Identification of Hole Using Packet Forwarding Process Based On Localized Node Movement
نویسندگان
چکیده
The wireless sensor network(WSN), is the monitoring of a specified region of interest(ROI).wireless sensor network is a collection of sensing devices that can communicated wirelessly in each device can sense,process,and talks to its peer.In the proposed system,each and every nodes sending request to the hole manager and those manager receive that all incoming messages based on node movement from one location to the another location.so,its used to reduces time for identifying the hole in network based on sending error messages using packet forwarding algorithm as well as the detection of hole where replaced into the proper nodes due to the movable nodes.based on that algorithm network finds the holes in entire network and remove the holes based on hole healing process.In the existing system,to address the problem of hole detection and hole healing.the distributed hole detection(DHD),is proposed to identify the boundary nodes and discover holes.second,we present a virtual forcesbased hole healing algorithm.but it only detect hole in network centre.although more than one DTN have same packet so DTN memory is wasted.
منابع مشابه
A New Intrusion Detection System to deal with Black Hole Attacks in Mobile Ad Hoc Networks
By extending wireless networks and because of their different nature, some attacks appear in these networks which did not exist in wired networks. Security is a serious challenge for actual implementation in wireless networks. Due to lack of the fixed infrastructure and also because of security holes in routing protocols in mobile ad hoc networks, these networks are not protected against attack...
متن کاملA Novel Algorithm for Self Localized Packet Forwarding in Wireless Sensor Networks
Wireless sensor networks (WSNs) consist of sensor nodes that onward the sensed data in form of packets within the deployed network. Efficient packet forwarding is a key constraint in sensor networks and many demanding tasks in the network, together with redundancy estimation and sensor node localization depend principally on packet forwarding. Location based forwarding schemes have recently evo...
متن کاملSecuring AODV routing protocol against the black hole attack using Firefly algorithm
Mobile ad hoc networks are networks composed of wireless devices to create a network with the ability for self-organization. These networks are designed as a new generation of computer networks to satisfy some specific requirements and with features different from wired networks. These networks have no fixed communication infrastructure and for communication with other nodes the intermediate no...
متن کاملNetwork Parameters Evaluation in Vehicular Ad-hoc Network (VANET) Routing Protocols for Efficient Message Delivery in City Environment
Abstract- Efficient message delivery in city environment is required to ensure driver’s safety and passenger’s comfortability. In cities of developed nations, routing of data in vehicular Ad hoc Network (VANET) faces many challenges such as radio obstacles, mobility constraints and uneven nodes distribution. These factors primarily makes communication between vehicles complex. To overcome and t...
متن کاملSecuring AODV Routing Protocol in MANET Based on Cryptographic Authentication Mechanism
In mobile ad hoc wireless network (MANET), secure communication is more challenging task due to its fundamental characteristics like infrastructure less, wireless link, distributed cooperation, dynamic topology, lack of association, resource constrained and physical vulnerability of node. In MANET, attacks can be broadly classified in two categories: routing attacks and data forwarding attacks....
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2014