Professional Documents
Culture Documents
Dynamic Routing To Alleviate Congestion With Authentication For Mobile Wireless Sensor Networks
Dynamic Routing To Alleviate Congestion With Authentication For Mobile Wireless Sensor Networks
Dynamic Routing To Alleviate Congestion With Authentication For Mobile Wireless Sensor Networks
47
Integrated Intelligent Research (IIR) International Journal of Web Technology
Volume: 01 Issue: 02 December 2012 Page No.44-49
ISSN: 2278-2389
#recalculate the depth A novel protocol to achieve secure and efficient handover
11: select the Lowest Depth from the routing table authentication called PAIRHAND is employed and even
as LD congestion problem is dealt, which usually occurs, using
12: setLocalDepth(LD + 1); potential-based traffic-aware dynamic routing algorithm. The key
idea underlying the TADR algorithm is to define a hybrid scalar
#Choose the next hop node potential field, which contains a depth field and a queue length
13: selects from the entries with QL<1. field. In a word, TADR achieves its objectives through spreading
spatially and temporally packets in a reasonable pattern. In
TADR uses the steepest gradient method to choose the parent. addition, TADR has features which simplify the implementation.
More precisely, if there are more than one neighbor which has It is a distributed and scalable routing algorithm because it just
the same maximum force Fm, TADR will choose the next hop needs local information (from its direct neighbors), and the
node according to maximum potential Vm, minimum depth of routing state information (depth and queue length) is quite easy
neighbors and minimum cost of links in turn. After doing that, if to obtain. The security analysis and results show that the
TADR still cannot determine the candidate parent, it will choose proposed approach is feasible for real applications.
one randomly.
V. COMPARISON AND EVALUATION REFERENCES
Table I shows the functionality and performance comparison of [1] European Telecommunications Standards Institute, GSM 02.09:
Security Aspects, 1993.
PairHand [6]
[2] 3rd Generation Partnership Project, 3GPP Specification: 3GPP TS
33.102, 3G Security, Security Architecture, Dec. 2002.
48
Integrated Intelligent Research (IIR) International Journal of Web Technology
Volume: 01 Issue: 02 December 2012 Page No.44-49
ISSN: 2278-2389
[3] C.-C. Chang, C.-Y. Lee, and Y.-C. Chiu, “Enhanced authentication
scheme with anonymity for roaming service in global mobility
networks,” Computer Commun., vol. 32, no. 4, pp. 611–618, 2009.
[4] D. He, J. Bu, S. Chan, C. Chen, and M. Yin, “Privacy-preserving
universal authentication protocol for wireless communications,” IEEE
Trans. Wireless Commun., vol. 10, no. 2, pp. 431–436, 2011.
[5] G. Yang, Q. Huang, D. S. Wong, and X. Deng, “Universal
authentication protocols for anonymous wireless communications,”
IEEE Trans. Wireless Commun.,2010.
[6] J. Choi and S. Jung, “A secure and efficient handover authentication
based on light-weight Diffie-Hellman on mobile node in FMIPv6,”
IEICE Trans. Commun., vol. E-91B, no. 2, pp. 605–608, 2008.
[7] S. Rangwala, R. Gummadi, R. Govindan, and K. Psounis,
“Interference-Aware Fair Rate Control in Wireless Sensor Networks,”
Proc. ACM SIGCOMM, pp. 63-74, 2006.
[8] P.P. Pham and S. Perreau, “Performance Analysis of Reactive
Shortest Path and Multipath Routing Mechanism with Load Balance,”
Proc. IEEE INFOCOM, 2003.
[9] C. Ee and R. Bajcsy, “Congestion Control and Fairness for Many to-
One Routing in Sensor Networks,” Proc. ACM Int’l Conf. Embedded
Networked Sensor Systems (SenSys ’04), 2004.
[10] S. Chen and N. Yang, “Congestion Avoidance Based on Lightweight
Buffer Management in Sensor Networks,” IEEE Trans. Parallel and
Distributed Systems, Sept. 2006.
[11] A. Basu, A. Lin, and S. Ramanathan, “Routing Using Potentials: A
Dynamic Traffic-Aware Routing Algorithm,” Proc. ACM
SIGCOMM, pp. 37-48, 2003.
[12] B. Hull, K. Jamieson, and H. Balakrishnan, “Mitigating Congestion in
Wireless Sensor Networks,” Proc. Int’l Conf. Embedded Networked
Sensor Systems (SenSys ’04), pp. 134-147, 2004.
[13] Y. Panthachai and P. Keeratiwintakorn, “An Energy Model for
Transmission in Telos Based Wireless Sensor Networks,” Proc. Int’l
Joint Conf. Computer Science and Software Eng.,2007.
[14] J. Teo, Y. Ha, and C. Tham, “Interference-Minimized Multipath
Routing with Congestion Control in Wireless Sensor Network for
High-Rate Streaming,” IEEE Trans. Mobile Computing, vol. 7, no. 9,
pp. 1124-1137,Sept.2008.
[15] N. Patwari, A.O. Hero III, M. Perkins, N. Correal, and R.J. O’Dea,
“Relative Location Estimation in Wireless Sensor Networks,” IEEE
Trans. Signal Processing, vol. 51, no. 8, pp. 2137-2148, Aug. 2003.
[16] M.H. Yaghmaee and D.A. Adjeroh, “Priority-Based Rate Control for
Service Differentiation and Congestion Control in Wireless
Multimedia Sensor Networks,” Computer Networks, vol. 53, no. 11,
pp. 1798-1811,2009.
[17] C. Wan, S. Eisenman, A. Campbell, and J. Crowcroft, “Siphon: Over-
Load Traffic Management Using Multi-Radio Virtual Sinks in Sensor
Networks,” Proc. ACM Int’l Conf. Embedded Networked Sensor
Systems (SenSys ’05), pp. 116-129, 2005.
[18] Y. Sankarasubramaniam, O. Akan, and I. Akyildiz, “ESRT: Eventto-
Sink Reliable Transport in Wireless Sensor Networks,” Proc. ACM
Int’l Symp. Mobile Ad Hoc Networking and Computing (MobiHoc
’03), 2003.
49