Design and Development of Resource Allocation and Secured Routing Protocols for Wireless Sensor Network
Loading...
Date
item.page.authors
Journal Title
Journal ISSN
Volume Title
Publisher
Abstract
Wireless Sensor Networks (WSNs) have attained international attraction in recent years due to the
newlineadvancements in communication, electronics, and information technologies. Due to these advancements, there
newlinearose a need to understand the quickly changing physical events in the sensor nodes, which led to the
newlinedevelopment of advanced recognition systems. The nodes of the sensor process and monitor data before
newlinesending it to the sink via the Radio Frequency (RF) channel. These sensors can be deployed in any
newlinechallenging area due to their compactness. This aspect creates attention towards the usage of WSN in
newlineobserving and tracing data in remote applications. The WSNs play an important role in applications,
newlineconnected with areas where human involvement is relatively harmful. As mentioned by many researchers, the
newlineimportant characteristics of the WSNs are resources. Some of the resources are energy, bandwidth,
newlinethroughput, packet delivery ratio and delay. These resources are typically required to meet the definite
newlineQuality-of-Service (QOS) standards. The improvement in the QOS is achieved by increasing the parameters
newlinesuch as energy, bandwidth, throughput, packet delivery ratio , with decreasing the delay parameter. There are
newlinemany methods to improve these parameters such as Priority based MAC (PRIMA) and Priority in node
newline(PRIN). Considering these methods to improve the above parameters, we have proposed an innovative method
newlinecalled Priority based on Residual Power and Energy Harvesting rate (P-RPEH). P-RPEH is implemented in
newlineour work and is further discussed in subsequent paragraphs.
newlineAs great importance is given to the allocation of resources, equal importance is also given to the
newlineadaptation of resources and security. In this regard, the data acquired is communicated via a wireless radio
newlineconnection between the nodes. During communication, the nodes may be exposed to several malicious
newlineattacks. One such attack is called Black Hole Attack. A sensor node exposed to this attack, modifies the
newlinepacket it receives and