requested file is downloaded.

The above figure shows the source from where we send the files to the destination or receiver by passing it to the iPath reconstructor.

The above figure represents the destination or receiver to which receives the file sent by the source and it requests the source for the file it requires.

The above shows how the file is being transmitted from the source to destination through server it also shows the path through which the file is being sent.

The figure clearly shows the transmission of file through the path and also the path reconstruction whenever any disturbance occurs near the node the path is reconstructed.

References

1. Wireless Sensor Networks edited by C.S. Raghavendra, Krishna M. Sivalingam, Taieb Znati

2. Wireless Sensor Networks: Signal Processing and Communications Perspectives edited by Ananthram Swami, Qing Zhao, Yao-Win Hong, Lang Tong

3. Wireless Sensor Networks and Ecological Monitoring edited by Subhas C. Mukhopadhyay, Joe-Air Jiang

4. Wireless Sensor Networks: Principles, Design and Applications By Shuang-Hua Yang

5. Y. Gao et al., “iPath: Path inference in wireless sensor networks,”

Tech. Rep., 2014 [Online]. Available: http://www.emnets.org/pub/

Gaoyi/tech-ipath.pdf

6. https://www.deepdyve.com/lp/institute-of-electrical-and-electronics-engineers/ipath-path-inference-in-wireless-sensor-networks-ydcBriDhpH

7. Wireless Sensor Networks and Energy Efficiency: Protocols, Routing and Management edited by Zaman, Noor

8. Fundamentals of Wireless Sensor Networks: Theory and Practice

By Waltenegus Dargie, Christian Poellabauer

9. Wireless Sensor Networks and Applications edited by Yingshu Li, My T. Thai

10. Protocols and Architectures for Wireless Sensor Networks

By Holger Karl, Andreas Willig

11. Communication Security in Wireless Sensor Networks Kui Ren, Wenjing Lou

12. Energy Optimization in Wireless Sensor Networks: A Study of Power Consumption and Energy Optimization Mu-Huan Chiang

13. Wireless Sensor Networks Compute Science, Technology and Applications Liam I. Farrugia

14. Wireless Sensor Networks: An Information Processing Approach Electronics & Electrical Morgan Kaufmann series in networking Authors Feng Zhao, Leonidas J. Guibas

15. Wireless Sensor Networks: An Information Processing Approach Electronics & Electrical Morgan Kaufmann series in networking Authors Feng Zhao, Leonidas J. Guibas

 

About this essay:

If you use part of this page in your own work, you need to provide a citation, as follows:

Essay Sauce, Error Detection and Reconstruction in Wireless Sensor Networks. Available from:<https://www.essaysauce.com/computer-science-essays/2017-10-21-1508606207/> [Accessed 10-04-26].

These Computer science essays have been submitted to us by students in order to help you with your studies.

* This essay may have been previously published on EssaySauce.com and/or Essay.uk.com at an earlier date than indicated.