Professional Documents
Culture Documents
Final Thesis
Final Thesis
Final Thesis
INTRODUCTION
1.1 Overview :
Wireless sensor networks consist of individual nodes that are able to interact with the
environment by sensing or controlling physical parameters. These nodes have to
collaborate to fulfill their tasks. The nodes are interlinked together and by using
wireless links each node is able to communicate and collaborate with each other [1].
1|Page
1.2.1 Sensor nodes:
Sensor nodes are the network components that will be sensing and delivering the data.
Depending on the routing algorithms used, sensor nodes will initiate transmission
according to measures and/or a query originated from the Task Manager. According
to the system application requirements, nodes may do some computations [2]. After
computations, it can pass its data to its neighboring nodes or simply pass the data as it
is to the Task Manager. The sensor node can act as a source or sink/actuator in the
sensor field. The definition of a source is to sense and deliver the desired information.
Hence, a source reports the state of the environment. On the other hand, a
sink/actuator is a node that is interested in some information a sensor in the network
might be able to deliver. [2]
1.2.2 Gateways:
Gateways allow the scientists/system managers to interface Motes to personal
computers (PCs), personal digital assistants (PDAs), Internet and existing networks
2|Page
and protocols. In a nutshell, gateways act as a proxy for the sensor network on the
Internet. According to [2], gateways can be classified as active, passive, and hybrid.
Active gateway allows the sensor nodes to actively send its data to the gateway
server. Passive gateway operates by sending a request to sensor nodes. Hybrid
gateway combines capabilities of the active and passive gateways.
3|Page
data and sensing/actuation of data. A basic sensor node typically comprises of five
main components and they are namely controller, memory, sensors and actuators,
communication device and power supply (see Figure 1.2). A controller is to process
all the relevant data, capable of executing arbitrary code. Memory is used to store
programs and intermediate data. Sensors and actuators are the actual interface to the
physical world. These devices observe or control physical parameters of the
environment. The communication device sends and receives information over a
wireless channel. And finally, the power supply is necessary to provide energy. In
wireless sensor networks, power consumption efficiency is one of the most important
design considerations. Therefore, these intertwined components have to operate and
balance the trade-offs between as small energy consumption as possible and also the
need to fulfill their tasks.
1.3.2.1 Controller:
Microcontrollers used in several wireless sensor node prototypes are Atmel processor
and Intel Armstrong processors, etc. In this project, we have consolidated a list of
sensor nodes in the literature. It is noted that mica 2 mote and mica Z mote, and mica
2 dot motes are appropriate nodes suitable for large area wetland monitoring
application because of its characteristics. These three motes operation range can out
reached up to 500 feet (152 m), and has the lifetime up to 7 years.
4|Page
1.3.2.2 Communication Device:
Communication device is used to exchange data between individual nodes. The
communication medium between the two nodes is through radio frequencies (wireless
medium). Radio frequency-based communication fits the requirements of most
wireless sensor applications because it provides relatively long range and high data
rates, acceptable error rates at reasonable energy expenditure, and does not require
line of sight between sender and receiver. The 915 MHz and 2.4 GHz industrial,
scientific and medical (ISM) band has been widely suggested for sensor networks [8].
For actual communication, both a transmitter and a receiver are required in a sensor
node. The essential task is to convert a bit stream coming from a microcontroller (or a
sequence of bytes or frames) and convert them to and from radio waves. As half
duplex operation is recommended in wireless sensor network [8], a transceiver is
generally used. In the transceiver, circuitry includes modulation, demodulation,
amplifiers, filters, mixers. The table below summarizes the frequency bands,
modulation and data parameters that could be used in the communication medium.
The transceiver must provide an interface that allows the medium access control
(MAC) layer to initiate frame transmissions and to hand over the packet from the
main memory of the sensor node into the transceiver (or a byte or a bit stream, with
additional processing required on the micro controller). In other direction, incoming
packets must be streamed into buffers accessible by MAC protocol.
5|Page
1.4.1.1 Battery-Powered Sensor Nodes:
Sensor nodes are mostly powered by battery and are deployed in an environment
where it is very difficult to change or recharge the batteries.
1.4.1.2 Self-Configurable:
Sensor nodes are usually randomly deployed and autonomously configure themselves
into a communication network.
6|Page
sensor networks, traditional solutions must be adapted to efficiently execute on sensor
networks. [10]
7|Page
Security mechanisms must be scalableto very large networks while maintaining high
computationand communication efficiency.
1.5.6.2 Conflicts :
Even if the channel is reliable, the communication may still be unreliable. This
is due to the broadcast nature of the wireless sensor network.
1.5.6.3 Latency:
The multi-hop routing, network congestion and node processing can lead to
greater latency in the network, thus making it difficult to achieve
synchronization among sensor nodes.
8|Page
Managed Remotely:Remote management of a sensor network makes it virtually
impossible to detect physical tampering and physical maintenance issues.
9|Page
even the nodes those are considerably far from the base stations. The black hole attack
is one of the simplest routing attacks in WSNs. In a black hole attack, the attacker
swallows (i.e. receives but does not forward) all the messages he receives, just as a
black hole absorbing everything passing by. By refusing to forward any message he
receives, the attacker will affect all the traffic flowing through it. Hence, the
throughput of a subset of nodes, especially the neighboring nodes around the attacker
and with traffic through it, is dramatically decreased. Different locations of the
attacker induce different influences on the network. If the attacker is located close to
the base station, all the traffic going to the base station might need to go through the
attacker. Obviously, black hole attacks in this case can break the communication
between the base station and the rest of the WSN, and effectively prevent the WSN
from serving its purposes. In contrast, if a black hole attacking node is at the edge of
the WSN, probably very few sensors need it to communicate with others. Therefore,
the harm can be very limited.
10 | P a g e
within a WSN. The sensors are thus persuaded that the adversary is their neighbor.
As a consequence, while sending the information to the base station, the victim nodes
try to go through the attacker as they know that it is their neighbor and are ultimately
spoofed by the attacker.
2. To have a large amount of compromised nodes, the adversary does not need
to compromise a high number of nodes. Indeed, once a single node has been
11 | P a g e
captured and compromised, the main cost of the attack has been sustained.
Making further clones of the same node can be considered cheap.
1.8 SECURITY:
Security is an important aspect of a WSN operation. Many types of attacks on WSNs
12 | P a g e
have been devised and many countermeasures are proposed.
1.8.1 Security Requirements:
The goal of security services in WSNs is to protect the information and resources
from attacks and mis-behaviour. The security requirements in WSNs include:
Availability
which ensures that the desired network services are available even in the presence of
denial-ofservice attacks.
Authorization
which ensures that only authorized sensors can be involved in providing information
to network services.
Authentication,which ensures that the communication from one node to another node
is genuine, that is, a malicious node cannot masquerade as a trusted network node.
Integrity,which ensures that a message sent from one node to another is not modified
by malicious intermediate nodes.
13 | P a g e
as collision rate R; (number of collisions observed by a node per second), average
waiting time Tw (waiting time of a packet in MAC buffer before transmission), and
RTS arrival rate (RRTS) (number of RTS packets received successfully by a node
every second)[22-23].
Data Confidentiality:
Confidentiality is the ability to conceal messages froma passive attacker so that any
message communicated viathe sensor network remains confidential. This is the most
important issue in network security. A sensor node shouldnot reveal its data to the
neighbors.
Data Authentication:
Authentication ensures the reliability of the message by identifying its origin. Attacks
in sensor networks do notjust involve the alteration of packets; adversaries can also
inject additional false packets [57]. Data authenticationverifies the identity of the
senders and receivers. Data authentication is achieved through symmetric or
asymmetric mechanisms where sending and receiving nodes share secret keys. Due to
the wireless nature of themedia and the unattended nature of sensor networks, it
isextremely challenging to ensure authentication.
Data Integrity:
Data integrity in sensor networks is needed to ensurethe reliability of the data and
14 | P a g e
refers to the ability toconfirm that a message has not been tampered with, altered or
changed. Even if the network has confidentialitymeasures, there is still a possibility
that the data integrityhas been compromised by alterations.
The integrity of thenetwork will be in trouble when:
A malicious node present in the network injectsfalse data.
Unstable conditions due to wireless channel causedamage or loss of data.[55]
Data Availability:
Availability determines whether a node has the ability to use the resources and
whether the network is available forthe messages to communicate. However, failure
of the base station or cluster leader’s availability will eventuallythreaten the entire
sensor network. Thus availability is ofprimary importance for maintaining an
operational network.
Data Freshness:
Even if confidentiality and data integrity are assured, there is a need to ensure the
freshness of each message.Informally, data freshness [55] suggests that the data is
recent, and it ensures that no old messages have beenreplayed. To solve this problem
a nonce, or another time related counter, can be added into the packet to ensure
datafreshness.
Self-Organization:
A wireless sensor network is a typically an ad hoc network, which requires every
sensor node be independentand flexible enough to be self-organizing and self-healing
according to different situations. There is no fixedinfrastructure available for the
purpose of network management in a sensor network. This inherent featurebrings a
great challenge to wireless sensor network security. If self-organization is lacking in a
sensor network, the damage resulting from an attack or even the riskyenvironment
may be devastating.
15 | P a g e
Time Synchronization:
Most sensor network applications rely on some form oftime synchronization.
Furthermore, sensors may wish tocompute the end-to-end delay of a packet as it
travelsbetween two pairwise sensors. A more collaborativesensor network may
require group synchronization [55] for tracking applications.
Secure Localization:
Often, the utility of a sensor network will rely on its ability to accurately and
automatically locate each sensorin the network. A sensor network designed to locate
faults will need accurate location information in order topinpoint the location of a
fault. Unfortunately, an attacker can easily manipulate non secured location
information by reporting false signal strengths, replaying signals.
CHAPTER: 2
LITERATURE SURVEY
16 | P a g e
RishavDubey, Vikram Jain, Rohit Singh Thakur, SiddharthDuttChoubey in
(2012) proposed “Attacks in Wireless Sensor Networks”.[24]
Rajkumar, Sunitha K.R and Dr. H.G Chandrakanth (2012) surveyed on“A
Survey on Security Attacks in Wireless Sensor Network”.[25]
A wireless sensor network (WSN) has important applications such as remote
environmental monitoring and target tracking. This has been enabled by the
availability, particularly inrecent years, of sensors that are smaller, cheaper, and
intelligent. These sensors are equipped with wireless interfaces with which they can
communicate with one another to form a network. In this paper we deal with the
security of the wireless sensor networks. Staring with a brief overview of the sensor
networks, and discusses the current state of the security attacks in WSNs. Various
types of attacks are discussed and their countermeasures presented. A brief discussion
on the future direction of research in WSN security is also included.
17 | P a g e
communication. The variety of defense approaches against selective forwarding attack
is overwhelming. In this research they had described all the existing defensive
schemes according to our best knowledge against this attack along with their
drawbacks, thus providing researchers a better understanding of the attack and current
solution space. Also classifies proposed schemes according to their nature and
defense. Nature of scheme classifies into Distributed and Centralized. Defense of
scheme classifies into detection and prevention.
18 | P a g e
self-collision detection computation time significantly, because of the pattern
recognition capability of the neural network. However, the accuracy of back
propagation neural network based self-collision detection cannot be guaranteed 100%.
For this reason, the system is also designed to detect potential miss detected motion
sets though the module based self-collision detection method, which eliminates
unnecessary motion pairs by focusing on certain modules with higher collision
probability. This module based self-collision detection method is a failsafe method.
Kalpana Sharma, M K Ghose (2010) worked on “Wireless Sensor Networks: An
Overview on its Security Threats”. [29]Wireless sensor networks have become a
growing area of research and development due to the tremendous number of
applications that can greatly benefit from such systems and has lead to the
development of tiny, cheap, disposable and self-contained battery powered computers,
known as sensor nodes or “motes”, which can accept input from an attached sensor,
process this input data and transmit the results wirelessly to the transit network.
Despite making such sensor networks possible, the very wireless nature of the sensors
presents a number of security threats when deployed for certain applications like
military ,surveillances etc. The problem of security is due to the wireless nature of the
sensor networks and constrained nature of resources on the wireless sensor nodes,
which means that security architectures used for traditional wireless networks are not
viable. Furthermore, wireless sensor networks have an additional vulnerability
because nodes are often placed in a hostile or dangerous environment where they are
not physically protected. In this research the authors discussed some security threats
and challenges faced by WSNs.
Wireless Sensor networks (WSN) is an emerging technology and have great potential
to be employed in critical situations like battlefields and commercial applications such
as building, traffic surveillance, habitat monitoring and smart homes and many more
scenarios. One of the major challenges wireless sensor networks face today is
19 | P a g e
security. While the deployment of sensor nodes in an unattended environment makes
the networks vulnerable to a variety of potential attacks, the inherent power and
memory limitations of sensor nodes makes conventional security solutions unfeasible.
The sensing technology combined with processing power and wireless
communication makes it profitable for being exploited in great quantity in future. The
wireless communication technology also acquires various types of security threats.
This research discussed a wide variety of attacks in WSN and their classification
mechanisms and different securities available to handle them including the challenges
faced.
In this research they introduced a new approach for wireless sensor network power
management which is based on neural networks. In this new approach an intelligent
analysis is used to process the structure of a wireless sensor network (WSN) and
produce some information which can be used to improve the performance of WSNs’
management application. In this paper we introduce our neural network based
approach which results in a more efficient way.
Author proposed that wireless sensor networks are equipped with only omni-
directional antennas, which can cause high collisions. It is shown that the per node
throughput in such networks is decreased with the increased number of nodes. Thus,
the transmission with multiple short range hops is preferred to reduce the interference.
However, other studies show that the transmission delay increases with the increased
number of hops.
20 | P a g e
This research discussed an application of a neural network in wireless sensor network
security. It presents a neural network approach against the denial-of-service attacks
launched by adversaries. The MLP enhances the security of a WSN by constantly
monitoring the parameters that exhibit unusual variations in case of an
attack/collision. The MLP shuts down the MAC layer and the physical layer of the
sensor node when the suspicion factor, the output of the MLP, exceeds a preset
threshold level. Backpropagation and particle swarm optimization algorithms are used
to avoid the attack.
Wireless sensor networking remains one of the most exciting and challenging
research domains of our time. As technology progresses, so do the capabilities of
sensor networks. Limited only by what can be technologically sensed, it is envisaged
that wireless sensor networks will play an important part in our daily lives in the
foreseeable future. Privy to many types of sensitive information, both sensed and
disseminated, there is a critical need for security in a number of applications related to
this technology. Resulting from the continuous debate over the most effective means
of securing wireless sensor networks, this research considered a number of the
security architectures employed, and proposed, to date, with this goal in sight. They
are presented such that the various characteristics of each protocol are easily
identifiable to potential network designers, allowing a more informed decision to be
made when implementing a security protocol for their intended application.
Authentication is the primary focus, as the most malicious attacks on a network are
the work of imposters, such as DOS attacks, packet insertion etc. Authentication can
be defined as a security mechanism, whereby, the identity of a node in the network
can be identified as a valid node of the network. Subsequently, data authenticity can
be achieved; once the integrity of the message sender/receiver has been established.
21 | P a g e
Authors discussed that Security is an important issue for sensor networks deployed in
hostile environments, such as military battlefields. The low cost requirement
precludes the use of tamper resistant hardware on tiny sensor nodes. Hence, sensor
nodes deployed in open areas can be compromised and used to carry out various
attacks on the network. In this paper, we consider the collision attack that can be
easily launched by a compromised (or hostile) node: a compromised node does not
follow the medium access control protocol and cause collisions with neighbor
transmissions by sending a short noise packet. This attack does not consume much
energy of the attacker but can cause a lot of disruptions to the network operation. Due
to the wireless broadcast nature, it is not trivial to identify the attacker. In this paper,
we propose a distributed scheme that is based on low-cost hardware and can
effectively identify the source of a collision attack.
22 | P a g e
and many others. For instance, people can use WSNs to build intelligent house, to
gather machine information for real-time control in factories, and to track enemy
movements in battle fields. To collect data from WSNs, base stations and aggregation
points are commonly used. They usually have more resources (e.g. computation
power and energy) than normal sensor nodes which have more or less such
constraints. Aggregation points gather data from nearby sensors, integrate the data
and forward them to base stations, where the data are further processed or forwarded
to a processing center. In this way, energy can be conserved in WSNs and network
life time is thus prolonged.
CHAPTER: 3
23 | P a g e
PROBLEM FORMULATION AND METHODOLOGY
24 | P a g e
explicitly mentioned as a requirement. There must be certain moments at which
distributed neurons observe the same events, as if each of them would own a local
clock and these clocks were synchronized from time to time by such events.
Broadcast naturally provides plenty of such synchronization points. The purpose is to
look for an optimum value by associating the firing times with a certain variable in
such a way that the smaller this variable is the more desirable the property of the
corresponding neuron is. Hence, the neuron firing earliest will naturally be the one
whose property variable has the minimum value among the neurons being compared.
Hence, the essence here is to introduce competition, instead of superposition in
Hopfield’s approach, to select a winner that possesses the desired optimality.
Figure 3.1: Simple two layer feed forward back propagation neural network
25 | P a g e
basically three layers: an input layer, hidden layer and output layer.
26 | P a g e
depicts the HN, which is presented with the sensor input pattern containing readings
of three sensors. After iterative processing the optimized, i.e. completed or corrected
pattern can be used to build a data packet, which is represented by the dashed box.
27 | P a g e
3.6 Proposed Algorithm:
1. Create a network having 18 node arranged in circular fashion.
2. Select source and destination and the sensor node from the nodes.
3. While(data is not received by destination)
4. repeat
a. If(sensor node detect collision)
b. Then
i. Apply pattern recognition neural network to change the
position of the node at which collision is detected.
ii. And start transmission from source node again.
c. Else
i. Transmit the data from one node to another.
5. End if
6. End while
7. Exit
28 | P a g e
3.7.2 HISTORY OF MATLAB:
Cleve Moler, the chairman of the computer science department at the University of
New Mexico, started developing MATLAB in the late 1970s. He designed it to give
his student’s access to LINPACK and EISPACK without them having to
learn FORTRAN. It soon spread to other universities and found a strong audience
within the applied mathematics community. Jack Little, an engineer, was exposed to it
during a visit Moler made to Stanford University in 1983. Recognizing its commercial
potential, he joined with Moler and Steve Bangert. They rewrote MATLAB in C and
founded MathWorks in 1984 to continue its development. These rewritten libraries
were known as JACKPAC. In 2000, MATLAB was rewritten to use a newer set of
libraries for matrix manipulation, LAPACK.
29 | P a g e
computation, control theory, simulation, optimization, and several other fields
of applied science and engineering.
• Windows — Insert the DVD into the DVD drive connected to your system or
double-click the installer file you downloaded from the Math Works Website [49].
The installer should start automatically.
30 | P a g e
Step 2: Choose to Install Without Using the Internet
If you do not have an Internet connection, select the Install without using the
Internet option and click Next.
If you have the key, select the I have the File Installation Key for my license
option, enter the File Installation Key, and click Next. Theadministrator contact on a
license can retrieve the File Installation Key fromthe License Center at the Math
Works Web site.
If you do not have the key, select the I do not have the File Installation Key option
and click Next. The installer will provide you with the informationyou need to get a
key.
31 | P a g e
1. Remember the information displayed in this dialog box and click Finish to
exit the installer. On Windows and Linux systems, you can click Print to print
out the information.
2. Go to a computer with an Internet connection and log in to your account at the
Math Works Web site.
3. Visit the License Center and enter the information from this dialog box. Math
Works use information to generate a File Installation Key and License File
for your license.
4. Return to your computer and re-run the installer. With the File Installation
Key and a License File, you can install and activate the software without an
Internet connection.
• Choose Typical if you have an Individual or Group license and do not need to
specify which products you want to install and do not need to access any installation
options.
• Choose Custom if you need to specify which products to install, need access to
installation options, or need to install the license manager (network license options
only).
If you choose a Typical installation, the installer skips the product selection and
installation options steps.
32 | P a g e
On Macintosh systems, the installer puts the MATLAB application package,
MATLAB_R2012b.app, in the Applications folder, by default. When specifying a
folder name, you can use any alphanumeric character and some special characters,
such as underscores. The installer tells you if the name you specified includes any
characters that are not permitted in file names. If you make a mistake while entering a
folder name and want to start over, click Restore Default Folder. After making your
selection, click Next
After selecting the products you want to install, click Next to continue with the
installation.
If you choose to exit the installer without performing activation, clear the Activate
33 | P a g e
MATLAB option and click Finish(the button label changes). You can activate later
using the activation application.
If you do not have your License File, select the I do not have a license file option and
click Next to get information about how to retrieve a License File.
3.7.7 STARTING WITH MATLAB:
After logging into your account, you can enter MATLAB by double-clicking on the
MATLAB shortcut icon (MATLAB 7.0.4) on your Windows desktop. When you start
MATLAB, a special window called the MATLAB desktop appears. The desktop is a
window that contains other windows. The major tools within or accessible from the
desktop are:
The Command Window
The Command History
The Workspace
The Current Directory
The Help Browser
The Start button
When MATLAB is started for the first time, the screen looks like the one that shown
34 | P a g e
in the Figure 3.3.
This illustration also shows the default configuration of the MATLAB desktop. You
can customize the arrangement of tools and documents to suit your needs. Now, we
are interested in doing some simple calculations. We will assume that you have
sufficient understanding of your computer under which MATLAB is being run.
You are now faced with the MATLAB desktop on your computer, which contains the
prompt (>>) in the Command Window. Usually, there are 2 types of prompt:
>> for full version
EDU> for educational version
35 | P a g e
Table:3.1 Elementary Functions used in MATLAB
36 | P a g e
CHAPTER: 4
RESULT AND DISCUSSION
In this section, the performance of each classifier in terms of packet delivery ratio,
end2end delay, and throughput was compared. For better understanding of results
comparison, we introduce these criteria.
a) Packet delivery ratio- It expresses the ratio of the total number of publication
messages received by each subscriber node, up to the total number of
publication messages generated by all publisher nodes of the events to which
the subscriber node has subscribed.
b) End2End Delay- The delay of a packet in a network is the time it takes the
packet to reach the destination after it leaves the source.
37 | P a g e
Table 4.1:Different Parameters used for Feed Forward Back Propagation
38 | P a g e
4.1 SNAPSHOTS/ GRAPHS:
4.1.1 SNAPSHOTS:
This figure shows the data /packet transmission from one node to another. Here the
node which send data from one node to another , all are static.
Collided/dead
node
39 | P a g e
This figure shows a sensor node (yellow) which is in rectangle shape. When more
than one node sends the data simultaneously at the same node then the sensor node
sense it and change the color from green to yellow.
Sensor Node
This figure shows a collided/dead node .When more than one node sends the data to
same node at the same time, then there is chances of collision. Here as the collision
occur at another rectangle node; it will change his color from green to red.
40 | P a g e
Collided
Node/Dead
Node
41 | P a g e
This figure shows that after using Hopfield neural network, we can avoid the
collision.
A Neural
Network
Approach
This figure shows collision avoidance after using Hopfield neural network. Here the
two rectangle node shows that there is no collision when two or more node sends the
data at the same time and there is no changes in node’s color.
42 | P a g e
Collision avoidance
using Hopfield NN
43 | P a g e
4.1.2 GRAPHS:
94
92
90
88
Back Propogation
86 Hop Field
84
82
80
78
76
200 200 200 200 200 200 210
Number of Packet Transmit
Figure 4.6: Graph showing Packet Delivery ratio over no. of Packet Transmit
End2End Delay
Throughput
0.2
2.5
0.18
0.16
0.142
0.12
Back Propagation
0.1
1.5 Hop Field
0.08 Back propagation
0.06 Hop Field
0.041
0.02
0
0.5 200 200 200 200 200 200 210
No. of Packet Transmit
0
200 200 200 200 200 200 210
Figure 4.7: Graph for End2End Delay over no. of Packet Transmit
No. of Packet Transmit
44 | P a g e
CHAPTER: 5
CONCLUSION AND FUTURE WORK
Wireless sensor networks (WSNs) are innovative large-scale wireless networks that
consist of distributed, autonomous, low-power, low-cost, small-size devices using
sensors to cooperatively collect information through infra-structure-less ad-hoc
wireless network. The development of wireless sensor networks was originally
motivated by military applications such as battlefield surveillance. However, wireless
sensor networks are now used in many civilian application areas, including
environment and habitat monitoring, healthcare applications, home automation, and
traffic control.
Furthermore, the scale of sensor networks is considerably large, and the network
topology is dynamically adjusted, because some nodes may die out of running out of
45 | P a g e
energy or failure, and new nodes may join the network to maintain desirable
functionality. At last, sensor networks use insecure wireless communication channel
and lack infrastructure. As a result, existing security mechanisms are inadequate, and
new approaches are desired. Since large number of sensor nodes are densely
deployed, neighbor nodes may be very close to each other. Hence, multihop
communication in sensor networks is expected to consume less power than the
traditional single hop communication. Furthermore, the transmission power levels can
be kept low, which is highly desired in covert operations.
The main feature of WSN that makes it unique is its flexibility in terms of the shape
of the network and mobility of the sensors. In this thesis, we have proposed the
throughput, delay and packet delivery ratio of networks according to no. of packet
transmit using hop-field neural network. We have compared the results of back-
propagation technique with Hop-field neural network. The comparison shows that
results of hop-field are better than the back propagation. Here, the packet delivery
ratio and through-put are increased and end-to-end delay is decreased. This thesis also
explores solutions to efficiently recover collisions in WSNs. In future neuro-fuzzy and
fuzzy applications can be apply to avoid the collision using these parameters.
46 | P a g e
References
[1] C. Karlof and D. Wagner, “Secure routing in wireless sensor networks: Attacks
and countermeasures”Ad Hoc Networks, vol. 1, no. 2, 2003
[2] V. Arnaudov, “Unified Management of Heterogeneous Sensor Networks In the
Atlantis Framework”, Department of Computer Science, Brown University.
[3] M. Sims, C. Goldman, V. Lesser, “Self-Organization through Bottom-up coalition
formation”, University of Massachusetts.
[4] J. Suh, Mike Horton, “Powering sensor networks”, Potentials, IEEE,
August/September 2004.
[5] K. L. Chee, P. K. Sivaprasad, S.V. Rao, J.G. Lim, “Clock Drift Reduction For
Relative Time Slot TDMABased Sensor Networks”, Personal Indoor and Mobile
Radio Communications, PIMRC 2004. 15th IEEE International Symposium, Pages:
1042 – 1047, Vol.2, 5-8 Sept. 2004.
[6] M. Hempstead, N. Tripathi, P. Mauro, G. Y. Wei, David Brooks, “An Ultra Low
Power System Architecture for Sensor Network Applications”, Intelligent Sensors,
Sensor Networks and Information Processing Conference, Proceedings of the 2004
14-17 Dec. 2004, Pages: 13 – 18, 2004.
47 | P a g e
[9] SinchanRoychowdhury, ChiranjibPatra,” Geographic Adaptive Fidelity and
Geographic Energy Aware Routing in Ad Hoc Routing”, Special Issue of IJCCT
Vol.1 Issue 2, 3, 4; 2010 for International Conference [ACCTA-2010], 3-5 August
2010.
[10] TahirNaeem, Kok-Keong Loo, “Common Security Issues and Challenges in
Wireless Sensor Networks” and IEEE 802.11 Wireless Mesh Networks, International
Journal of Digital Content Technology and its Applications, Page 89-90 Volume 3,
Number 1, year 2009
[11] John Paul Walters, Zhengqiang Liang, Weisong Shi, VipinChaudhary, “Wireless
Sensor Network Security: A Survey”, Security in Distributed, Grid and Pervasive
Computing Yang Xiao (Eds), Page3-5, 10-15, year 2006
[12] Pfleeger, C. P. and Pfleeger, S. L., “Security in Computing”, 3rd edition, Prentice
Hall 2003
[13] Culpepper, B.J. and Tseng, H.C., “Sinkhole intrusion indicators in DSR
MANETs”, Proc. First International Conference on Broad band Networks, 2004, pp.
681 – 688.
[14] C. Karlof and D. Wagner, “Secure routing in wireless sensor networks: Attacks
and countermeasures,” Elsevier’s AdHoc Networks Journal, Special Issueon Sensor
Network Applications and Protocols, vol. 1, no. 2–3, pp. 293– 315, September 2003.
[15] Karlof, C. and Wagner, D., “Secure routing in wireless sensor networks: Attacks
and countermeasures”, Elsevier's Ad Hoc Network Journal, Special Issue on Sensor
Network Applications and Protocols, September 2003, pp. 293-315.
[16] Y. Hu, A. Perrig, and D. Johnson, “Wormhole detection in wireless ad hoc
networks,” 2002.[Online]. Available: citeseer. ist.psu.edu/hu02wormhole.html
[17] Mauro Conti,Roberto Di Pietro,Luigi Vincenzo Mancini, and Alessandro
Mei,“Distributed Detection of Clone Attacks in Wireless Sensor Networks” IEEE
Transaction on dependable & secure computing vol.8 n0.5 September 2011.
[18] Blackert, W.J., Gregg, D.M., Castner, A.K., Kyle, E.M., Hom, R.L., and Jokerst,
R.M., “Analyzing interaction between distributed denial of service attacks and
mitigation technologies”, Proc. DARPA Information Survivability Conference and
48 | P a g e
Exposition, Volume 1, 22-24 April, 2003, pp. 26 – 36.
[19] Wang, B-T. and Schulzrinne, H., “An IP traceback mechanism for reflective
DoS attacks”, Canadian Conference on Electrical and Computer Engineering,
Volume 2, 2-5 May 2004, pp. 901 – 904.
[20]Q. Ren and Q. Liang, "Secure media access control (MAC) in wireless sensor
networks: Intrusion detections and countermeasures," in Proc.15th IEEE Int.
Symposium on Personal, Indoor and Mobile RadioCommunications PIMRC 2004,
vol. 4, 5-8 Sept. 2004, pp. 3025-3029.
[21] "Fuzzy logic-optimized secure media access control (FSMAC) protocol wireless
sensor networks," in Proc. IEEE Int. Conf. on ComputationalIntelligence for
Homeland Security and Personal Safety CIHSPS2005, March 31 2005-April 1 2005,
pp. 37-43.
[22]Q. Ren and Q. Liang, "Secure media access control (MAC) in wireless sensor
networks: Intrusion detections and countermeasures," in Proc.15th IEEE Int.
Symposium on Personal, Indoor and Mobile RadioCommunications PIMRC 2004,
vol. 4, 5-8 Sept. 2004, pp. 3025-3029.
[25] Rajkumar, Sunitha K.R and Dr. H.G Chandrakanth “A Survey on Security
Attacks in Wireless Sensor Network”, International Journal of Engineering Research
and Applications (IJERA) ISSN: 2248-9622 www.ijera.com Vol. 2, Issue4, July-
49 | P a g e
August 2012, pp.1684-1691.
[27] Chaudhari H.C. and Kadam L.U. “ Wireless Sensor Networks: Security, Attacks
and Challenges”. International Journal of Networking Volume 1, Issue 1, 2011, pp-
04-16 Available online at: http://www.bioinfo.in/contents.php?id=108.
[28]JiyongSon ; Dept. of Electr. Eng., Korea Univ., Seoul, South Korea ; Hwan-
JooKwak ; Gwi-Tae Park ,member IEEE proposed some work” Back propagation
neural network based real-time self-collision detection method”2011.
[32] Hong-Ning Dai proposed some work” Throughput and Delay in Wireless Sensor
Networks”2009.
[33] Raghavendra V. Kulkarni, “Neural Network Based Secure Media Access Control
Protocol for Wireless Sensor Networks” Senior Member, IEEE,” 2009.
50 | P a g e
[34] David Boyle, “Securing Wireless Sensor Networks: Security Architectures”
JOURNAL OF NETWORKS, VOL. 3, NO. 1, JANUARY 2008.
[35] Phillip Reindl and Kendall Nygard , “Defending Malicious Collision Attacks in
Wireless Sensor Networks”. Department of Computer Science North Dakota State
University Fargo,2007.
[38] K. Jamieson, H. Balakrishnan, proposed some work “A mac protocol for event-
driven wireless sensor networks”2003.
[40] J. Polastre, J. Hill, and D. Culler, “Versatile Low Power Median Access for
Wireless Sensor Networks,” in ACM SenSys, 2004.
51 | P a g e
[44] Simon X. Yang, Member, IEEE,proposed some work “Neural Network
Approaches to Dynamic Collision-Free Trajectory Generation”2001.
[45],K. Jamieson, H. Balakrishnan, proposed some work “A mac protocol for event-
driven wireless sensor networks”2003.
[48] J. J. Hopfield, “Neural networks and physical systems with emergent collective
computational abilities,” Proc. of National Academy of Sciences,
1982.
[49] The MathWorks Inc. MATLAB 7.0 (R14SP2). The MathWorks Inc., 2005.
[50] S. J. Chapman. MATLAB Programming for Engineers, Thomson, 2004
[51] http://en.wikipedia.org/wiki/MATLAB
[52] http://wiki.answers.com/Q/What_are_the_applications_or_uses_of_matlab
[53] A. Gilat. MATLAB: An introduction with Applications. John Wiley and Sons,
2004.
[54] J. Cooper. A MATLAB Companion for Multivariable Calculus.Academic Press,
2001.
[56] John Paul Walters, Zhengqiang Liang, Weisong Shi, VipinChaudhary, “Wireless
Sensor Network Security: A Survey”, Security in Distributed, Grid and Pervasive
Computing Yang Xiao (Eds), Page3-5, 10-15, year 2006.
52 | P a g e
2006.
[58] FengZhao,LeonidasGuibas,,”Wireless Sensor Networks”, Morgan Kaufmann
Publications.
53 | P a g e